General Information
Presenting the 2nd Annual Vancouver International Privacy & Security Summit – This global hybrid event is an integrated experience with two simultaneous components giving all virtual delegates and in-person delegates an all encompassing experience.
The summit will offer a platform for over 1000 security and privacy professionals from around the world to discuss important issues on how we securely live, work, and play as the move to digital platforms accelerates.
Presented by Reboot Communications in partnership with ISACA Vancouver, this three-day summit will provide essential education, training and opportunities for CPD credits for individuals who are responsible for the transformation of the public and private sector into the new digital economy.
The Digital-First Summit Virtual Experience & The Summit In-Person Experience
Designed to offer virtual delegates and in-person participants more. With enhanced integrations allowing virtual attendees to network with in-person participants. It is a place where you will experience engaging and interactive live streaming keynotes and panel sessions, networking activities, live streaming collaboration between virtual delegates and in-person participants, along with interactive virtual social spaces and building business relationships.
(All In-Person attendance and components are subject to provincial guidelines – Masks will need to be worn and we will be checking vaccine passports and photo ID)
Digital First Experience*
Early Bird (until Jan.14th) |
Regular (after Jan.14th) |
|
Virtual Registration | $299.00 CAD (plus GST) |
$350.00 CAD (plus GST) |
Virtual Experience Registration Includes:
- Signature keynotes and concurrent keynotes by international subject matter experts in privacy & security
- Concurrent panel sessions + interactive live streaming Q & A
- Pre-summit virtual sector day sessions on March 9th
- Access to the customized virtual platform (content available on-demand for 30 days after the summit)
- Access to the virtual exhibition hall
*If you are a post-secondary student please note we have 100 complimentary virtual tickets available, sponsored by ISACA Vancouver Chapter.
In-person Experience**
Early Bird (until Jan.14th) |
Regular (after Jan.14th) |
|
Public Sector Registration | $499.00 CAD (plus GST) |
$599.00 CAD (plus GST) |
Private Sector Registration | $749.00 CAD (plus GST) |
$850.00 CAD (plus GST) |
In-Person Experience Registration Includes:
(includes full virtual experience registration)
- Join us live in Vancouver, B.C for our 2-day interactive in-person experience (March 10-11)
- Collaborate with senior executives who are changing the privacy & security industry
- Signature keynotes and concurrent keynotes by international subject matter experts in privacy & security
- Concurrent panel sessions + interactive in-person Q & A
- Unparalleled in-person networking via 1:1 meetings and small group conversations
- Exhibit booths for our top tier sponsors
- Lunch and coffee breaks
**Subject to provincial guidelines (if the in-person portion needs to be cancelled you will be given a virtual pass and refunded the difference).
Social Media
Stay connected and engaged in the conversation leading up to and during the summit by following along on Twitter @VIPSSummit. Use the event hashtag #VIPSS in your tweets to add to the existing discussions. We would appreciate you sharing your voice with our other followers.
*Invited Speaker
Click on the date of the agenda you would like to view. Please note the timezone listed on the agenda.
Wednesday, March 9, 2022 - Virtual Sessions Only
9:00am - 12:00pm • Virtual Platform
Financial Services Sector Session* - Sponsored by PwC
More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22finance
*Please note this session will be a virtual only session accessed through the virtual platform
9:00am - 12:00pm • Virtual Platform
Healthcare Sector Session* - Sponsored by Medigate
More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22health
*Please note this session will be a virtual only session accessed through the virtual platform
9:00am - 12:00pm • Virtual Platform
Application Security Sector Session* - Sponsored by Contrast Security, FWDSEC & WEBSEC
More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22appsec
*Please note this session will be a virtual only session accessed through the virtual platform
1:00pm - 4:00pm • Virtual Platform
Energy, Resources, and Mining Sector Sector Session* - Sponsored by iON and Nozomi
More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22energy
*Please note this session will be a virtual only session accessed through the virtual platform
1:00pm - 4:00pm • Virtual Platform
Education Sector Session* - Sponsored by ISACA Vancouver Chapter
More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22education
*Please note this session will be a virtual only session accessed through the virtual platform
1:00pm - 4:00pm • Virtual Platform
Local Government Sector Session* - Sponsored by Municipal Finance Authority of BC
This session will be a private by invitation only session.
*Please note this session will be a virtual only session accessed through the virtual platform
Thursday, March 10, 2022
8:40am - 9:20am • Bayshore Grand Ballroom
Session 1 - Keynote Address: Privacy, Prosperity & Security in the Era of Surveillance Capitalism
9:20am - 10:00am • Bayshore Grand Ballroom
Session 2 - Keynote Address by TELUS: Ransomware Realities, Impacts and Controls: An Introduction to the TELUS Canadian Ransomware Study
The increase in ransomware seen across the globe has fundamentally changed how organizations think about security. With cyber attacks becoming easier to perpetrate and threat actors casting an ever wider net, the new reality is that anyone can be a target. And Canadian organizations aren’t immune.
Join Martin Belanger, Director, TELUS Cybersecurity as he shares insights from the TELUS Canadian Ransomware Study. Based on the feedback of over 450+ Canadian organizations, this study shares some surprising realities about how ransomware is impacting organizations, which controls are most effective and how to best protect yourself.
10:00am - 10:30am • Bayshore Grand Ballroom Foyer / Salon D
Morning Break / Exhibit Booth Time
10:30am - 11:30am • Salon A
Session 3 - Concurrent Panel A: Web 3.0: Blockchain & Crypto Currencies and The Impact on Privacy & Security
We are at the tipping point of a new phase in the web’s evolution, where layers of technology like machine learning, artificial intelligence and blockchain are drastically improving what is possible online. Web 3.0 is the future of the internet. Offering a plethora of new opportunities, how will security and privacy be addressed as we accelerate the move to these new digital platforms?
10:30am - 11:30am • Salon B
Session 3 - Concurrent Panel B: Global Privacy Accord International Data Flows
A global privacy accord to facilitate data flows would truly make everyone’s life easier. While Canada is adequate under the EU GDPR there are numerous other countries with adequacy requirements. Furthermore, countries are seeing data as national assets, and enacting data localization rules as a “privacy protection.” Elizabeth Denham, former UK ICO and BC Information Commissioner has led a G7 process to develop such an accord. Should we be optimistic, or are all the political and cultural impediments a barrier? Join this session to find out.
10:30am - 11:30am • Salon C
Session 3 - Concurrent Panel C: The Internet of Everything: The Next Step in Government Data Tracking
Governments, businesses and data protection authorities around the world are trying to anticipate the possible impacts of the Internet of Things on society. International experts, thinkers and technology platforms are forecasting political, social and economic transformations; concerns about privacy and surveillance.
Profiling, tracking and targeting of individuals or groups by organizations are expected to become more nuanced, specific and accurate with the Internet of Things. If a device becomes linked to us in some way, it becomes a data point that can be tracked and mined for patterns in our behavior.
How does society benefit from the advancement of the Internet of Things while protecting our personal privacy and security as we live, work and play in the digital economy?
11:35am - 12:05pm • Salon A
Session 4A - Concurrent Keynote Address by Trend Micro: Cybersecurity Fighting Back in 2022
In the coming year, amid a landscape still in flux, enterprises will push forward with their digital transformation and hybrid work endeavors. This period is brimming with possibilities not just for companies that want to drive progress but also for cybercriminals who want to cash in by launching attacks both old and new. We will tackle the various security issues that we believe will make an impact on the threat landscape of 2022, and recommend security best practices and solutions to keep organizations protected against ever-evolving attacks.
The main takeaways of attendees will include:
-Understand why there will be a surge in zero-day exploits, which will break 2021’s record. Enterprises will be on high alert for potential patch gaps as more vulnerabilities are expected to be unearthed.
-How Cloud attackers will both pivot and shift as they carry out tried-and-true attacks that will use new trends in technology and target DevOps tools and pipelines in cloud integrated development environments (IDEs).
-How global supply chains will be in the crosshairs of fourfold extortion techniques as companies evolve their supply chain operations. There will be a surge in supply chain attacks that will use the quadruple extortion model
11:35am - 12:05pm • Salon B
Session 4B - Concurrent Keynote Address by Google: Public Cloud Adoption and Cybersecurity Risk Reduction
Providing competent and capability driven cybersecurity protection to the modern day enterprise has become increasingly difficult, if not impossible by today’s protection standards. Adopting a prominent public cloud posture can be a force multiplier for any security apparatus, if engaged properly. If the enterprise profile of the future is one composed largely of optimized hybrid environments, organizations need to weigh both value and the potential for risk reduction as they build roadmaps for the future.
11:35am - 12:05pm • Salon C
Session 4C - Concurrent Keynote Address by VMware: Cybersecurity in the Age of Espionage
The cyber theft of private and confidential information from government agencies, business, and private individuals exceeded $6 trillion in 2021. The modern spy is responsible for these technologically advanced attacks targeting your data. Robert Hanssen was the first of these new cyber spies, charged with selling American secrets to Russia for more than US$1.4 million in cash and diamonds. His ability to exploit computer systems allowed him to protect his identity during a 22-year spy career. In this exciting and informative talk, Eric O’Neill uses real-life spy stories and a review of recent massive cyber-attacks to show how careful diligence, counter-espionage techniques, and zero trust can help identify the numerous spies, hackers, cyber criminals, and trusted insiders that threaten the data that is the currency of our lives.
12:05pm - 1:10pm • Bayshore Grand Ballroom
Lunch Break (Please visit the exhibit booths)
1:10pm - 1:50pm • Bayshore Grand Ballroom
Session 5 - Keynote Address by Fortinet: Creating a Cloud Hygiene Strategy of Excellence
Security remains the number one barrier to cloud adoption as cloud presents a unique set of challenges compared to traditional IT. These issues are further exasperated by requirements related to compliance, data sovereignty and privacy. In many ways, securing cloud is very similar to securing traditional IT. Concepts such risk governance, auditing, identifying and mitigating threats are equally as relevant. But in some fundamental aspects, the practice of securing the cloud is very different than the traditional on-prem network experience. Security in the cloud is a shared responsibility of varying degrees between consumer and provider. Jurisdictional issues over data ownership loom large. As organizations begin their digital transformational journey into the cloud, learn how Fortinet sees the cloud journey from a Canadian perspective.
2:00pm - 2:30pm • Salon A
Session 6A - Concurrent Keynote Address by ServiceNow: How to use AI to fight back against sophisticated attacks in the wild – and win
A fireside chat with Issam Hadj Laradji, Sr. AI Research Scientist, and Nathan Roarty, Sr. Advisory Solution Consultant, on how artificial intelligence (AI) is changing how we think about cybersecurity and privacy. They will chat about how AI can help us identify risky behaviours, prevent adversarial attacks, understand bias, and how big data helps us analyze small data sets. Join our session to hear about what's hot in AI research and how AI can help us to stay safe and secure.
2:00pm - 2:30pm • Salon B
Session 6B - Concurrent Keynote Address by Zscaler: A CISO’s Perspective on the Zero Trust Approach to Security
The cloud and remote work have removed traditional security boundaries. As a CISO, the responsibility rests squarely on your shoulders to prevent compromise, lateral movement of attacks, and data loss. A zero trust approach to your overall security, where you challenge everything and trust nothing, is your most powerful secret weapon.
Hear directly from, Danny Connelly, Chief Information Security Officer of Zscaler, and former Associate CISO for the Centre for Disease Control (CDC) in an interactive fireside chat. As a highly regarded thought leader and trusted cyber security advisor, Danny provided guidance and formulated strategies to combat emerging threats for various agencies across the federal government. During his 11-year tenure at the CDC, he designed, implemented and optimized enterprise cyber security capabilities to effectively detect, prevent and respond to emerging cyber security threats. Danny will provide a CISO’s perspective to Zero Trust and views and strategies on adapting to digital transformation while embracing the latest technologies and trends.
2:00pm - 2:30pm • Salon C
Session 6C - Concurrent Keynote Address by Tanium: 5 Keys to Resolving Incidents Before They Happen
Successful defense requires understanding the posture of every device in your enterprise, it requires the ability to make decisions fast, and it requires the ability to execute on those decisions at enterprise scale. The IT security and operations teams that are consistently winning the battle against massive IT disruption have two things in common: 1) They have access to accurate device information in seconds, and 2) They have the ability to instantly affect change across every device they own, no matter where on Earth.
Learn the 5 most important questions that successful security and operations teams are able to answer in seconds, and by answering these questions they are able to resolve most security and operational incidents before they ever happen.
2:30pm - 2:55pm • Bayshore Grand Ballroom Foyer / Salon D
Afternoon Break / Exhibit Booth Time
2:55pm - 3:55pm • Salon A
Session 7 - Concurrent Panel A: The Dawn of Digital Health & Innovation in Healthcare: Protecting and Securing the Most Valuable Personal Information
McKinsey Global Institute estimates global digital-health revenues from telemedicine, online pharmacies, wearable devices will rise from $350bn last year to $600bn in 2024. 70% of hospitals and almost all physicians and pharmacies still use fax for prescriptions and transmitting patient records. Healthcare is beginning to embrace digital communication and analytics that have been common in other industries for years. As patients grow more comfortable with digital health, including remote and computer-assisted diagnosis and treatment, the concerns around privacy and security also increase. Regulators around the world recognize the need for digital health, health information sharing and analytics, but along with many other stakeholders, they are conservative in their approach even though we need healthcare to open up the silos. In this panel session we will discuss how we can protect and secure the most valuable of all personal information, while being able to leverage the data to improve the healthcare or people.
2:55pm - 3:55pm • Salon B
Session 7 - Concurrent Panel B: The New Hybrid Workplace
COVID has accelerated and in some cases mandated that organizations and government work from home. The shift may rival workplace transformations in the 19th and 20th centuries. The rapid shift to work at home was enabled by preconditions. Broadband services allow for document downloads and videoconferencing and remote work seems both normal and acceptable. Major challenges lie ahead. Are we prepared to provide the security and privacy needed in the work at home environment?
Organizations of all sizes, from all industries, rely heavily on cloud computing to operate. The massive shift to remote work during the COVID-19 pandemic has only increased this reliance. In fact, a sector built around fables of industry "disruption" has enabled many to maintain constancy, connection, and business continuity–and afford some enterprises new opportunities.
How can advances in computing power, networking, AI and devices help businesses, governments, and citizens thrive in a world that has been disrupted?
2:55pm - 3:55pm • Salon C
Session 7 - Concurrent Panel C: Digital ID: Ensuring Privacy and Security to Protect Canadians’ Personal Information in the New Digital Age
75% of Canadians feel it is important to have a secure and privacy enhancing digital ID. A majority of Canadians believe it is important for federal and provincial governments to move quickly on enabling digital ID in a safe and secure manner. The lack of standardization attributes to people and businesses not using the identity verification technology.
4:05pm - 4:50pm • Bayshore Grand Ballroom
Session 8 - Keynote Address by BCIT/Northeastern University: Working in partnership towards educational leadership in the New Era of Digital innovation!
In the new era of digital innovation and lifelong learning, it has become more important than ever to provide educational opportunities with unlimited pathways for students to ensure they achieve their educational career goals. During this presentation will discuss the recent partnership MoU between the British Columbia Institute of Technology and Northeastern University – Vancouver, and demonstrate how educational partnerships like this can be used to advance research and innovation in British Columbia and, build stronger futureproof communities.
Friday, March 11, 2022
8:20am - 8:50am • Bayshore Grand Ballroom
Session 9 - Keynote Address: Law reform in the time of COVID-19
The COVID-19 pandemic has, undoubtedly, accelerated the pace of digital innovation. In this presentation, BC’s Information and Privacy Commissioner Michael McEvoy will share his views on the impact of that change on privacy management and regulation – and how it has underscored the need for meaningful reform of the province’s privacy legislation. Commissioner McEvoy will also share highlights from his office’s recent work, as well as the challenges, opportunities, and priorities for the OIPC in the coming year. A question and answer period will follow the presentation.
8:55am - 9:35am • Bayshore Grand Ballroom
Session 10 - Keynote Address by Microsoft: Privacy, Risk, and Security Concerns in a Cloud First Era
58% of data breaches in 2020 involved personal data, and legislation across the globe are responding to such concerns, resulting in the data privacy regulation landscape that is more complex then ever. As an organization you are trying to meet multicloud compliance requirements across global, industrial and regional regulations and standards, while ensuring privacy remains central to your business to safe guard people and the tools they use to connect.
In this session we aim to simplify some of the complexity around data privacy, risk and security concerns in a cloud first era. Join us for a discussion on rrecognizing and adapting to a shared responsibility model for security and compliance when leveraging the cloud. You will leave the session with best practices and tips on risk mitigation and closing the security gaps that are applicable for your organization.
9:40am - 10:20am • Bayshore Grand Ballroom
Session 11 - Keynote Address by Kyndryl: Cyber Resilience - A Higher Bar than Cyber Security
Cyber Resilience goes beyond conventional cyber security and emphasizes continuity and recovery, because eventually, attackers will penetrate our defenses no matter how good they are. A cyber resilient organization is one that is able to satisfy the core mission despite being attacked, and even despite being under advanced persistent threat. Could you continue to run your organization if a nation-state actor is in your network and cannot be removed?
10:20am - 10:50am • Bayshore Grand Ballroom Foyer / Salon D
Morning Break / Exhibit Booth Time
10:50am - 11:50am • Salon A
Session 12 - Concurrent Panel A: State Sponsored Threat Vectors: Accountability & Governance of Civil Intelligence Relations Across the Five Eyes Security Community
As cybersecurity threats have evolved to become the new frontline in conflicts between nations and cultures, it escalates the tension between elected and appointed civilians and the uniformed military when it comes to the formation of national security policy.
It is widely held that nations which develop a properly balanced pattern of civil-military relations have a great advantage in the search for security. Our panel will test this policy point-of-view and discuss key questions facing policy makers in the Five Eyes community:
-Is it imperative for member countries of the Five Eyes Security Community to reconcile democracy and security through transparent standards, guidelines and legal frameworks?
-Is accountability the best means to ensure integral democratic governance?
-Does accountability reassure sceptics that intelligence and security practices are indeed aligned with the rules and values that democracies claim to defend?
10:50am - 11:50am • Salon B
Session 12 - Concurrent Panel B: The Metaverse: The Emperor's New Clothes?
The Metaverse - a super-platform weaving social media, online gaming, utilitarian data provision, and ease-of-life apps, all accessible through the same digital and physical space and bound together with economic and content mechanisms.
The global market for this new world is projected to be an $82B market by 2025 and many companies are lining up to be a part of creating this new world resulting in complexity and shiny visions of our new future.
The big promise is for this to be interoperable with connecting services so they can collect our data, track us, and demand our attention. It could be transcendent and empowering, or a broken web of complex data brokerages, incompatibility and uncoordinated experiences that drive us into a privacy and surveillance nightmare due to walled garden systems and mechanisms of monetization and control?
10:50am - 11:50am • Salon C
Session 12 - Concurrent Panel C: Artificial Intelligence in Canadian Healthcare: Will the Law Protect us from Algorithmic Bias Resulting in Discrimination
Artificial Intelligence (AI) use in Canadian Healthcare is live and the Laws to govern AI are still evolving in Canada and around the world. AI is seen as a foundational component to drive innovation and has tremendous potential across the healthcare system – AI innovation can improve workflows, enhance diagnostics, accelerate research and refine treatment. Yet at the same time, new technology brings a myriad of risks and challenges depending on the use case being deployed in the healthcare systems. We will discuss a few of these challenges. Specifically, the panel will discuss how to avoid algorithmic bias and discrimination, whether laws around this topic will protect us, and until we have them, how can we implement these AI solutions in a safe, responsible and trustworthy way, so Canadian citizens can be free of unfair and discriminatory outcomes.
11:55am - 12:25pm • Salon A
Session 13A - Concurrent Keynote Speaker by Check Point: Mobile Security – The Hackers Next Frontier
At the intersection between business and pleasure, mobile social applications access the most sensitive information about us and the world we live in. Hackers are focused on Mobile attacks now more than ever, as they represent the next frontier for security risk.
11:55am - 12:25pm • Salon B
Session 13B - Concurrent Keynote Speaker by Cisco: Zero to Super Hero when it comes to Zero Trust
I think it is time that we talk about zero-trust and what it really means. Is it a product, is it marketing, is it a superhero, what is it really? If you ask your friends and colleagues to describe what zero trust means to them they will most likely provide a different perspective each time and in many cases they would not be wrong. We will cover off what zero-trust promises, what is it exactly (product, marketing, superhero), identify and overcome the complexities - 30 min power session!
11:55am - 12:25pm • Salon C
Session 13C - Concurrent Keynote Speaker by Cloudflare: Ukraine Situation: Updates and Best Practices from the Front Lines at Cloudflare
With a global network of data centers blocking threats for customers across the planet, Cloudflare is uniquely positioned to see threat trends. During this session Cloudflare's CSO will share some of those challenges viewed through the cyber impact of the invasion of Ukraine and how we can all prepare better for what is coming next.
12:25pm - 1:30pm • Bayshore Grand Ballroom
Lunch Break (Please visit the exhibit booths)
1:30pm - 2:30pm • Salon A
Session 14 - Concurrent Panel A: Ransomware: Should the Public Sector be More Proactive on Ransomware?
A Case Study on the largest health data breach in Canada. Health & Community Services Newfoundland.
Ransomware is an increasingly common form of cyberattack and a majority of businesses and institutions are willing to pay the ransom rather than fight the invasion and loss of data. 70% of organizations paid the hackers financial demands. The most important protection is employee training. Governments must take a long look at how they allocated funding for cybersecurity especially when health dollars are stretched to the limits.
1:30pm - 2:30pm • Salon B
Session 14 - Concurrent Panel B: Canadian Private Sector Privacy Law Reform: Federal and Provincial Initiatives and Their Interoperability
Canada’s Privacy Commissioner says the Canadian Government must make privacy reform a priority. The modern economy will depend on the value of data to enable innovation that recognizes the fundamental right to privacy. Should these values be protected in the law? Is the current law forcing organizations to be accountable and can Canadians rely on companies to manage their information?
1:30pm - 2:30pm • Salon C
Session 14 - Concurrent Panel C: Smart Cities: The New Modernization Strategy Banking on “Your Data”
The future modernization plans for cities to develop policies and the general digital transformation is on everyone’s agenda. Leveraging smart technology and innovation to engage residents and solve some of our city’s most pressing issues is at stake. A well-connected, sustainable city where people work, live and thrive in the new digital future is at stake.
The goal to transform cities into a modern, global city at the leading edge of innovation and technology with the creation of labs to test new tech in real-life, solve local innovation challenges and to bridge the gap between those that have access to technology and those who don’t is the plan.
Digital hubs to provide networking, connections to services, training, and tools in the mobile workplace, connected parks, free WiFi and main streets. Inter-modal transportation options bikes, cars, electric vehicles, and automated traffic management systems are the benefits.
Portals that connect the digital ecosystem with access to services and information and open data, GIS, and other smart city technology will be central to the success of smart cities?
So what is the cost? Your data and your privacy, are we ready to address these challenges?
2:30pm - 3:00pm • Bayshore Grand Ballroom Foyer / Salon D
Afternoon Break / Exhibit Booth Time
3:00pm - 3:30pm • Salon A
Session 15A - Concurrent Keynote Speaker by Varonis: Data First Security
According to our research, on average a user on their first day of employment has access to 17 million files. In terms of data, this is a huge blast radius, that if stolen or made inaccessible can be catastrophic to an organization. In this presentation we will review the many footholds attackers and malicious insiders can leverage to get to your data, and more importantly, how to tackle this risk with a data security first approach.
3:00pm - 3:30pm • Salon B
Session 15B - Concurrent Keynote Speaker: Solving the Data Sharing Problem with Synthetic Data
Privacy enhancing technologies can enable organizations to derive tremendous benefits from the secondary use and disclosure of personal information. However, some traditional PETs are facing headwinds. Synthetic data is gaining rapid adoption as an innovative PET that can offer greater safeguards and provide high utility data. Global analysts predict this technology will reduce personal data collection and privacy breaches, help avoid privacy violation sanctions and ultimately result in better privacy. In this session, participants will see how machine learning models generate synthetic data. They’ll learn how the technology can be applied in practice and hear about an exciting project out of Alberta involving the creation of a synthetic dataset mirroring a provincial health-care system that is being used to answer important public health questions.
3:00pm - 3:30pm • Salon C
Session 15C - Concurrent Keynote Speaker by Proofpoint: Insider Threats in Today’s Cybersecurity Landscape
Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. With the continued shift to hybrid working, organizations are racing to rethink their security programs to both guard from external attacks as well as manage risk from insiders. Modern approaches to insider threat management must evolve to respond to the rising threat. Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations.
Join us for a live discussion about insider threat management and how best to defend your organization to mitigate an insider incident. We’ll be discussing:
-Latest insider threat trends
-Best practices for building an insider threat program
-The role of integrated technologies to mitigate insider risk
3:40pm - 4:20pm • Bayshore Grand Ballroom
Session 16 - Closing Keynote Address by IBM: Keeping Pace: Adapting to the Convergence in Technology, The Remote Workplace and Global Threats
Reflecting on the prevalent themes of the conference, it’s clear that there is an underlying theme to move towards proactive preparation for the evolving threats we all face. This proactive stance may take shape through building a privacy program, preparing for ransomware, adopting a zero trust architecture, stepping up education or through a variety of other initiatives. While this approach is sound and will greatly enhance our collective security posture, many organizations are struggling to keep pace in meeting these ambitious security goals. In my closing comments, I will to discuss these pressures and present some thoughts on things we can do better to meet the various pressures and adopt the proactive security and privacy programs.
The 2nd Annual Vancouver International Privacy & Security Summit is proudly sponsored by the following companies.
If you would like to sponsor this event, please download the Sponsorship Brochure for more information.
Title Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Summit Sponsors & Marketing Partners
Sector Day Sponsors
Westin Bayshore Hotel - Vancouver, BC
If you are attending the in-person experience at the 2nd Annual Vancouver International Privacy & Security Summit and need to make a hotel reservation we have a room block at the Westin Bayshore Hotel with room rates starting at $195. The room block ends February 14th. To book a room within this room block please click here.
With lush and serene Stanley Park at its doorstep, water lapping the Coal Harbour Shores, snow-capped North Shore mountains in sight, and the vibrant city centre just around the corner, The Westin Bayshore, Vancouver is in perfect balance with its breathtaking surroundings. An elegant base from which to explore Vancouver, this resort-style property is a hub for well-being, whether travelling for leisure or business. A variety of year-round signature wellness programs promote feeling your best, while premier food and beverage offerings recharge the body and mind. Over 71,000 sq. ft. of flexible meeting space, one of Western Canada’s largest hotel ballrooms, and customizable catering options make this iconic hotel an ideal destination for conferences and social events. The Westin Bayshore, Vancouver is your gateway to inspired revitalization.

Call for Speakers
-
Please note that the call for speakers is now closed.
The Advisory Board for the 2nd Annual Vancouver International Privacy and Security Summit is pleased to announce that the Call for Speakers is now closed and we are reviewing all of the submissions.
Subject matter experts working within the privacy and information security communities are invited to submit papers on their area of expertise. Of particular interest are briefs on cutting-edge subjects and themes suitable for presentation in either a panel session or keynote address. This three-day conference draws an international audience focused on policy, programs, law, research and technologies aimed at the protection of privacy and security.
Date: March 9-11th, 2022
Location: Westin Bayshore Hotel, Vancouver, British Columbia2022 Summit – Suggested Panel Topics:
- Artificial Intelligence in Healthcare
- Blockchain & Crypto Currencies
- Digital Health & Innovation in Healthcare
- Digital ID
- Global Privacy Accord
- Hybrid Workplace
- Internet of Everything
- The Metaverse
- Ransomware
- Smart Cities
- State Sponsored Terrorism
Deadline:
All entries must be received by midnight of December 3, 2021. Invited speakers will be notified by December 17, 2021.
Submissions:
Submissions will be accepted electronically using the form below.
Have Questions or Need More Information?
- For conference content, themes and agenda questions, please contact: christine@rebootcommunications.com
- For venue and conference administration questions, please contact: Reboot Communications Ltd. at 1-250-388-6060, or logistics@rebootcommunications.com
- For sponsorship questions, please contact Reboot Communications Ltd. at 1-250-388-6060 or sponsorshipinfo@rebootcommunications.com
- Submissions will only be accepted electronically
Recommended Books
Please find below a list of recommended books that we suggest you check out (all written by various speakers from our events).
Title: BREACHED! Why Data Security Law Fails and How to Improve It
Author: Daniel J. Solove & Woodrow Hartzog
Description: A novel account of how the law contributes to the insecurity of our data and a bold way to rethink it.
Digital connections permeate our lives and so do data breaches. It is alarming how difficult it is to create rules for securing our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security, argue that the law fails because, ironically, it focuses too much on the breach itself.
Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through a different approach to data security rules. Current law is counterproductive. It pummels organizations that have suffered a breach but doesn’t address the many other actors that contribute to the problem: software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more.
Title: Intelligence as Democratic Statecraft
Author: Christian Leuprecht and Hayley McNorton
Description: Accountability and Governance of Civil-Intelligence Relations Across the Five Eyes Security Community – the United States, United Kingdom, Canada, Australia, and New Zealand.
Each country chapter surveys the member organizations of the intelligence community, the strategic environment that informed their historical and current development, the national security priorities from the vantage point of each country, and the concomitant intelligence accountability architecture.
Title: Gray Day
Author: Eric O’Neill
Description: My Undercover Mission to Expose America’s First Cyber Spy
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy.
Eric O’Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI’s top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear secrets, compromising intelligence, and betraying US assets. With zero training in face-to-face investigation, Eric found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies–and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a disturbing fondness for handguns. In the months that follow, Eric’s self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches Eric the game of spycraft. Eric will just have to learn to outplay his teacher if he wants to win.