2nd Annual Vancouver International Privacy & Security Summit
Protecting our Data in the New Era of Digital Innovation
March 9-11, 2022, Vancouver, BC

General Information

Presenting the 2nd Annual Vancouver International Privacy & Security Summit – This global hybrid event is an integrated experience with two simultaneous components giving all virtual delegates and in-person delegates an all encompassing experience.

The summit will offer a platform for over 1000 security and privacy professionals from around the world to discuss important issues on how we securely live, work, and play as the move to digital platforms accelerates.

Presented by Reboot Communications in partnership with ISACA Vancouver, this three-day summit will provide essential education, training and opportunities for CPD credits for individuals who are responsible for the transformation of the public and private sector into the new digital economy.

The Digital-First Summit Virtual Experience & The Summit In-Person Experience
Designed to offer virtual delegates and in-person participants more. With enhanced integrations allowing virtual attendees to network with in-person participants. It is a place where you will experience engaging and interactive live streaming keynotes and panel sessions, networking activities, live streaming collaboration between virtual delegates and in-person participants, along with interactive virtual social spaces and building business relationships.

(All In-Person attendance and components are subject to provincial guidelines – Masks will need to be worn and we will be checking vaccine passports and photo ID)

Digital First Experience*

Early Bird
(until Jan.14th)
Regular
(after Jan.14th)
Virtual Registration $299.00 CAD (plus GST)
$350.00 CAD (plus GST)
Virtual Experience Registration Includes:
  • Signature keynotes and concurrent keynotes by international subject matter experts in privacy & security
  • Concurrent panel sessions + interactive live streaming Q & A
  • Pre-summit virtual sector day sessions on March 9th
  • Access to the customized virtual platform (content available on-demand for 30 days after the summit)
  • Access to the virtual exhibition hall
*If you are a post-secondary student please note we have 100 complimentary virtual tickets available, sponsored by ISACA Vancouver Chapter.

In-person Experience**

Early Bird
(until Jan.14th)
Regular
(after Jan.14th)
Public Sector Registration $499.00 CAD (plus GST)
$599.00 CAD (plus GST)
Private Sector Registration $749.00 CAD (plus GST)
$850.00 CAD (plus GST)
In-Person Experience Registration Includes:
(includes full virtual experience registration)
  • Join us live in Vancouver, B.C for our 2-day interactive in-person experience (March 10-11)
  • Collaborate with senior executives who are changing the privacy & security industry
  • Signature keynotes and concurrent keynotes by international subject matter experts in privacy & security
  • Concurrent panel sessions + interactive in-person Q & A
  • Unparalleled in-person networking via 1:1 meetings and small group conversations
  • Exhibit booths for our top tier sponsors
  • Lunch and coffee breaks
**Subject to provincial guidelines (if the in-person portion needs to be cancelled you will be given a virtual pass and refunded the difference).

Social Media

Stay connected and engaged in the conversation leading up to and during the summit by following along on Twitter @VIPSSummit. Use the event hashtag #VIPSS in your tweets to add to the existing discussions. We would appreciate you sharing your voice with our other followers.

www.vipss.ca

 

 

Keynote Speakers

Jim Balsillie

Chair, Council of Canadian Innovators; Founder, Centre for Digital Rights

Martin Belanger

Director. TELUS Cybersecurity

Jason Bero

Privacy, Risk & Compliance Officer, Microsoft Canada

Danny Connelly

CISO, Zscaler

Dylan DeAnda

Global Head Partner Technical Solution Engineering , Tanium

Steve Eccles

Regional CEO and Dean, Northeastern University Vancouver

Dr. Khaled El Emam

SVP and General Manager of Replica Analytics, an Aetion company, and Canada Research Chair in Medical AI

Dean Eurich

Professor, School of Public Health, University of Alberta

Robert Falzon

Head of Engineering, Office of the CTO, Check Point Software Technologies

Issam Hadj Laradji

Senior AI Research Scientist, ServiceNow

Sami Khoury

Head , Canadian Centre for Cyber Security

Yvette Lejins

Resident CISO, Proofpoint

Andrew Lemke

Partner - Security & Resilience, Kyndryl

Jason Maynard

Senior Multi-Domain Architect , Cisco

Michael McEvoy

Information and Privacy Commissioner for British Columbia

Eric O'Neill

National Security Strategist, VMware

MK Palmore

Director, Office of the CISO, Google Cloud

Myla Pilao

Director of Threat Research, Trend Micro

Nathan Roarty

Senior Advisory Solution Consultant, ServiceNow

Dr. Tom Roemer

Vice President Academics, BCIT

Rocky Savage

Cyber Security Evangelist, Varonis

Brad Stocking

Associate Partner Cloud and Infrastructure Security, IBM

Joe Sullivan

SVP, Chief Security Officer, Cloudflare

Sean Weiss

Systems Engineering Manager, Fortinet Canada

Speakers

Martin Abrams

Executive Director and Chief Strategist, Information Accountability Foundation

Monique Altman

Privacy Counsel, OneTrust

Brent J. Arnold

Partner, Data Breach Coach, Gowling WLG (Canada) LLP

Nikolas Badminton

Chief Futurist, futurist.com

Dr. Colin Bennett

Professor, Department of Political Science, University of Victoria

Chantal Bernier

National Privacy and Cybersecurity Practice Leader, Dentons Canada LLP

Joni Brennan

President, Digital ID & Authentication Council of Canada (DIACC)

Timothy Brown

Chief Information Security Officer, SolarWinds

Dan Caprio

Co-Founder and Chairman, The Providence Group

Abigail Carter-Langford

Chief Privacy & Security Officer, Executive Vice President - Governance, Risk & Compliance, Canada Health Infoway

Rob Davidson

Director of Security Services, CISO, Pacific Blue Cross

Leo de Sousa

Director of Enterprise Technology, City of Vancouver

Elizabeth Denham

Former UK Information Commissioner

Dr. Robert Fraser

President and CEO, Molecular You

Bob Gordon

Executive Director, Canadian Cyber Threat Exchange (CCTX)

Robin Gould-Soil

President, RGS Management Consulting Services; CPO, Pentavere

James Hursthouse

CEO & Founder, Departure Lounge Inc.

John Jacobson

Former Deputy Minister, Ministry of Technology, Innovation and Citizens’ Services

Keith Jansa

Executive Director, CIO Strategy Council

Max Jarvie

Senior Associate, Privacy and Data Protection, Borden Ladner Gervais LLP

Sunny Jassal

Director, Cyber Security, British Columbia Institute of Technology

Mani Keerthi Nagothu

Security Lead, Ballard Power Systems

Peter B. Kosmala

Faculty Instructor, York University

Dr. Alena Kottova

Sessional Professor, Faculty of Engineering, University of Victoria

Dr. Victoria Lemieux

Chief Information Security Officer, Molecular You; Cluster Lead, Blockchain@UBC

Christian Leuprecht

Class of 1965 Professor in Leadership, Royal Military College and Queen’s University

Kevin Lonergan

Senior Strategy Manager, TELUS Cybersecurity

Dr. Holly Longstaff

Director, Privacy and Access, PHSA Research and New Initiatives, Provincial Health Services Authority

Dr. Alan Low

Clinical Associate Professor, Faculty of Pharmaceutical Sciences, UBC; Exec. Director, MedAccess BC; Primary Care Pharmacist & Pharmacy Lead, BioPro Biologics Pharmacy

Derek Manky

Chief, Security Insights and Global Threat Alliances, FortiGuard Labs

Drew McArthur

Principal, The McArthur Consulting Group

Shawn McGuire

Chief Technology Officer - Resiliency, Kyndryl

Dr. Brenda McPhail

Director, Privacy, Surveillance, and Technology Program, Canadian Civil Liberties Association

Jennifer Miller

Director General, Marketplace Framework Policy, Innovation, Science and Economic Development Canada

Lance Morginn

President & Co-Founder, Blockchain Intelligence Group

Suzanne Morin

VP, Enterprise Conduct, Data Ethics & Chief Privacy Officer, Sun Life

Kharis O’Connell

Principal, Amazon

Dr. Douglas Olson

Chair, SAFE Design Council

Lauren Reid

President, The Privacy Pro

Dr. Teresa Scassa

Canada Research Chair in Information Law and Policy, University of Ottawa

Steve Simpson

Former CRTC Commissioner

Pam Simpson

Strategic Cyber Threat Intelligence Analyst, BMO Financial Group

Brad Stocking

Associate Partner Cloud and Infrastructure Security, IBM

Dr. Kelly Sundberg

Associate Professor, Mount Royal University

Ganesh Swami

CEO, Covalent

Shane Tews

President, Logan Circle Strategies; Nonresident Senior Fellow, American Enterprise Institute

Daniel Thanos

Vice President R&D, Arctic Wolf

Lena Trudeau

Chief Operating Officer, Fu Associates Ltd.

Kirsten Turnbull

Technical Specialist, Security & Compliance , Microsoft

Sybila Valdivieso

Executive Director, Information Access Privacy and Technology Development Office, Provincial Health Services Authority

Heather Vescent

President/Futurist, The Purple Tornado

Dominic Vogel

Chief Strategist, CyberSC

John Weigelt

National Technology Officer, Microsoft Canada

Robert Wong

Chair, Broader Public Sector (BPS) Cyber Security Expert Panel

John Wunderlich

Chair, Privacy Enhancing Mobile Credentials Work Group, Kantara Initiative

David Young

Principal, David Young Law
Print Agenda

*Invited Speaker

Click on the date of the agenda you would like to view. Please note the timezone listed on the agenda.

Wednesday, March 9, 2022 - Virtual Sessions Only

9:00am - 12:00pm Virtual Platform

Financial Services Sector Session* - Sponsored by PwC

More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22finance

*Please note this session will be a virtual only session accessed through the virtual platform

9:00am - 12:00pm Virtual Platform

Healthcare Sector Session* - Sponsored by Medigate

More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22health

*Please note this session will be a virtual only session accessed through the virtual platform

9:00am - 12:00pm Virtual Platform

Application Security Sector Session* - Sponsored by Contrast Security, FWDSEC & WEBSEC

More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22appsec

*Please note this session will be a virtual only session accessed through the virtual platform

1:00pm - 4:00pm Virtual Platform

Energy, Resources, and Mining Sector Sector Session* - Sponsored by iON and Nozomi

More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22energy

*Please note this session will be a virtual only session accessed through the virtual platform

1:00pm - 4:00pm Virtual Platform

Education Sector Session* - Sponsored by ISACA Vancouver Chapter

More details on the agenda for this sector can be found here - https://www.rebootcommunications.com/event/vipss22education

*Please note this session will be a virtual only session accessed through the virtual platform

1:00pm - 4:00pm Virtual Platform

Local Government Sector Session* - Sponsored by Municipal Finance Authority of BC

This session will be a private by invitation only session.

*Please note this session will be a virtual only session accessed through the virtual platform

Thursday, March 10, 2022

8:15am - 8:20am Bayshore Grand Ballroom

Call to Conference & Territorial Acknowledgement

8:20am - 8:40am Bayshore Grand Ballroom

Opening Keynote

8:40am - 9:20am Bayshore Grand Ballroom

Session 1 - Keynote Address: Privacy, Prosperity & Security in the Era of Surveillance Capitalism

9:20am - 10:00am Bayshore Grand Ballroom

Session 2 - Keynote Address by TELUS: Ransomware Realities, Impacts and Controls: An Introduction to the TELUS Canadian Ransomware Study

The increase in ransomware seen across the globe has fundamentally changed how organizations think about security. With cyber attacks becoming easier to perpetrate and threat actors casting an ever wider net, the new reality is that anyone can be a target. And Canadian organizations aren’t immune.

Join Martin Belanger, Director, TELUS Cybersecurity as he shares insights from the TELUS Canadian Ransomware Study. Based on the feedback of over 450+ Canadian organizations, this study shares some surprising realities about how ransomware is impacting organizations, which controls are most effective and how to best protect yourself.

10:00am - 10:30am Bayshore Grand Ballroom Foyer / Salon D

Morning Break / Exhibit Booth Time

10:30am - 11:30am Salon A

Session 3 - Concurrent Panel A: Web 3.0: Blockchain & Crypto Currencies and The Impact on Privacy & Security

We are at the tipping point of a new phase in the web’s evolution, where layers of technology like machine learning, artificial intelligence and blockchain are drastically improving what is possible online. Web 3.0 is the future of the internet. Offering a plethora of new opportunities, how will security and privacy be addressed as we accelerate the move to these new digital platforms?

10:30am - 11:30am Salon B

Session 3 - Concurrent Panel B: Global Privacy Accord International Data Flows

A global privacy accord to facilitate data flows would truly make everyone’s life easier. While Canada is adequate under the EU GDPR there are numerous other countries with adequacy requirements. Furthermore, countries are seeing data as national assets, and enacting data localization rules as a “privacy protection.” Elizabeth Denham, former UK ICO and BC Information Commissioner has led a G7 process to develop such an accord. Should we be optimistic, or are all the political and cultural impediments a barrier? Join this session to find out.

10:30am - 11:30am Salon C

Session 3 - Concurrent Panel C: The Internet of Everything: The Next Step in Government Data Tracking

Governments, businesses and data protection authorities around the world are trying to anticipate the possible impacts of the Internet of Things on society. International experts, thinkers and technology platforms are forecasting political, social and economic transformations; concerns about privacy and surveillance.

Profiling, tracking and targeting of individuals or groups by organizations are expected to become more nuanced, specific and accurate with the Internet of Things. If a device becomes linked to us in some way, it becomes a data point that can be tracked and mined for patterns in our behavior.

How does society benefit from the advancement of the Internet of Things while protecting our personal privacy and security as we live, work and play in the digital economy?

11:35am - 12:05pm Salon A

Session 4A - Concurrent Keynote Address by Trend Micro: Cybersecurity Fighting Back in 2022

In the coming year, amid a landscape still in flux, enterprises will push forward with their digital transformation and hybrid work endeavors. This period is brimming with possibilities not just for companies that want to drive progress but also for cybercriminals who want to cash in by launching attacks both old and new. We will tackle the various security issues that we believe will make an impact on the threat landscape of 2022, and recommend security best practices and solutions to keep organizations protected against ever-evolving attacks.

The main takeaways of attendees will include:

-Understand why there will be a surge in zero-day exploits, which will break 2021’s record. Enterprises will be on high alert for potential patch gaps as more vulnerabilities are expected to be unearthed.

-How Cloud attackers will both pivot and shift as they carry out tried-and-true attacks that will use new trends in technology and target DevOps tools and pipelines in cloud integrated development environments (IDEs).

-How global supply chains will be in the crosshairs of fourfold extortion techniques as companies evolve their supply chain operations. There will be a surge in supply chain attacks that will use the quadruple extortion model

11:35am - 12:05pm Salon B

Session 4B - Concurrent Keynote Address by Google: Public Cloud Adoption and Cybersecurity Risk Reduction

Providing competent and capability driven cybersecurity protection to the modern day enterprise has become increasingly difficult, if not impossible by today’s protection standards. Adopting a prominent public cloud posture can be a force multiplier for any security apparatus, if engaged properly. If the enterprise profile of the future is one composed largely of optimized hybrid environments, organizations need to weigh both value and the potential for risk reduction as they build roadmaps for the future.

11:35am - 12:05pm Salon C

Session 4C - Concurrent Keynote Address by VMware: Cybersecurity in the Age of Espionage

The cyber theft of private and confidential information from government agencies, business, and private individuals exceeded $6 trillion in 2021. The modern spy is responsible for these technologically advanced attacks targeting your data. Robert Hanssen was the first of these new cyber spies, charged with selling American secrets to Russia for more than US$1.4 million in cash and diamonds. His ability to exploit computer systems allowed him to protect his identity during a 22-year spy career. In this exciting and informative talk, Eric O’Neill uses real-life spy stories and a review of recent massive cyber-attacks to show how careful diligence, counter-espionage techniques, and zero trust can help identify the numerous spies, hackers, cyber criminals, and trusted insiders that threaten the data that is the currency of our lives.

12:05pm - 1:10pm Bayshore Grand Ballroom

Lunch Break (Please visit the exhibit booths)

1:10pm - 1:50pm Bayshore Grand Ballroom

Session 5 - Keynote Address by Fortinet: Creating a Cloud Hygiene Strategy of Excellence

Security remains the number one barrier to cloud adoption as cloud presents a unique set of challenges compared to traditional IT. These issues are further exasperated by requirements related to compliance, data sovereignty and privacy. In many ways, securing cloud is very similar to securing traditional IT. Concepts such risk governance, auditing, identifying and mitigating threats are equally as relevant. But in some fundamental aspects, the practice of securing the cloud is very different than the traditional on-prem network experience. Security in the cloud is a shared responsibility of varying degrees between consumer and provider. Jurisdictional issues over data ownership loom large. As organizations begin their digital transformational journey into the cloud, learn how Fortinet sees the cloud journey from a Canadian perspective.

2:00pm - 2:30pm Salon A

Session 6A - Concurrent Keynote Address by ServiceNow: How to use AI to fight back against sophisticated attacks in the wild – and win

A fireside chat with Issam Hadj Laradji, Sr. AI Research Scientist, and Nathan Roarty, Sr. Advisory Solution Consultant, on how artificial intelligence (AI) is changing how we think about cybersecurity and privacy. They will chat about how AI can help us identify risky behaviours, prevent adversarial attacks, understand bias, and how big data helps us analyze small data sets. Join our session to hear about what's hot in AI research and how AI can help us to stay safe and secure.

2:00pm - 2:30pm Salon B

Session 6B - Concurrent Keynote Address by Zscaler: A CISO’s Perspective on the Zero Trust Approach to Security

The cloud and remote work have removed traditional security boundaries. As a CISO, the responsibility rests squarely on your shoulders to prevent compromise, lateral movement of attacks, and data loss. A zero trust approach to your overall security, where you challenge everything and trust nothing, is your most powerful secret weapon.

Hear directly from, Danny Connelly, Chief Information Security Officer of Zscaler, and former Associate CISO for the Centre for Disease Control (CDC) in an interactive fireside chat. As a highly regarded thought leader and trusted cyber security advisor, Danny provided guidance and formulated strategies to combat emerging threats for various agencies across the federal government. During his 11-year tenure at the CDC, he designed, implemented and optimized enterprise cyber security capabilities to effectively detect, prevent and respond to emerging cyber security threats. Danny will provide a CISO’s perspective to Zero Trust and views and strategies on adapting to digital transformation while embracing the latest technologies and trends.

2:00pm - 2:30pm Salon C

Session 6C - Concurrent Keynote Address by Tanium: 5 Keys to Resolving Incidents Before They Happen

Successful defense requires understanding the posture of every device in your enterprise, it requires the ability to make decisions fast, and it requires the ability to execute on those decisions at enterprise scale. The IT security and operations teams that are consistently winning the battle against massive IT disruption have two things in common: 1) They have access to accurate device information in seconds, and 2) They have the ability to instantly affect change across every device they own, no matter where on Earth.

Learn the 5 most important questions that successful security and operations teams are able to answer in seconds, and by answering these questions they are able to resolve most security and operational incidents before they ever happen.

2:30pm - 2:55pm Bayshore Grand Ballroom Foyer / Salon D

Afternoon Break / Exhibit Booth Time

2:55pm - 3:55pm Salon A

Session 7 - Concurrent Panel A: The Dawn of Digital Health & Innovation in Healthcare: Protecting and Securing the Most Valuable Personal Information

McKinsey Global Institute estimates global digital-health revenues from telemedicine, online pharmacies, wearable devices will rise from $350bn last year to $600bn in 2024. 70% of hospitals and almost all physicians and pharmacies still use fax for prescriptions and transmitting patient records. Healthcare is beginning to embrace digital communication and analytics that have been common in other industries for years. As patients grow more comfortable with digital health, including remote and computer-assisted diagnosis and treatment, the concerns around privacy and security also increase. Regulators around the world recognize the need for digital health, health information sharing and analytics, but along with many other stakeholders, they are conservative in their approach even though we need healthcare to open up the silos. In this panel session we will discuss how we can protect and secure the most valuable of all personal information, while being able to leverage the data to improve the healthcare or people.

2:55pm - 3:55pm Salon B

Session 7 - Concurrent Panel B: The New Hybrid Workplace

COVID has accelerated and in some cases mandated that organizations and government work from home. The shift may rival workplace transformations in the 19th and 20th centuries. The rapid shift to work at home was enabled by preconditions. Broadband services allow for document downloads and videoconferencing and remote work seems both normal and acceptable. Major challenges lie ahead. Are we prepared to provide the security and privacy needed in the work at home environment?

Organizations of all sizes, from all industries, rely heavily on cloud computing to operate. The massive shift to remote work during the COVID-19 pandemic has only increased this reliance. In fact, a sector built around fables of industry "disruption" has enabled many to maintain constancy, connection, and business continuity–and afford some enterprises new opportunities.

How can advances in computing power, networking, AI and devices help businesses, governments, and citizens thrive in a world that has been disrupted?

2:55pm - 3:55pm Salon C

Session 7 - Concurrent Panel C: Digital ID: Ensuring Privacy and Security to Protect Canadians’ Personal Information in the New Digital Age

75% of Canadians feel it is important to have a secure and privacy enhancing digital ID. A majority of Canadians believe it is important for federal and provincial governments to move quickly on enabling digital ID in a safe and secure manner. The lack of standardization attributes to people and businesses not using the identity verification technology.

4:05pm - 4:50pm Bayshore Grand Ballroom

Session 8 - Keynote Address by BCIT/Northeastern University: Working in partnership towards educational leadership in the New Era of Digital innovation!

In the new era of digital innovation and lifelong learning, it has become more important than ever to provide educational opportunities with unlimited pathways for students to ensure they achieve their educational career goals. During this presentation will discuss the recent partnership MoU between the British Columbia Institute of Technology and Northeastern University – Vancouver, and demonstrate how educational partnerships like this can be used to advance research and innovation in British Columbia and, build stronger futureproof communities.

4:50pm - 5:00pm Bayshore Grand Ballroom

Day 1 Closing Remarks

5:00pm - 5:05pm Bayshore Grand Ballroom

Message from our Founding Sponsor

Friday, March 11, 2022

8:15am - 8:20am Bayshore Grand Ballroom

Administrative Announcements

8:20am - 8:50am Bayshore Grand Ballroom

Session 9 - Keynote Address: Law reform in the time of COVID-19

The COVID-19 pandemic has, undoubtedly, accelerated the pace of digital innovation. In this presentation, BC’s Information and Privacy Commissioner Michael McEvoy will share his views on the impact of that change on privacy management and regulation – and how it has underscored the need for meaningful reform of the province’s privacy legislation. Commissioner McEvoy will also share highlights from his office’s recent work, as well as the challenges, opportunities, and priorities for the OIPC in the coming year. A question and answer period will follow the presentation.

8:55am - 9:35am Bayshore Grand Ballroom

Session 10 - Keynote Address by Microsoft: Privacy, Risk, and Security Concerns in a Cloud First Era

58% of data breaches in 2020 involved personal data, and legislation across the globe are responding to such concerns, resulting in the data privacy regulation landscape that is more complex then ever. As an organization you are trying to meet multicloud compliance requirements across global, industrial and regional regulations and standards, while ensuring privacy remains central to your business to safe guard people and the tools they use to connect.

In this session we aim to simplify some of the complexity around data privacy, risk and security concerns in a cloud first era. Join us for a discussion on rrecognizing and adapting to a shared responsibility model for security and compliance when leveraging the cloud. You will leave the session with best practices and tips on risk mitigation and closing the security gaps that are applicable for your organization.

9:40am - 10:20am Bayshore Grand Ballroom

Session 11 - Keynote Address by Kyndryl: Cyber Resilience - A Higher Bar than Cyber Security

Cyber Resilience goes beyond conventional cyber security and emphasizes continuity and recovery, because eventually, attackers will penetrate our defenses no matter how good they are. A cyber resilient organization is one that is able to satisfy the core mission despite being attacked, and even despite being under advanced persistent threat. Could you continue to run your organization if a nation-state actor is in your network and cannot be removed?

10:20am - 10:50am Bayshore Grand Ballroom Foyer / Salon D

Morning Break / Exhibit Booth Time

10:50am - 11:50am Salon A

Session 12 - Concurrent Panel A: State Sponsored Threat Vectors: Accountability & Governance of Civil Intelligence Relations Across the Five Eyes Security Community

As cybersecurity threats have evolved to become the new frontline in conflicts between nations and cultures, it escalates the tension between elected and appointed civilians and the uniformed military when it comes to the formation of national security policy.

It is widely held that nations which develop a properly balanced pattern of civil-military relations have a great advantage in the search for security. Our panel will test this policy point-of-view and discuss key questions facing policy makers in the Five Eyes community:

-Is it imperative for member countries of the Five Eyes Security Community to reconcile democracy and security through transparent standards, guidelines and legal frameworks?
-Is accountability the best means to ensure integral democratic governance?
-Does accountability reassure sceptics that intelligence and security practices are indeed aligned with the rules and values that democracies claim to defend?

10:50am - 11:50am Salon B

Session 12 - Concurrent Panel B: The Metaverse: The Emperor's New Clothes?

The Metaverse - a super-platform weaving social media, online gaming, utilitarian data provision, and ease-of-life apps, all accessible through the same digital and physical space and bound together with economic and content mechanisms.

The global market for this new world is projected to be an $82B market by 2025 and many companies are lining up to be a part of creating this new world resulting in complexity and shiny visions of our new future.

The big promise is for this to be interoperable with connecting services so they can collect our data, track us, and demand our attention. It could be transcendent and empowering, or a broken web of complex data brokerages, incompatibility and uncoordinated experiences that drive us into a privacy and surveillance nightmare due to walled garden systems and mechanisms of monetization and control?

10:50am - 11:50am Salon C

Session 12 - Concurrent Panel C: Artificial Intelligence in Canadian Healthcare: Will the Law Protect us from Algorithmic Bias Resulting in Discrimination

Artificial Intelligence (AI) use in Canadian Healthcare is live and the Laws to govern AI are still evolving in Canada and around the world. AI is seen as a foundational component to drive innovation and has tremendous potential across the healthcare system – AI innovation can improve workflows, enhance diagnostics, accelerate research and refine treatment. Yet at the same time, new technology brings a myriad of risks and challenges depending on the use case being deployed in the healthcare systems. We will discuss a few of these challenges. Specifically, the panel will discuss how to avoid algorithmic bias and discrimination, whether laws around this topic will protect us, and until we have them, how can we implement these AI solutions in a safe, responsible and trustworthy way, so Canadian citizens can be free of unfair and discriminatory outcomes.

11:55am - 12:25pm Salon A

Session 13A - Concurrent Keynote Speaker by Check Point: Mobile Security – The Hackers Next Frontier

At the intersection between business and pleasure, mobile social applications access the most sensitive information about us and the world we live in. Hackers are focused on Mobile attacks now more than ever, as they represent the next frontier for security risk.

11:55am - 12:25pm Salon B

Session 13B - Concurrent Keynote Speaker by Cisco: Zero to Super Hero when it comes to Zero Trust

I think it is time that we talk about zero-trust and what it really means. Is it a product, is it marketing, is it a superhero, what is it really? If you ask your friends and colleagues to describe what zero trust means to them they will most likely provide a different perspective each time and in many cases they would not be wrong. We will cover off what zero-trust promises, what is it exactly (product, marketing, superhero), identify and overcome the complexities - 30 min power session!

11:55am - 12:25pm Salon C

Session 13C - Concurrent Keynote Speaker by Cloudflare: Ukraine Situation: Updates and Best Practices from the Front Lines at Cloudflare

With a global network of data centers blocking threats for customers across the planet, Cloudflare is uniquely positioned to see threat trends. During this session Cloudflare's CSO will share some of those challenges viewed through the cyber impact of the invasion of Ukraine and how we can all prepare better for what is coming next.

12:25pm - 1:30pm Bayshore Grand Ballroom

Lunch Break (Please visit the exhibit booths)

1:30pm - 2:30pm Salon A

Session 14 - Concurrent Panel A: Ransomware: Should the Public Sector be More Proactive on Ransomware?

A Case Study on the largest health data breach in Canada. Health & Community Services Newfoundland.
Ransomware is an increasingly common form of cyberattack and a majority of businesses and institutions are willing to pay the ransom rather than fight the invasion and loss of data. 70% of organizations paid the hackers financial demands. The most important protection is employee training. Governments must take a long look at how they allocated funding for cybersecurity especially when health dollars are stretched to the limits.

1:30pm - 2:30pm Salon B

Session 14 - Concurrent Panel B: Canadian Private Sector Privacy Law Reform: Federal and Provincial Initiatives and Their Interoperability

Canada’s Privacy Commissioner says the Canadian Government must make privacy reform a priority. The modern economy will depend on the value of data to enable innovation that recognizes the fundamental right to privacy. Should these values be protected in the law? Is the current law forcing organizations to be accountable and can Canadians rely on companies to manage their information?

1:30pm - 2:30pm Salon C

Session 14 - Concurrent Panel C: Smart Cities: The New Modernization Strategy Banking on “Your Data”

The future modernization plans for cities to develop policies and the general digital transformation is on everyone’s agenda. Leveraging smart technology and innovation to engage residents and solve some of our city’s most pressing issues is at stake. A well-connected, sustainable city where people work, live and thrive in the new digital future is at stake.

The goal to transform cities into a modern, global city at the leading edge of innovation and technology with the creation of labs to test new tech in real-life, solve local innovation challenges and to bridge the gap between those that have access to technology and those who don’t is the plan.

Digital hubs to provide networking, connections to services, training, and tools in the mobile workplace, connected parks, free WiFi and main streets. Inter-modal transportation options bikes, cars, electric vehicles, and automated traffic management systems are the benefits.

Portals that connect the digital ecosystem with access to services and information and open data, GIS, and other smart city technology will be central to the success of smart cities?

So what is the cost? Your data and your privacy, are we ready to address these challenges?

2:30pm - 3:00pm Bayshore Grand Ballroom Foyer / Salon D

Afternoon Break / Exhibit Booth Time

3:00pm - 3:30pm Salon A

Session 15A - Concurrent Keynote Speaker by Varonis: Data First Security

According to our research, on average a user on their first day of employment has access to 17 million files. In terms of data, this is a huge blast radius, that if stolen or made inaccessible can be catastrophic to an organization. In this presentation we will review the many footholds attackers and malicious insiders can leverage to get to your data, and more importantly, how to tackle this risk with a data security first approach.

3:00pm - 3:30pm Salon B

Session 15B - Concurrent Keynote Speaker: Solving the Data Sharing Problem with Synthetic Data

Privacy enhancing technologies can enable organizations to derive tremendous benefits from the secondary use and disclosure of personal information. However, some traditional PETs are facing headwinds. Synthetic data is gaining rapid adoption as an innovative PET that can offer greater safeguards and provide high utility data. Global analysts predict this technology will reduce personal data collection and privacy breaches, help avoid privacy violation sanctions and ultimately result in better privacy. In this session, participants will see how machine learning models generate synthetic data. They’ll learn how the technology can be applied in practice and hear about an exciting project out of Alberta involving the creation of a synthetic dataset mirroring a provincial health-care system that is being used to answer important public health questions.

3:00pm - 3:30pm Salon C

Session 15C - Concurrent Keynote Speaker by Proofpoint: Insider Threats in Today’s Cybersecurity Landscape

Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. With the continued shift to hybrid working, organizations are racing to rethink their security programs to both guard from external attacks as well as manage risk from insiders. Modern approaches to insider threat management must evolve to respond to the rising threat. Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations.

Join us for a live discussion about insider threat management and how best to defend your organization to mitigate an insider incident. We’ll be discussing:

-Latest insider threat trends
-Best practices for building an insider threat program
-The role of integrated technologies to mitigate insider risk

3:40pm - 4:20pm Bayshore Grand Ballroom

Session 16 - Closing Keynote Address by IBM: Keeping Pace: Adapting to the Convergence in Technology, The Remote Workplace and Global Threats

Reflecting on the prevalent themes of the conference, it’s clear that there is an underlying theme to move towards proactive preparation for the evolving threats we all face. This proactive stance may take shape through building a privacy program, preparing for ransomware, adopting a zero trust architecture, stepping up education or through a variety of other initiatives. While this approach is sound and will greatly enhance our collective security posture, many organizations are struggling to keep pace in meeting these ambitious security goals. In my closing comments, I will to discuss these pressures and present some thoughts on things we can do better to meet the various pressures and adopt the proactive security and privacy programs.

4:20pm - 4:30pm Bayshore Grand Ballroom

Closing Remarks & Announcements

Title Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Summit Sponsors & Marketing Partners

Sector Day Sponsors

Westin Bayshore Hotel - Vancouver, BC

If you are attending the in-person experience at the 2nd Annual Vancouver International Privacy & Security Summit and need to make a hotel reservation we have a room block at the Westin Bayshore Hotel with room rates starting at $195. The room block ends February 14th. To book a room within this room block please click here.

With lush and serene Stanley Park at its doorstep, water lapping the Coal Harbour Shores, snow-capped North Shore mountains in sight, and the vibrant city centre just around the corner, The Westin Bayshore, Vancouver is in perfect balance with its breathtaking surroundings. An elegant base from which to explore Vancouver, this resort-style property is a hub for well-being, whether travelling for leisure or business. A variety of year-round signature wellness programs promote feeling your best, while premier food and beverage offerings recharge the body and mind. Over 71,000 sq. ft. of flexible meeting space, one of Western Canada’s largest hotel ballrooms, and customizable catering options make this iconic hotel an ideal destination for conferences and social events. The Westin Bayshore, Vancouver is your gateway to inspired revitalization.

Call for Speakers

  • Please note that the call for speakers is now closed.

    The Advisory Board for the 2nd Annual Vancouver International Privacy and Security Summit is pleased to announce that the Call for Speakers is now closed and we are reviewing all of the submissions.

    Subject matter experts working within the privacy and information security communities are invited to submit papers on their area of expertise. Of particular interest are briefs on cutting-edge subjects and themes suitable for presentation in either a panel session or keynote address. This three-day conference draws an international audience focused on policy, programs, law, research and technologies aimed at the protection of privacy and security.

    Date: March 9-11th, 2022
    Location: Westin Bayshore Hotel, Vancouver, British Columbia

    2022 Summit – Suggested Panel Topics:

    • Artificial Intelligence in Healthcare
    • Blockchain & Crypto Currencies
    • Digital Health & Innovation in Healthcare
    • Digital ID
    • Global Privacy Accord
    • Hybrid Workplace
    • Internet of Everything
    • The Metaverse
    • Ransomware
    • Smart Cities
    • State Sponsored Terrorism

    Deadline:

    All entries must be received by midnight of December 3, 2021. Invited speakers will be notified by December 17, 2021.

    Submissions:

    Submissions will be accepted electronically using the form below.

    Have Questions or Need More Information?

Recommended Books

Please find below a list of recommended books that we suggest you check out (all written by various speakers from our events).

Title:  BREACHED! Why Data Security Law Fails and How to Improve It
Author:  Daniel J. Solove & Woodrow Hartzog
Description:  A novel account of how the law contributes to the insecurity of our data and a bold way to rethink it.

Digital connections permeate our lives and so do data breaches. It is alarming how difficult it is to create rules for securing our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security, argue that the law fails because, ironically, it focuses too much on the breach itself.

Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through a different approach to data security rules. Current law is counterproductive. It pummels organizations that have suffered a breach but doesn’t address the many other actors that contribute to the problem: software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more.

Order Here

Title:  Intelligence as Democratic Statecraft
Author:  Christian Leuprecht and Hayley McNorton
Description:  Accountability and Governance of Civil-Intelligence Relations Across the Five Eyes Security Community – the United States, United Kingdom, Canada, Australia, and New Zealand.

Each country chapter surveys the member organizations of the intelligence community, the strategic environment that informed their historical and current development, the national security priorities from the vantage point of each country, and the concomitant intelligence accountability architecture.

Order Here

Title:  Gray Day
Author:  Eric O’Neill
Description:  My Undercover Mission to Expose America’s First Cyber Spy

A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy.

Eric O’Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI’s top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear secrets, compromising intelligence, and betraying US assets. With zero training in face-to-face investigation, Eric found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies–and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a disturbing fondness for handguns. In the months that follow, Eric’s self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches Eric the game of spycraft. Eric will just have to learn to outplay his teacher if he wants to win.

Order Here