Vancouver International Privacy & Security Summit May 5-7, 2021, Vancouver, BC

General Information

This first annual summit will be a digital-first experience on our customized virtual platform with an immersive look and feel that will engage our delegates from start to finish. We will deliver our virtual summit from a professional studio with a full production team and made for TV quality presentations. The summit will offer a platform for over 1000 security and privacy professionals from around the world to discuss important issues on how we securely live, work, and play as the move to digital platforms accelerates.

Presented by Reboot Communications in partnership with ISACA Vancouver, this three-day summit will provide essential education, training and opportunities for CPD credits for individuals who are responsible for the transformation of the public and private sector into the new digital economy.

Reasons to Attend

  • Timely, motivational presentations from leading industry experts
  • Learn about current trends, issues and actions
  • Valuable CPD credits to maintain a variety of qualifications essential for your career
  • Unparalled networking opportunities
  • Informative pre-conference educational sessions and many compelling panel sessions
  • Get immediate answers and solutions to issues current in your organization

Conference Rates

Early Bird virtual registration by March 5, 2021 Regular virtual registration after March 5, 2021
Public Sector $300 (plus GST) $350 (plus GST)
Private Sector $300 (plus GST) $350 (plus GST)

Registration Fees Include

  • All keynotes and panel sessions
  • Pre-conference educational sessions
  • Access to virtual exhibition booths
  • Access to virtual platform
  • On-line access to presentations post-event

Social Media

Stay connected and engaged in the conversation leading up to and during the conference by following along on Twitter. Use the event hashtag to follow others who are already posting, and include it in your tweets to add to the existing discussions. The hashtag for this year’s summit is #VIPSS21 and our twitter handle is @VIPSSummit. We would appreciate you sharing your voice with our other followers.

Keynote Speakers

Brenda Bailey

Parliamentary Secretary for Technology and Innovation, Legislative Assembly of BC

Dr. Ann Cavoukian

Former Privacy Commissioner; Executive Director, Global Privacy & Security by Design Centre

Vinton Cerf

Vice President and Chief Internet Evangelist, Google

Robert Falzon

Head of Engineering, Office of the CTO, Check Point

Roy Hart

Chief Information Officer, BCIT

Tanya Janca

CEO & Founder, WeHackPurple

Scott Jones

Head, Canadian Centre for Cyber Security

Chris Keaton

Privacy Consultant, OneTrust

Dave Lewis

Global Advisory CISO, Duo Security, Cisco

Kevin Lonergan

Senior Strategy Manager, TELUS Security

Derek Manky

Chief, Security Insights & Global Threat Alliances, Fortinet FortiGuard Labs

Adam Meyers

Senior Vice President, Intelligence, CrowdStrike

Dan Pontefract

Founder and CEO, Pontefract Group; Author & Speaker

Antoine Saikaley

Technical Director, Trend Micro

Simon Wong

Associate Partner, Consulting Services, Cybersecurity, EY


Michael Argast

Co-founder & CEO, Kobalt

Augusto Barros

VP of Solutions, Securonix

Ryan Berger

Partner, Lawson Lundell LLP

Clarence Chio

Artificial Intelligence & Security Specialist

Dr. Jeremy Clark

Associate Professor and Chair in Blockchain Technologies, Concordia University

Leo de Sousa

Director of Enterprise Technology, City of Vancouver

Colin Druhan

Executive Director, Pride at Work Canada

Justin Fox

Director of Software Engineering, NuData Security, A Mastercard Company

Dr. Robert Fraser

President and CEO, Molecular You

Bob Gordon

Executive Director, Canadian Cyber Threat Exchange (CCTX)

Vanessa Henri

Lawyer, Fasken

John Jacobson

Former Deputy Minister, Ministry of Technology, Innovation and Citizens’ Services

Soyean Kim

Director of Digital Products, Providence Health Care

Dr. Alena Kottova

Sessional Professor, Faculty of Engineering, University of Victoria

Bob Krzysik

Field CTO, Varonis

Kirk LaPointe

Publisher and Editor-in-Chief, Business in Vancouver Media Group

Dr. Victoria Lemieux

Chief Information Security Officer, Molecular You; Cluster Lead, Blockchain@UBC

Christian Leuprecht

Class of 1965 Professor in Leadership, Royal Military College and Queen’s University

Dr. Holly Longstaff

Director, Privacy and Access, PHSA Research and New Initiatives, Provincial Health Services Authority

Dr. Alan Low

Clinical Associate Professor, Faculty of Pharmaceutical Sciences, UBC; Executive Director, Medicines Access Coalition – BC; Primary Care Pharmacist and Pharmacy Lead, BioPro Biologics Pharmacy

Dr. David Lyon

Director, Surveillance Studies Centre, Queen's University

Eve Maler

Chief Technology Officer, ForgeRock

Angela Marafino

COO, WoSEC International

Florian Martin-Bariteau

Associate Professor and University Research Chair in Technology and Society, University of Ottawa

Derek May

Account Executive, Technology & Cyber Specialist, HUB International

Catherine Mendonsa

CISO, Director Information Systems Security & Enterprise Architecture, Finning

Keith Metcalfe

CEO, Traction Guest

Alyssa Miller

Business Information Security Officer, S&P Global

Edward Pereira

Principal Consultant, Carmel Info-Risk Consulting

Ruth Promislow

Partner, Bennett Jones LLP

Dr. Teresa Scassa

Canada Research Chair in Information Law and Policy, University of Ottawa

Mark Schaan

Associate Assistant Deputy Minister for Strategy and Innovation, Department of Innovation, Science and Economic Development (ISED)

Winn Schwartau

Chief Visionary Officer, SAC Labs (A division of KnowBe4)

Steve Simpson

Former Commissioner BC & Yukon,CRTC

David Skillicorn

Professor, School of Computing, Queen’s University

Kimberley St. Pierre

Director of Strategic Accounts, Tanium

Jo Stewart-Rattray

Director of Technology & Security Assurance, BRM Advisory

Dr. Kelly Sundberg

Associate Professor, Mount Royal University

Ellen Sundra

SVP Global Systems Engineering and Enablement, Forescout

Bill Tam

Co-founder & Chief Operating Officer, Digital Technology Supercluster

Dr. Rob Tanguay

Clinical Assistant Professor, Department of Psychiatry, University of Calgary; Chief Medical Officer, The Newly Institute

Jody Vance

Broadcaster and Columnist
Print Agenda

*Invited Speaker

Wednesday, May 5, 2021

8:45am - 4:45pm PST

Pre-Summit Educational Workshops

All sessions listed on Wednesday, May 5 are included in your full summit delegate pass.

8:45am - 10:15am PST

LGBTQ+ Professionals and Students in Security and Privacy

8:45am - 10:15am PST

BCIT presents: Industrial Systems Have Cybersecurity Needs Too!

In this session we will attempt to answer the question of why IT cybersecurity training has not resulted in adequate protection of industrial systems. After a short review of some recent industrial cyberattacks and the tactics, techniques and procedures used by threat actors to gain access and compromise industrial system, we will then review IT cybersecurity training and some of its shortcomings. Finally we will present the new BCIT Industrial Cybersecurity Program and its associated lab and why this program will help industry with their Cybersecurity needs.

10:15am - 10:25am PST

Canadian Cyber Defence Challenge Update

10:25am - 10:45am PST

Morning Break

10:45am-11:45am PST

Girl Guides of Canada present:

10:45am-12:15pm PST

Fortinet presents:

12:15pm-12:30pm PST

Canadian Cyber Defence Challenge Update

1:15pm-2:45pm PST

Cyber Law & Cyber Insurance

1:15pm-2:45pm PST

Tanium presents:

2:45pm-2:55pm PST

Canadian Cyber Defence Challenge Update

2:55pm-3:15pm PST

Afternoon Break

3:15pm-4:45pm PST

Application Security Session

Thursday, May 6, 2021

8:15am-8:20am PST

Call to Conference

8:20am-8:40am PST

Welcome Remarks

8:40am-9:20am PST

Session 1 - Keynote Address

9:20am-10:00am PST

Session 2 - Keynote Address

10:00am-10:30am PST

Morning Break / Exhibit Booth Time

10:30am-11:30am PST

Session 3 - Panel A: Building Canada into a Digital World – Interacting with Digital Consumers and Citizens

To create a digital Canada it's essential to build trust and prioritise "engagement and education" with communities. When we talk about the concept of trust, we really have to put ourselves as best as we can into the context of the people whom we want to build this trust with. identity management is a core component to building a solid foundation for a socioeconomic safety net.

As digital transformation accelerates, we must solve the challenges we face today while preparing for an abundance of future opportunities. At the heart of that effort is the commitment to building trust and data stewardship into our AI development projects and organizations.

10:30am-11:30am PST

Session 3 - Panel B: Smart Cities: The New Modernization Strategy Banking on “Your Data”

The future modernization plans for cities to develop policies and the general digital transformation is on everyone’s agenda. Leveraging smart technology and innovation to engage residents and solve some of our city’s most pressing issues is at stake. A well-connected, sustainable city where people work live and thrive in the new digital future is at stake.

The goal to transform cities into a modern, global city at the leading edge of innovation and technology with the creation of labs to test new tech in real-life, solve local innovation challenges and to bridge the gap between those that have access to technology and those who don’t is the plan.

Digital hubs to provide networking, connections to services, training, and tools in the mobile workplace, connected parks, free WiFi and main streets. Inter-modal transportation options bikes, cars, electronic vehicles, and automated traffic management systems are the benefits.

Portals that connect the digital ecosystem with access to services and information and open data, GIS, and other smart city technology will be central to the success of smart cities?

So what is the cost? Your data and your privacy, are we ready to address these challenges?

11:35am-12:05pm PST

Session 4 - Concurrent Keynote Address by TELUS: Zero Trust: How Canadian Organizations are Rethinking Their Approach to Cyber Security

Traditional security perimeters are disappearing. With more employees working remotely and a growing use of cloud services that operate outside the network, organizations are having to rethink strategies for protecting themselves and their data. Join TELUS’ Sr. Strategy Manager, Kevin Lonergan, as he discusses how Canadian organizations are using the Zero Trust framework to secure their networks and employees and where to begin when planning and implementing a Zero Trust strategy for your organization.

11:35am-12:05pm PST

Session 4 - Concurrent Keynote Address by Cisco: Security Debt, Running with Scissors

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Part of the problem is that, while organizations might accept the risks they encounter, they often neglect to review them or make a plan for the future, and that risk is compounded when patches are passed from person-to-person through staff changes and/or employee churn. However, it doesn’t have to be this way - to track and address security debt, organizations must develop and implement defined, repeatable processes. They should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person.
Key Points:
• Security debt occurs when patches are pushed aside, and risks are accepted but not addressed
• The longer organizations wait to address risks, the harder it is to address them
• To eliminate debt, organizations should create defined and repeatable processes with plans for action

11:35am-12:05pm PST

Session 4 - Concurrent Keynote Address by CrowdStrike: Supply Chain Attacks Are Gaining Traction: What To Do About It?

The threat of supply chain compromise represents a particularly nefarious issue for defenders, as it involves the compromise of a trusted third party through which the threat actor then subsequently compromises additional victims. To complicate things even more, the subsequent victims of these supply chain attacks are often unaware that they are being (or have been) attacked due to the trusted nature of the relationship between the 3rd party victim and the supplier.

This intelligence brief will discuss CrowdStrike’s most current understanding of supply chain threats, associated infrastructure and capabilities, and what organizations can do to defend themselves in the face of these advanced attacks.

12:05pm-1:10pm PST

Lunch Break (Please visit the exhibit booths)

1:10pm-1:50pm PST

Session 5 - Keynote Address by Tanium

1:55pm-2:25pm PST

Session 6 - Concurrent Keynote Address by Check Point: IoT and the new ab·normal

IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!

1:55pm-2:25pm PST

Session 6 - Concurrent Keynote Address by EY: How Your Cybersecurity will be Permanently Transformed by Shifts in Global Privacy

The next three years in cybersecurity will be vastly different than our current state. Join Simon Wong, leader of EY’s cybersecurity practice in B.C., as he shares how the changing privacy expectations of the global citizen will affect security practices of all organizations. Security teams must evolve to deliver new capabilities, implement new tools and reinvent existing ones, regardless of their organization’s size or sector. Throughout this keynote session, attendees will get a glimpse into how their organizational roles will change to build a better working world.

1:55pm-2:25pm PST

Session 6 - Concurrent Keynote Address by TBD

2:25pm-2:55pm PST

Afternoon Break / Exhibit Booth Time

2:55pm-3:55pm PST

Session 7 - Panel A: Banking on the Future: How the Digital Surge Will Reshape How We Do Business

The shift from physical to digital payments has been dramatic as the rise of cashless transactions worldwide has risen to levels not expected in two or five years. Conventional banks now account for only 72% of the total market value of the global banking and payments industry. The acceleration of digitisation is most visible in payments. The digital rush offers a new business model from banks, e-commerce sites, fintechs, social networks, taxi apps and telecom firms all vying to become the next platform.

Cybersecurity has quickly become one of the most important issues of our time. As a leading organization in cybersecurity entrusted to keep our clients’ data safe and secure, RBC is proud to support the Cybersecure Policy Exchange and its ambitious policy agenda. Questions of privacy and security are paramount for all Canadians and policymakers, and proper governance of these issues will ultimately contribute to a more prosperous and equitable world.

2:55pm-3:55pm PST

Session 7 - Panel B: Creating a Cyber Resilient Organization – The Conversation with the Board of Directors

COVID-19 has forever transformed the way we run business. Now more than ever, cybersecurity and cyber-resiliency are critical for market survival. Understanding which technologies will have the most significant impact and success in your organization is critical. The next step is the conversation with your Board of Directors or Executive Management Team. You will need to demonstrate clear ownership of the risk and your command of the top from both a technology and an overall business perspective. CIO Survey indicates there is a large gap between technology leaders and Executive Management. Can you gain the trust and confidence of your Board to enable and empower your organization from cyber attack and create resiliency from a cyber attack?

2:55pm-3:55pm PST

Session 7 - Panel C: Managing Identity & Security in the Cloud – Lessons Learned from Digital Health

Healthcare providers are creating their own branded “digital front door” that provides efficient, personalized user experiences through SMS, web, phone, video, apps, and other channels. Consumers also are opting for time-saving real-time digital interactions. Healthcare and commercial organizations rightfully want to control and safeguard their patient and customer relationships and data in each method of digital engagement to build brand awareness, personalized interactions, and loyalty.

The healthcare industry has historically been slow to adopt new digital technologies. However, a host of market forces, rising costs, and new regulations are expanding the landscape for digital tools to manage care better, find new cures, and change healthcare business models entirely. Digital Health Insights is a data-driven research publication looking at how technology is changing the healthcare space, who the big players in the space are, new trends to look out for, and how incumbents across insurance, pharma, providers, and more are responding.

4:00pm-4:45pm PST

Session 8 - Keynote Address by BCIT: Privacy and Security in a Hyper-Connected World – The Future of Technology Enabled Environments

The British Columbia Institute of Technology is launching a Smart Campus Initiative to connect thousands of distributed IoT sensors that will be spread across multiple buildings and systems at the Burnaby Campus. This presentation will address the potential operational and academic benefits, the scope of the initiative, and early considerations for privacy and security. Topics covered will include digital twins, cloud services, digital identity, open data, IoT, and security. The BCIT Smart Campus Initiative will also create many new opportunities for collaboration with industry and future-proof applied education through agile learning, digital transformation management and our continued Partnership in Provincial Resilience.

4:45pm-5:00pm PST

Day 1 Closing Remarks

Friday, May 7, 2021

8:45am-8:55am PST

Administrative Announcements

8:55am-9:05am PST

Day 2 Opening Remarks

9:05am-9:40am PST

Keynote Address

9:40am-10:20am PST

Keynote Address by Fortinet: The Disruptive Shift in Existing and Emerging Threats

Threat intelligence from the second half of 2020, and the first few months of 2021, demonstrates an unprecedented cyber threat landscape where cyber adversaries maximized the constantly expanding attack surface to scale threat efforts around the world. Adversaries proved to be highly adaptable, creating waves of disruptive and sophisticated attacks. They targeted the abundance of remote workers or learners outside the traditional network, but also showed renewed agility in attempts to target digital supply chains and even the core network.

Join Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet’s FortiGuard Labs for this Keynote presentation that will examine the evolution of these attacks, their impact on cybersecurity resources that are already stretched thin and strategies to leverage threat intelligence to defend against disruptive threat vectors.

10:20am-10:50am PST

Morning Break / Exhibit Booth Time

10:50am-11:50am PST

Session 11 - Panel A: Trust, Ethics and the Future of Artificial Intelligence Machine Learning (AI-ML)

At the heart of digital transformation is the commitment to building trust and data stewardship into our AI development projects and organizations.

Even as a nascent technology AI is incredibly complex and powerful, delivering benefits by performing computations and detecting patterns in huge data sets with speed and efficiency. But that power, combined with “black box” perceptions of AI and its appetite for user data, introduces a lot of variables, unknowns, and possible unintended consequences. Hidden within practical applications of AI is the fact that trust can have a profound effect on the user’s perception of the system, as well as the associated companies, vendors, and brands that bring these applications to market.

Advancements such as ubiquitous cloud and edge computational power make AI more capable and effective while making it easier and faster to build and deploy applications. Historically, the focus has been on software development and user-experience design. But it’s no longer a case of simply designing a system that solves for x. It is our responsibility to create an engaging, personalized, frictionless, and trustworthy experience for each user.

Responsible data stewardship establishes a chain of trust that extends from consumers to the companies collecting user data and those of us building AI-powered systems. It’s our responsibility to know and understand privacy laws and policies and consider security and compliance during the primary design phase. We must have a deep understanding of how the data is used and who has access to it. We also need to detect and eliminate hidden biases in the data through comprehensive testing.

Every AI vendor and developer not only needs to be aware of the inherently sensitive nature of user data but also of the need to operate with high ethical standards to build and maintain the required chain of trust.

10:50am-11:50am PST

Session 11 - Panel B: The New Digital Normal - Doing Business Remotely and Securely

COVID has accelerated and in some cases mandated that organizations and government work from home. The shift may rival workplace transformations in the 19th and 20th centuries. The rapid shift to work at home enabled preconditions. Broadband services allow for document downloads and videoconferencing and remote work seems both normal and acceptable. Major challenges lie ahead. Are we prepared to provide the security and privacy in the work at home environment?

Organizations of all sizes, from all industries, rely heavily on cloud computing to operate. The massive shift to remote work during the COVID-19 pandemic has only increased this reliance. In fact, a sector built around fables of industry "disruption" has enabled many to maintain constancy, connection, and business continuity–and afford some enterprises new opportunities.

How can advances in computing power, networking, AI and devices help businesses, governments, and citizens thrive in a world that has been disrupted?

10:50am-11:50am PST

Session 11 - Panel C: State Sponsored Threats: A Case Study for the SolarWinds Security Breach

Microsoft calls the SolarWinds hack as ‘the largest and most sophisticated attack' ever. There have been large-scale breaches before. Why is the SolarWinds cybersecurity attack getting so much attention?

Cyberattacks are entering a new era of lethal impact when state sponsored threat actors can hack into a software supply chain of a company such as SolarWinds and infect binary code to mimick legitimate protocol traffic and avoid detection. SolarWind's Orion system is used by more than 33,000 customers in both government and industry.

To gain greater insights into the SolarWinds breach, join this panel as we explore its implications on cybersecurity strategy in the future and what steps enterprises need to take today.

11:55am-12:25pm PST

Session 12 - Concurrent Keynote Address by Google

11:55am-12:25pm PST

Session 12 - Concurrent Keynote Address by OneTrust: Building a Global Privacy Program for CCPA, GDRP, LGPD and the World’s Privacy Laws

The GDPR changed the way people and businesses think about privacy. With its extraterritorial scope and high noncompliance fines, it forced companies to implement ongoing, operational and privacy-focused initiatives by design into their businesses, changing the way companies interact with customers, employees and vendors. Since its enforcement date, the regulation has been a catalyst for new data protection laws across the globe: including groundbreaking new regulations in California, Brazil, India and others, meaning global businesses will need to reassess their privacy compliance across a growing matrix of regulatory requirements. In this session, we will discuss the current state of the global privacy environment and how companies can build programs that address the overarching requirements of various data protection laws.

11:55am-12:25pm PST

Session 12 - Concurrent Keynote Address - TBD

12:25pm-1:30pm PST

Lunch Break (Please visit the exhibit booths)

1:30-2:30pm PST

Session 13 - Panel A: Rise of Surveillance Capitalism

We have long used science and technology to categorize and differentiate people into hierarchies that, even today, determine who is able and unable, deserving and undeserving, legitimate and criminal. The scientific racism of old, facial recognition doesn’t simply identify threats; it creates them, and as such intensifies a dangerous digital moment. Facial-recognition systems tend to misidentify people of colour and women at higher rates than white people and men Invasive technologies such as facial recognition and electronic monitors reproduce and supersize racial inequality in an era of big data and offer few tangible metrics with which to measure effectiveness. These technologies are as destructive to democracy as they are discriminatory.

1:30-2:30pm PST

Session 13 - Panel B: Women in Cybersecurity & Privacy: Challenges, Successes & Opportunities

2:30pm-3:00pm PST

Afternoon Break / Exhibit Booth Time

3:00pm-3:30pm PST

Session 14 - Concurrent Keynote Address by Trend Micro: Cybersecurity in the C-suite and Boardroom

The link between cybersecurity and the business has led to an industry declaration that, “Cybersecurity is a boardroom issue.” This statement is true yet simplistic. Executives and corporate directors have a fiduciary responsibility to shareholders and/or owners, so they are ultimately responsible for everything that drives the business, including managing cyber-risk and safeguarding business-critical technology assets. That said, cybersecurity can be a highly technical discipline. This brings up a few questions: Do executives really understand cybersecurity and its role in the business? And as technology further dominates the business landscape, are they investing appropriately in cybersecurity and driving a cybersecurity culture throughout their organizations?

Join this session to explore the answers to these questions through survey results from over 300 business and IT professionals, and steps you can take to help make cybersecurity become a more prominent and standard topic within the boardroom.

3:00pm-3:30pm PST

Session 14 - Concurrent Keynote Address by WeHackPurple: Building Security Champions

With security teams being vastly outnumbered many organizations have responded to this challenge with different program scaling methods, including building security champions programs. Which leads us to questions; How does a security champions program work? How do you select your champions? And once you have them, what do you DO with them?

This session will teach you;
• How to attract the right people to your program
• What and how to train them
• How to engage them, and turn them into security advocates
• What do delegate and what NOT to delegate
• What to communicate, how often and to who
• How to motivate them
• How to build an AMAZING security champion program

Recipe for success; recruit, engage, teach, recognize, reward, don’t stop.

3:00pm-3:30pm PST

Session 14 - Concurrent Keynote Address - TBD

3:35pm-4:15pm PST

Session 15 - Closing Keynote Address: Leadership: Being Our Best in in the Age of Digital Transformation

There are only two kinds of leadership in this world: leading self and leading others. It’s that simple, only two. In the midst of a pandemic, times are complex. While the era of digital transformation is upon us, now, more than ever, how you conduct yourself as a leader might become the defining moment of your career.

When we understand the critical importance of crafting meaningful, respectful relationships among our colleagues, we’ve set ourselves up for success. But when those interactions are no longer always face-to-face—when digital becomes so much more prevalent in our workplaces—how can we ensure that those relationships will thrive?

The bottom line is we need to foster our relationships. We need to do better. All of it requires both reminders and new methods. In this virtual keynote delivered by 4-time TED speaker, 4-time author and leadership strategist, Dan Pontefract, you will leave with insights, stories and practical techniques on the key facets of a more collaborative and caring form of leadership. Indeed we must remind ourselves the importance of connecting and educating people through times of change.

4:15pm-4:25pm PST

Closing Remarks & Announcements

Title Sponsor

Founding Sponsor

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Media Partner

Summit Sponsors & Marketing Partners

Sector Day Sponsors