26th Annual Vancouver International Privacy & Security Summit
Guarding Privacy, Fortifying Security: Navigating the AI Frontier
March 6-8, 2024, Vancouver, BC

General Information

Presenting the 26th Annual Vancouver International Privacy & Security Summit at the Westin Bayshore Hotel.  This fully in-person summit will offer a platform for up to 750 security and privacy professionals from around the world to discuss important issues on how we securely live, work, and play as the move to digital platforms accelerates.

Presented by Reboot Communications in partnership with ISACA Vancouver, this three-day summit will provide valuable education and training opportunities for individuals who are responsible for the transformation of the public and private sector into the new digital economy.

Embark on a transformative intellectual journey on “Guarding Privacy, Fortifying Security: Navigating the AI Frontier“, where visionaries, experts, and innovators convene to dissect the intricate intersection of cutting-edge artificial intelligence and the critical imperatives of preserving privacy and enhancing security. Through riveting keynote sessions, interactive workshops, and collaborative panels, this event promises to unravel the complexities, challenges, and opportunities that define our digital age. Join us in charting a course toward a harmonious future where AI advancements coalesce with unwavering commitments to individual rights, data sovereignty, and technological trust.

CPD/CPE Credits

We are proud to announce that delegates within local government and professionals in the industry can obtain CPD/CPE credits through our accreditation with:

🛡️The BC Law Society
🛡️ISACA Vancouver
🛡️Chartered Professional Accountants of Canada

We acknowledge that gaining approval to attend training conferences can be challenging. As support in your continued privacy and security education, please click here for a sample Justification letter you can customize to build your case in attending. Once you click on the link, select “File” in the upper left corner, and download to edit.

Registration Information

Early Bird Rates (until December 31st)

Public Sector Private Sector
VIPSS  3-Day Pass
(Westin Bayshore Vancouver)
$575.00 CAD (plus GST) $875.00 CAD (plus GST)

Standard Rates (starting January 1st)

Public Sector Private Sector
VIPSS 3-Day Pass
(Westin Bayshore Vancouver)
$695.00 CAD (plus GST) $995.00 CAD (plus GST)

Registration Includes*:

  • Join us live in Vancouver, B.C for our 3-day summit (March 6-8, 2024) – includes the pre-summit educational workshop day on March 6th (no lunch served this day).
  • Collaborate with senior executives who are changing the privacy & security industry
  • Signature keynotes and concurrent keynotes by international subject matter experts in privacy & security
  • Concurrent panel sessions + interactive in-person Q & A
  • Unparalleled in-person networking via 1:1 meetings and small group conversations
  • Exhibit booths for our top tier sponsors
  • Lunch (March 7 & 8th) and coffee breaks (March 6-8th)
*Subject to provincial guidelines (masks are currently optional).

Social Media

Stay connected and engaged in the conversation leading up to and during the summit by following along on X (Twitter) @VIPSSummit. Use the event hashtag #VIPSS in your tweets to add to the existing discussions. We would appreciate you sharing your voice with our other followers.




Keynote Speakers

Hansang Bae

VP, Public Sector CTO, Zscaler

Dr. Manfred Boudreaux-Dehmer

Chief Information Officer and Chief Information Security Officer, NATO

Andy Cheng

Enterprise Territory Manager, Tenable

Honourable George Chow

Minister, Ministry of Citizens' Services, Province of BC

Dr. Kate Crawford

Author, Atlas of AI; Research Professor, USC Annenberg

Scott Deluke

Senior Sales Engineer Manager, Abnormal Security

Philippe Dufresne

Privacy Commissioner of Canada

Sean Falconer

Head of Developer Relations and Marketing, Skyflow

Katherine Fick

Associate General Counsel, Privacy and AI Worldwide, IBM

Christopher Fielder

Field CTO, Arctic Wolf

Derek Keen

Senior Security Engineer, Rubrik

Mani Keerthi Nagothu

Americas Field CISO, SentinelOne

Saqib Khan

Field CIO, Strategic Partnerships, Tanium

Sami Khoury

Head , Canadian Centre for Cyber Security

Karl Klaessig

Director of Product Marketing, Security Operations, ServiceNow

Aaron Koning

Sales Engineer, Varonis

Alex MacLennan

Assistant Deputy Minister and CTO, OCIO-Enterprise Services, Ministry of Citizens’ Services, Province of BC

Robert May

Executive Vice President, Technology and Product Management, Fortinet

Jason Maynard

Field CTO, Cybersecurity, Cisco Canada

Michael McEvoy

Information and Privacy Commissioner for British Columbia

Rob Rachwald

Director, Product Cross-Portfolio, Palo Alto Networks

Ben Radcliff

Senior Director - SecOps, Optiv

Sean Roche

Director, National Security, Amazon Web Services (AWS) International Public Sector

Parul Sharma

Solutions Engineer, Cloudflare

Ben Shelston

Director, Solution Engineer, Netskope Canada

Wayne Silberman

Field Director, Cohesity Canada

Elizabeth Smith

Senior Data Protection and Customer Solutions Expert, DPOrganizer

Phil Tecklenburg

Security Solutions Architect, iON

Mark Teolis

Director and Incident Commander, TELUS Cybersecurity


Martin Abrams

Emeritus Chief Policy Innovation Officer and Founder, Information Accountability Foundation

Dr. Ewan Affleck

Senior Medical Advisor - Health Informatics, College of Physicians & Surgeons of Alberta

Melanie Anderson

Director General, Secure Solutions and Services, Canadian Centre for Cyber Security

Robin Andruss

Chief Privacy Officer, Skyflow

Brent J. Arnold

Partner, Data Breach Coach, Gowling WLG (Canada) LLP

Corey Ball

Author of Hacking API’s; Senior Manager - Penetration Testing, Moss Adams

Adrian Beaudin

Principal Solutions Architect, Elastic

Dr. Colin Bennett

Emeritus Professor, Department of Political Science, University of Victoria

Erik Berg

Partner, Cyber Security and Privacy Consulting, KPMG

Chris Boland

Consulting Systems Expert, Fortinet

Dr. Manfred Boudreaux-Dehmer

Chief Information Officer and Chief Information Security Officer, NATO

Mary Carmichael

Enterprise Risk Management Consultant; Vice President, ISACA Vancouver Chapter

Dr. Gregory Carpenter

Chief Security Officer, KnowledgeBridge International

Calvin Chrustie

Senior Partner, The Critical Risk Team

Mike Coss

Data Governance Director, PHSA

Ray Cotten

Principal Solutions Architect, Elastic

William "Chip" Crane

Cybersecurity Executive Advisor, IBM Security North America

Rob Davidson

Director of Security Services, CISO, Pacific Blue Cross

Paul F. Davis

President, WhoKnozMe

Elizabeth Denham

Chief Policy Strategist, Information Accountability Foundation

Michael Doucet

Executive Director, Office of the CISO, Optiv

Barbara Eccles

General Counsel, University of Victoria

Richard Fadden

Senior Advisor, Capital Hill Group; Former National Security Advisor to the Prime Minister

Claire Feltrin

Lawyer, Data Privacy & Cybersecurity Group, Deloitte Legal Canada LLP

Michelle Finneran Dennedy

CEO, PrivacyCode

Dr. Robert Fraser

President and CEO, Molecular You

Dr. Benjamin Fung

Canada Research Chair & Professor, School of Information Studies, McGill University

Aarti Gadhia

Board Advisor, WiCyS Western Canada Affiliate; Principal Security Specialist, Microsoft

Bob Gordon

Strategic Advisor, Canadian Cyber Threat Exchange (CCTX)

Robin Gould-Soil

President, RGS Management Consulting Services; CPO, Pentavere

Anthony Green

Manager, Security Operations and Compliance, Chartered Professional Accountants of British Columbia

Beth Hartwell

Enterprise Account Executive, Canada West, Abnormal Security

Alicia Hatt

CEO, DPOrganizer

Anthony Hémond

Senior Privacy Counsel, Air Canada

Vanessa Henri

Co-founder, Henri & Wolf ; Cybersecurity & Data Governance Lawyer

Peter Holowka

Director of Education Technology, West Point Grey Academy

Octavia Howell

Chief Information Security Officer, Equifax Canada; Founder & CEO, Augustus Redefined

John Jacobson

Former Deputy Minister, Ministry of Technology, Innovation and Citizens’ Services

Steve Johnston

VP, Enterprise Solutions, Mark Anthony Group

Dr. Loki Jorgenson

Senior Director, Strategy and Innovation, Circle Innovation

Antti Keinaenen

Cloud Security Architect, Province of BC

Patricia Kosseim

Information and Privacy Commissioner of Ontario

Dr. Victoria Lemieux

Professor of Archival Science & Founder, Blockchain@UBC

Brian Lenahan

Founder & Chair, Quantum Strategy Institute

Christian Leuprecht

Class of 1965 Professor in Leadership, Royal Military College and Queen’s University

Lawrence Lewis

CEO & Founder, OneFeather

Jay Loder

Privacy Officer, FortisBC

Alex Loffler

Certified Ethical Hacker & Licensed Penetration Tester; Principal Security Architect, Province of BC

Penny Longman

Director, Information Security and Data Stewardship, Fraser Health

Justin Malczewski

Regional Sales Manager, Canada West, Netskope

Amanda Maltby

General Manager, Compliance and Chief Privacy Officer, Canada Post Corporation

Derek Manky

Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

Jason Maynard

Field CTO, Cybersecurity, Cisco Canada

Drew McArthur

Principal, The McArthur Consulting Group

Tim McCreight

VP Business Development Canada, Apollo Information Systems; ASIS President

Craig McLellan

Founder & CEO, ThinkOn

Dr. Brenda McPhail

Director, Privacy, Surveillance, and Technology Program, Canadian Civil Liberties Association

Paul Meyer

Adjunct Professor, International Studies and Fellow in International Security, Simon Fraser University

Harsh Modi

Director of Offensive Security, Cyber Ensure Ltd.

Suzanne Morin

VP, Enterprise Conduct, Data Ethics & Chief Privacy Officer, Sun Life

Dr. Florian Neukart

Chief Product Officer, Terra Quantum

Bill Ohlson

Principal Executive Security Advisor, Amazon Web Services (AWS)

René Ouellette

Director General, Academic Outreach & Stakeholder Engagement, Canadian Security Intelligence Service

Edward Pereira

Principal Consultant, Carmel Info-Risk Consulting

Jennifer Quaid

Executive Director ,Canadian Cyber Threat Exchange (CCTX)

Michael Redding

Chief Technology Officer, Quantropi

Sherry Rumbolt

Senior Cybersecurity Strategic Advisor, Government of Canada- Shared Services Canada

Lia Sana

Senior Information Security Architect, Fraser Health Authority

Dr. Teresa Scassa

Canada Research Chair in Information Law and Policy, University of Ottawa

Parul Sharma

Solutions Engineer, Cloudflare

Dr. May Siksik

CEO, The Canadian Innovation Network

Jeevan Singh

Director of Security Engineering, Rippling

Pam Snively

Chief Data & Trust Officer, TELUS

Emily Soward

Tech Lead, AI/ML & Generative AI Security & Privacy, Amazon Web Services (AWS)

Steven Tam

Partner, INQ Law

Jories Timmers

Cybersecurity Director, Powerex Corp.

Oskar Trpisovsky

Senior Manager, Privacy, Regulatory & Information Management, KPMG

Jeannette Van Den Bulk

Deputy Commissioner, Policy, Adjudication, and Audit, Office of the Information and Privacy Commissioner for British Columbia

Sruthi veena Lakshmanan

Information Security Architect, Fraser Health Authority

Vivek Verma

Chief Security Officer, eHealth Saskatchewan

Shari Wallace

CIO, Greater Vancouver Realtors

Wesley Wineberg

Bug Bounty Hunter

Kevin Wong

Founder, Dedi Corp.
Print Agenda

*Invited Speaker

Click on the date of the agenda you would like to view. Please note the timezone listed on the agenda.

Wednesday, March 6, 2024


Registration Opens

9:00am – 10:30am Salon ABC Presentation Files Workshop 1A Slides

Concurrent Workshop 1A by Fortinet: The Journey to Zero Trust – A Deep Dive on Single-Vendor SASE

In this technically focused workshop, we will examine the key elements for a single-vendor SASE architecture - Secure SD-WAN, Zero Trust Network Access, Cloud Access Security Broker, Firewall-as-a-Service and Secure Web Gateway. Taking time to explore the security outcomes and user experience we will deep dive into how a single-vendor SASE solution allows you to deliver consistent remote user and on-premises security without compromising on the architectural flexibility of how you deliver security services for users and devices.

With technical demos and pseudo-whiteboarding, this session aims to provide you with a practical take on how SASE can evolve and augment your network security posture.

Presentation Files Workshop 1A Slides

9:00am – 10:30am Salon EF Presentation Files Workshop 1B Slides

Concurrent Workshop 1B: Data Privacy for Sensitive Data and Generative AI

Preserving the privacy of sensitive data is a top priority for any business. But protecting sensitive data and easing compliance without sacrificing data usability requires sophisticated solutions. The compliance landscape is increasingly complex, with an ever-growing number of distinct privacy regulations being considered (such as Canada’s Bill C-27) or passed into law, including Quebec’s Law 25, or the EU’s GDPR. Privacy regulations often impose data residency requirements that restrict where sensitive data can be stored and processed, creating complex data requirements for global businesses. At the same time, businesses are eager to harness the power of generative AI large language models (LLMs) like ChatGPT but are wary of the dangers LLMs can pose to data privacy.

Your company can’t afford to ignore the promise of entering new markets, or compliance requirements in current markets. And, you can’t afford to fall behind your competitors by not using LLMs. But the stakes are high. You need deep expertise to implement effective data privacy, and the consequences of a mistake are massive: eye-popping fines for regulatory non-compliance, or even a data breach that can damage your brand and undermine customer trust. The solution lies in leveraging the expertise of privacy experts with a data privacy vault.

Presentation Files Workshop 1B Slides

9:00am – 10:30am Salon D Presentation Files Workshop 1C Slides

Concurrent Workshop 1C: Build your own Security Awareness Program

In this workshop, participants will assess their Security Awareness Program needs and be walked through the process of creating a year-long program for their organisation. Using templates, examples, checklists, demos, hands-on activities, and discussion with peers and experts, they will develop a workplan based on their required cadence (weekly, monthly, etc) with relevant topics mapped against relevant channels (newsletter, blog, webinar, training module, etc). Frameworks for developing articles and newsletters will be offered, and best practices around various channels will be discussed and evaluated. Participants will also be exposed to a variety of free and paid tools that support a robust Security Awareness program to help them choose the best fit for their environment.

This workshop will be best suited to those starting a Security Awareness program or wanting to map out a plan for future maturity of an early-stage program, and will be relevant for organisations of all sizes. Participants will leave with an actionable plan.

Presentation Files Workshop 1C Slides

10:30am – 10:45am

Morning Coffee Break - Sponsored by Mimecast

10:45am – 12:15pm Salon ABC Presentation Files Workshop 2A Slides

Concurrent Workshop 2A: A Practical Model for Personal Information Sovereignty

Picture a transformative era for Canada—a time when First Nations, Indigenous Peoples, and every citizen has their personal health records at their beck and call. Spearheading this movement is OneFeather, a BC First Nations technology company, joining forces with Collaborative Solutions. Together, we're crafting a nexus of cutting-edge technology, personal agency, and comprehensive health records. Marrying CS4’s LifeLine services with OneFeather's revolutionary indigenous digital credentialing (IdS), we're not merely charting a course in tech evolution; we're championing empowerment, autonomy, and the health trajectory for Indigenous Canadians.The barrier to achieving health literacy has been how to create a trusted paradigm for access and sharing of health insights. We will be introducing the underlying legal and data governance framework for this can be structured as a data trust (Trust). The Trust supports prudent and responsible data stewardship through establishing a consistent set of rules and practices for the management of data from multiple data-stakeholders in a manner ensuring privacy, security and ethical use, while streamlining reliable access and guaranteeing information sovereignty.

Presentation Files Workshop 2A Slides

10:45am – 12:15pm Salon EF Presentation Files Workshop 2B Slides

Concurrent Workshop 2B by IBM: Unleash Your Data Security Excellence

With the emergence of GenAI and the increased focus around IT modernization, organizations are managing far more data complexity than ever before (larger data volume, increasing compliance and greater accuracy). This continues to be the challenge while also maintaining to keep the client data secure and resilient. How do you tackle these challenges? What is the first step to take?

Join us as we conduct our premier Security Risk Framing Workshop where attendees will learn:

-What is a framing workshop and how can you leverage it to drive strategic security conversation for your organization.
-How to perform a data security posture review to identify blind spots and prioritized areas of improvement.

This highly interactive workshop is aimed at IT practitioners and business leaders who are interested in working through active challenges in their organizations.

Presentation Files Workshop 2B Slides

10:45am – 12:15pm Salon D Presentation Files Workhop 2C Slides

Concurrent Workshop 2C by KPMG: The Business Case for Privacy by Design: ISO 31700 Use Cases

Privacy by Design is based on the principle that any action that an organization undertakes which involves processing personal data, must be done with data protection and privacy in mind at every step. The concept was established in 1995 in Canada and now has been adopted internationally both in legislation and in standards of practice, including under the GDPR and within Canada under Quebec’s Law 25. This means that organizations must consider privacy and data protection concerns when designing and building products and services, rather than retroactively implementing these features after the products and services are in use.

In assessing an organization for certification, the provider applies an Assessment Control Framework which maps internationally recognized privacy principles, regulations, and industry best practices.

This session will present a case study of the Privacy by Design certification under the new ISO 31700-1 Standard - Privacy by Design for consumer goods and services. The case study will set out the methodology applied by the certification provider in issuing its report including the criteria applied under its Assessment Control Framework, evaluation of the assessment findings for the subject organization, recommendations for addressing deficiencies, and execution of steps required to achieve certification.

Presentation Files Workhop 2C Slides

12:15pm – 1:30pm

Lunch Break (on your own - no lunch provided today)

1:30pm – 3:00pm Salon ABC

Concurrent Workshop 3A: Protecting the Blueprint of Life: The Importance of Information Security at the Molecular Level

This presentation discusses the need for information security (INFOSEC) at the molecular level to protect our genetic information in light of the increasing use of gene editing technologies such as CRISPR/Cas9. The proliferation of these technologies, coupled with crippling ransomware attacks, has raised fears about the security and loss of integrity of genetic data. Research has demonstrated that we are on the verge of having the internet run through our bodies and that we will soon be another end device in the larger world of IOT. Consider the consequences of a malicious actor launching a biocyber attack that executed a DDOS of your brain or another vital organ. It is imperative to immediately implement INFOSEC at the molecular level to protect individual privacy, thwart off malicious actors, and help prevent errors and accidental mutations in genetic data that could result in false diagnoses or incorrect treatment plans, potentially risking patients' lives.

1:30pm – 3:00pm Salon EF

Concurrent Workshop 3B by Cisco: Architecting Cybersecurity: Building a Resilient Defensive Architecture

Get ready to turbocharge your cybersecurity defenses! Dive into our high-energy workshop where we'll forge an ironclad strategy leveraging the mighty MITRE ATT&CK framework. This isn't just a theoretical exercise; it's a battle plan tailored for your specific adversaries. We will showcase and craft a 1,3, and 5-year action plan, synchronizing with your executive team's vision and directly targeting your organization's unique threats and risks.

This workshop is more than just talk—it’s about visualizing victory. With our storyboard approach, you won't just hear about the organizational needs; you'll see them come to life, painting a powerful picture for stakeholders. Join us in this session to help shape the future of your enterprise’s security while leaving the enemy in the dust. The battleground awaits; will you answer the call?

1:30pm – 3:00pm Salon D Presentation Files Workshop 3C Slides Workshop 3C Slides Part2

Concurrent Workshop 3C by MFABC: Tools to Support: BC’s Defensible Security Framework and CyberBC Initiative

First published in 2017 by the Province of BC, Defensible Security is one way for organizations to mature their existing security capability in an iterative, pragmatic way. The program provides direction, tools, and templates for establishing and improving any organization’s security plan.

CyberBC is an initiative to improve information security posture for BC’s Broader Public Sector (BPS) organizations. Goals of this initiative include ensuring security guidance is accessible and available to the BPS organizations, providing training and support with regards to implementation of security policies and procedures and providing opportunities for collaborative cost savings and economies of scale for our BPS partners.

Cybersecurity has never been as imperative as it is today, and no organization globally is immune to attack. It is more critical than ever to have a well-established security program that guides investment of finite resources and helps ensure risk is mitigated to an acceptable level. Join us for an information session that demonstrates Province’s commitment to “raising the water level” of security in BC.

The Municipal Finance Authority of BC (MFABC) was created in 1970 to fund the long-term, infrastructure borrowing needs of BC’s Local Governments – Regional Districts and Municipalities. MFABC subsequently added short-term financing and investment options for our clients to create a financial institution that is unique in Canada and is an integral part of BC’s Local Government system. Our mandate has three pillars: lending, investments, and support for local government events and education that facilitate risk mitigation in finance and other areas such as cybersecurity. MFABC has also used the Province of BC’s Defensible Security Framework to inform its own cybersecurity activities and is encouraged to see these new Provincial initiatives being developed and made available to our client communities.

Presentation Files Workshop 3C Slides Workshop 3C Slides Part2

3:00pm – 3:15pm

Afternoon Refreshment Break - Sponsored by Mimecast

3:15pm – 4:45pm Salon ABC

Concurrent Workshop 4A by Amazon Web Services: Securing Generative AI in the Cloud: An AI, ML, & Generative AI Deep Dive

Delve into the intricate realm of generative AI security in this comprehensive workshop. Learn cutting-edge techniques and defenses to safeguard your AI models and data against evolving cyber threats in cloud environments. Deep dive with AWS experts on AI software development lifecycle (SDLC), threat modeling, assurance, validation, incident response (IR), and resiliency for artificial intelligence, machine learning, and generative AI workloads.

3:15pm – 4:45pm Salon EF Presentation Files Workshop 4B Slides

Concurrent Workshop 4B by Elastic: Save Time with AI and ML in Security Operations with Elastic Security

Generative AI, risk management, and machine learning are game changers for protecting your organization. Learn how to adapt to ensure your organization's data is protected and secure with advanced entity analytics.

Presentation Files Workshop 4B Slides

3:15pm – 4:45pm Salon D Presentation Files Workshop 4C Slides

Concurrent Workshop 4C by ISACA: Ethics, Risks, and AI: Crafting the Governance Framework

This presentation zeroes in on the critical dilemma facing our industry: how to harness the rewards of AI innovation while mitigating the risks of misuse and ethical pitfalls. Discover how AI governance and risk management frameworks emerge as key solutions, providing a blueprint for ethical, safe, and effective AI deployment in technology sectors. Gain insights into implementing these governance strategies using various case studies that will safeguard your projects, propelling your organization forward in an AI-driven future.

Presentation Files Workshop 4C Slides

Thursday, March 7, 2024

8:15am – 8:25am Bayshore Ballroom

Call to Conference & Territorial Acknowledgement

8:25am – 8:40am Bayshore Ballroom

Opening Remarks (via video)

8:40am – 9:20am Bayshore Ballroom

Session 1 - Fireside Chat: Power, Politics and Planetary Costs - the 3Ps of AI

Leading AI Scholar Prof. Kate Crawford will be in conversation with Suzanne Morin to discuss the impacts of generative AI and key themes and arguments from her work. Her award-winning book "Atlas of AI" as well as her project "Anatomy of an AI System" have helped policymakers, technologists, privacy, ethics, and security experts, and the public better understand the complex issues surrounding AI. They will discuss the new challenges AI poses for data ethics, privacy, and security, and what reforms are needed to better protect individuals and society from potential harms. Attendees will have the opportunity to ask questions following the discussion.

9:20am – 10:05am Bayshore Ballroom

Session 2 - Keynote Address by Fortinet: Cybersecurity, everywhere you need it.

10:05am – 10:30am Bayshore Foyer

Morning Coffee Break - Sponsored by Varonis

10:30am – 11:30am Salon ABC

Session 3A - Concurrent Panel: AI Data Is Regulated – Outcomes Are Next

Privacy regulators, including those in Canada, have been crystal clear that the data used for generating algorithms are covered by privacy and data security laws. These laws cover the input for AI and machine learning. What comes next are laws that will specially require that AI outcomes are fair and just. Whether in Bill C 27, or a successor, rules and regulations are coming. And they will be compared to the new executive order in the U.S., and the European AI Act. This panel will forecast both the future of enforcement, the nature of new laws, and the impacts on AI implementation in both the public and private sectors.

10:30am – 11:30am Salon EF

Session 3B - Concurrent Panel: Quantum Computing - Security Implications in 2024

In a thought-provoking conference panel discussion, experts will delve into the realm of quantum computing, shedding light on its distinctions from classical computing and exploring its impact on businesses and cybersecurity. Quantum computing's unique properties, and its potential for tackling complex problems that are beyond classical computers' capabilities will inspire business leaders towards approaching innovation in the context of security. The panel will explore the growing interest and investments from the business community in harnessing the potential of quantum technologies vis-à-vis protection mechanisms or potential threats. Addressing practical considerations, the panel will discuss where quantum computing fits within today's IT budgets and whether Chief Information Officers (CIOs) are taking notice. As well, the panel will address raising awareness of the transformative potential of quantum technologies, highlighting real-world use cases, and demonstrating the competitive advantages they offer today and in the future as key drivers to gain attention and commitment from top-level executives.

10:30am – 11:30am Salon D

Session 3C - Concurrent Panel: How Artificial Intelligence Gives Cybercriminals an Edge

We’re witnessing the next generation of work – the age of AI. The technological advancements seen to date bring the promise of greater advancements in healthcare, social sciences, electronics, and production capabilities (to name a few). But what about the other side of AI?

What we see as amazing advances, are also being seen to lower the barrier for entry into cyber crime. We’ve seen this throughout the last 40 years of rapid change in technology – the criminals see an advantage and exploit it far faster than we can keep up.

Are we going to stay behind, or try to catch up? How can we secure AI, or is that battle already lost?

11:35am – 12:05pm Salon ABC Presentation Files Session 4A Slides

Session 4A - Concurrent Keynote by DPOrganizer: Beyond the Legislation: Putting the Letter ‘C’ into your Privacy Management Programme

In this session Liz will explain that there is more to complying with privacy legislation than knowing the law. Liz will explain how the letter C is crucial to creating a compliant company.

Presentation Files Session 4A Slides

11:35am – 12:05pm Salon EF Presentation Files Session 4B Slides

Session 4B - Concurrent Keynote by TELUS: Continuing to Adapt: Navigating the Evolving Threat of Ransomware

Join Mark Teolis, Director of TELUS Cyber Resilience and Incident Command, as he shares insights on the changes TELUS is tracking to the threat landscape with a particular focus on ransomware. Mark will discuss details about how the tactics, techniques and procedures employed by threat actors have evolved over the last 12 months and how TELUS has adapted their defense strategies to combat them.

One of the key themes of this presentation is the importance of modern defense-in-depth, and how a multi-layered security approach is now more crucial than ever in countering evolving attacks. Attendees can expect to gain valuable insights into practical measures they can implement to increase their cyber resilience, drawing from TELUS' experiences and lessons learned.

Presentation Files Session 4B Slides

11:35am – 12:05pm Salon D

Session 4C - Concurrent Keynote by Netskope/Abnormal Security: Good AI vs. Bad AI: How GenAI is Changing Cybersecurity

The rapid rise of generative AI, prompted by the release of ChatGPT, has security leaders concerned. By using this new technology, threat actors can now create highly effective attacks at scale, and few things are more vulnerable than your cloud applications and mailboxes.

12:05pm – 1:05pm Bayshore Foyer

Lunch Break - Sponsored by CrowdStrike/Proofpoint

1:05pm – 1:35pm Salon ABC Presentation Files Session 5A Slides

Session 5A - Concurrent Keynote by Cloudflare: Internet Threat Radar - The Current Cyber Threat Landscape

Cloudflare operates one of the world’s largest networks which protects ~20% of all Internet applications from attack. Join us to learn about the recent attack trends Cloudflare sees across DDoS, API Attacks, Application Attacks and more. In the session you will not only learn about recent trends, but also patterns and tactics that can be used to protect your business from them.

Presentation Files Session 5A Slides

1:05pm – 1:35pm Salon EF Presentation Files Session 5B Slides

Session 5B - Concurrent Keynote by Rubrik: Cybersecurity Spotlight: Resilience Strategies to Keep Your Organization Out of the News Amidst a Cyberattack!

In this session, you’ll learn five mandatory cyber resiliency requirements to ensure your organization can recover from an attack before the news breaks.Hacker’s aren’t waiting, so why are you?

Presentation Files Session 5B Slides

1:05pm – 1:35pm Salon D Presentation Files Session 5C Slides

Session 5C - Concurrent Keynote by iON/Tenable: Proactively Discover Your Vulnerabilities Across All Attack Surfaces

As the digital landscape evolves, so do the threats facing organizations of all sizes. The expanding attack surface coupled with increasingly sophisticated threats necessitates a comprehensive approach to cybersecurity. However, fragmented toolsets often hinder rather than aid in identifying and mitigating vulnerabilities, leaving organizations vulnerable to breaches.

Discover how iON and Tenable’s partnership empowers organizations in navigating the complex threat landscape by proactively discovering and mitigating vulnerabilities across all attack surfaces. We help organizations stay ahead of threats, mitigate risks effectively, and maintain competitiveness in today's dynamic digital ecosystem.

Presentation Files Session 5C Slides

1:40pm – 2:10pm Salon ABC Presentation Files Session 6A Slides

Session 6A - Concurrent Keynote by ServiceNow: Reduce Cyber Risk by Optimizing Your Security Response, Posture, and Resources

Successfully protecting the growing scale of enterprise services, assets, and regulations is an overwhelming task for today's security and IT teams. Join this session and learn how to evolve your security risk posture and resources to thrive in a talent-scarce market and confidently manage the risks of adopting new technologies. AI-driven playbooks and a scalable platform seamlessly integrate security, risk, and IT to centralize and accelerate threat and risk investigations and remediation.

Presentation Files Session 6A Slides

1:40pm – 2:10pm Salon EF Presentation Files Session 6B Slides

Session 6B - Concurrent Keynote by SentinelOne: Mastering Cyber Resilience through AI-powered Security Operations

With the explosion of Generative AI into widespread use over the past year, we are seeing rising indications that threat actors are exploiting AI to launch their cyberattacks. Tackling the evolving threat landscape means getting ahead of the threat - cyber defenders need to be prepared, using the power of AI to defend their organizations.

This session delves into how threat actors are starting to use AI offensively in their attack methods and how security leaders turn the tables by leveraging the power of AI to bolster their cybersecurity defense. This session will discuss how Security Operations Teams can use AI to build capabilities, improve incident response, and strengthen their cybersecurity posture.

Presentation Files Session 6B Slides

1:40pm – 2:10pm Salon D

Session 6C - Concurrent Keynote by Arctic Wolf: Artificial Intelligence and Next Generation Security Operations

Artificial Intelligence is one of the most commonly used marketing terms in cybersecurity today, but how do we separate security fact from marketing fiction? This talk will discuss how Arctic Wolf is investing in the next generation of security operations powered by AI that goes beyond traditional threat detection, along with how we are preparing for the next evolution of AI powered threats.

2:10pm – 2:35pm Bayshore Foyer

Afternoon Refreshment Break - Sponsored by Varonis

2:35pm – 3:35pm Salon ABC

Session 7A - Concurrent Panel: Demonstrable Fair AI Governance

The accelerated adoption of AI in both the Canadian public and private sectors powered by large language models is creating a demand for demonstrable governance. While this governance requires expanded requirements in both data security and privacy, it also creates new demands, processes and governance structures on many other organizational functions. These expanded governance capabilities will be reflected in laws and regulations as they develop, both explicitly and implicitly. While today, they are not well defined, they will be expected as already necessary for compliance with the accountability principle. AI developers will have to be able to demonstrate that their use of the technology is legal, fair and non-discriminatory. To do this, organizations will need to govern their processes from data and technology acquisition, transformation of data into processable information that is secure, algorithmic processes that are trustworthy and decisions that are fair. At the very least these governance programs will include the CISO, CPO and CDO but will require integration with many other roles. This form of “horizontal” governance is under development by key players participating on this panel. This session will explore how they are building out programs, securing broad organizational support, and creating accountability to stakeholders. These experiences will be useful to audience members as they plan their own demonstrable governance programs that will be demanded by both regulators and other stakeholders.

2:35pm – 3:35pm Salon EF

Session 7B - Concurrent Panel: Board Oversight: Why Can’t We Solve Canada’s Massive Cybersecurity Problem?

With the increase in global conflict, the democratization of AI and the growth of the ‘cyber attacker service industry’, the frequency and severity of cyber attacks are on the rise. So is the potential impact of a successful attack. According to the Ponemon Risk Register, cybersecurity, or a successful cyber attack, is now the most significant risk to an organization. Any risk that has the potential to shutter a business must be considered at the Board level. In this session we will talk to leading cyber security experts about the shift in focus from cyber defence to cyber resiliency and now to business continuity, what that means for an organization and the corresponding elevation of cybersecurity from being an IT issue to a Board discussion and decision.

2:35pm – 3:35pm Salon D

Session 7C - Concurrent Panel: East Meets West: Practicing Cyber Defensive Vigilance During Global Uncertainty

Given today's complex and evolving cyber threat landscape coupled with the rise of sophisticated widespread malicious campaigns it is vital that organizations continuously bolster their critical infrastructure and systems from disruption. This session will discuss ways to practice defensive vigilance as we navigate through an uptick in global cyber crime, ransomware attacks, misinformation and disinformation, along with geopolitical threats.

3:45pm – 4:15pm Bayshore Ballroom

Session 8 - Keynote Address: Unveiling the Shadows: Navigating the Evolving Landscape of Cyber Security Threats

In the face of an ever-evolving digital landscape, where technology is advancing at an unprecedented pace, the intersection of cyber security and artificial intelligence (AI) stands as a critical frontier in safeguarding our connected world. This session will provide an overview of the current cyber security landscape, emphasizing the escalating sophistication of cyber threats and impact on privacy, while offering practical insights and strategies to stay ahead of the curve.

4:15pm – 4:55pm Bayshore Ballroom

Session 9 - Keynote Address by Amazon Web Services: Securing the Data that Matters

Renowned cybersecurity expert Sean Roche, former CIA Associate Deputy Director for Digital Innovation and a key member of President-Elect Biden’s transition team, highlights the critical need to strengthen data protection in cloud environments. With extensive experience spanning the IC, DOD, and private sector, Sean offers practical recommendations to enhance cloud security, emphasizing robust protocols and proactive cybersecurity measures. Attendees will gain insights into cyber threats and breach consequences through real-world examples. With his expertise as an advisor to international partners and government officials, Sean provides unique perspectives on navigating complex cybersecurity challenges in an interconnected world.

4:55pm – 5:00pm Bayshore Ballroom Presentation Files ISACA Slides

Message from our Founding Sponsor ISACA

Presentation Files ISACA Slides

5:00pm – 5:05pm Bayshore Ballroom

Day 1 Closing Remarks

Friday, March 8, 2024

8:00am – 8:10am Bayshore Ballroom

Administrative Announcements

8:10am – 8:30am Bayshore Ballroom

Opening Remarks

8:30am – 9:00am Bayshore Ballroom

Session 10 - Keynote Address: Confronting the Biggest Privacy Challenges: A Roadmap for Protecting the Fundamental Right to Privacy in the Digital Age

Privacy Commissioner of Canada Philippe Dufresne discusses the priorities that will guide his work over the next three years, and the initiatives already underway to create a future where innovation can flourish, and fundamental privacy rights are upheld.

9:00am – 9:40am Bayshore Ballroom

Session 11 - Fireside Chat with IBM: Creatively Implementing AI Governance for Integration and Growth

The age of AI is upon us and trust is the differentiator. Of course, building trust into every aspect of an organization is not a new concept. IBM research has found that 81% of C-suite executives view security, assurance, and trust as a differentiator, but struggle to gain and sustain it in a world with so many disruptions. Join us as we share insights on how to navigate Canadian and global privacy laws, emerging AI governance standards, and growing enterprise value through AI. We will deep dive into how organizations that are rolling out AI can tackle upcoming regulatory challenges, ethical considerations, and considerations associated with managing bias.

9:40am – 10:20am Bayshore Ballroom

Session 12 - Keynote Address by Cisco: Cutting Through the Hype: A Pragmatic Look at AI's Real-World Impact on Cybersecurity Defense

This session aims to objectively evaluate the impact of Artificial Intelligence (AI) on cybersecurity, sifting through the marketing claims to reveal its genuine contributions. We pinpoint specific AI applications that bolster cyber defenses, assess the potential for AI to be exploited by adversaries, and highlight real-world examples of effective AI-powered security measures. The goal is to equip stakeholders with a realistic understanding of AI's benefits and vulnerabilities within the cybersecurity landscape, moving beyond the hype to inform strategic defensive planning.

10:20am – 10:50am Bayshore Foyer

Morning Coffee Break - Sponsored by Skyflow

10:50am – 11:50am Salon ABC

Session 13A - Concurrent Panel: Data Security & Theft of Intellectual Property - The Biggest Threat to Western Democracy

As an advanced economy and open democracy, Canada is a frequent target of foreign interference. FI harms Canadians and Canada by eroding sovereignty, prosperity, democratic process, value and corroding social cohesion of our diverse society. Panelists discuss threats, methods of espionage, subversion, sabotage, and collusion by foreign state, non-state and state-tolerated actors, or those acting on their behalf. Adversarial actors are deeply embedded throughout Canadian society where they target, manipulate, harass, intimidate and extort officials at all levels of government, the private and third sectors to influence public policy and decision-making through harmful activities that are clandestine, deceptive or threatening to advance the strategic objectives of those states to the detriment of Canada’s national interests. Panelists will discuss how to identify and prevent foreign interference, manage risks, help ensure trust, tools to support transparency, and bolstering society’s, the public, private and third sector’s collective resilience.

10:50am – 11:50am Salon EF Presentation Files Panel 13B Slides

Session 13B - Concurrent Panel: Strengthening Health Data Foundations Through Data Governance - Striking a Balance Between Privacy & Security and Data Sharing & Access

Canada's healthcare industry is very complex and continues to be under siege. The number of cyber attacks on healthcare institutions continues to rise. At the same time, there is the recognition that more data sharing and access to patient information is necessary to deliver better, safer care and more sharing is needed for the healthcare system planning and research.

However, the Pan-Canadian Health Data Strategy Report released in May 2022 outlined the principles and recommendations to make this a reality, but it did not touch upon whether any legislative changes are needed. This panel will discuss highlights from the Pan-Canadian HealthData Strategy Report, but focus on what is needed by the government, regulators, healthcare practitioners, technologists, privacy and security professionals, and citizens to make this strategy a reality.

Presentation Files Panel 13B Slides

10:50am – 11:50am Salon D

Session 13C - Concurrent Panel: Bug Bounty Hunters: Let's Hear from the World's Best Hackers

Bug bounty programs are initiatives run by companies or organizations to encourage individuals, often called "bug hunters" or "ethical hackers," to find and report security vulnerabilities or bugs in their software, websites, or digital systems. These vulnerabilities could potentially be exploited by malicious hackers to compromise the security and functionality of the system.

Bug bounty programs have become a popular and effective way for companies to enhance their cybersecurity by harnessing the skills of independent security researchers from around the world. It's a win-win situation – the organization strengthens its security, and the bug hunter receives recognition and monetary rewards for their efforts.

11:55am – 12:25pm Salon ABC Presentation Files Session 14A Slides

Session 14A - Concurrent Keynote by Zscaler: In a World of Zero-Day Vulnerabilities is Zero-Trust a Necessity or Nicety? Can it Stop the Zero-Day Vulnerability?

In this session you will learn three tenets of zero-trust as well as the three practical outcomes that can be derived from a zero-trust architecture. While malware and ransomware makes the headlines, the real insidious threats are zero-day and insider threats. What can companies and agencies do to protect the users from the next inevitable zero-day vulnerability? In this session you will learn the three most important aspects of Zero-Trust architecture and we'll take apart a real-world attack and how a Zero-Trust architecture might or might not have helped.

Presentation Files Session 14A Slides

11:55am – 12:25pm Salon EF Presentation Files Session 14B Slides

Session 14B - Concurrent Keynote by Palo Alto Networks: The CISO's Guide to AI and Security

The opportunity that AI is demonstrating to drive efficiency and technological innovation is significant. In this talk, we'll explore the future of cybersecurity and learn how AI and ML will impact:

1. Threats: A no BS summary of AI-based threats as well as a survey of future concerns.
2. Defense: Catalog current and future benefits for your organization in the AI era.
3. Operations: Where and how AI-based efficiencies will manifest in cyber security operations.

Presentation Files Session 14B Slides

11:55am – 12:25pm Salon D Presentation Files Session 14C Slides

Session 14C - Concurrent Keynote by Varonis: Generative AI Security: Preventing Microsoft Copilot Data Exposure

•Learn what data security risks generative AI can bring to companies.
•See real-world examples of how generative AI can access and create sensitive data.
•Understand how to prepare your Microsoft 365 environment for a safe Copilot rollout.

Presentation Files Session 14C Slides

12:25pm – 1:30pm Bayshore Foyer

Lunch Break - Sponsored by HPE Aruba

1:30pm – 2:30pm Salon ABC

Session 15A- Concurrent Panel: From CIO to CAIO: The Human Dimension to Implementing AI

1:30pm – 2:30pm Salon EF

Session 15B- Concurrent Panel: Geopolitics-State Sponsored Threats

The internet has become a forum for activity traditionally conducted by diplomats operating in hallowed halls. It is now a vehicle for directly meddling in the affairs of nation states through manipulation of public opinion, disruption of government operations, penetration of critical infrastructure in preparation for future hostilities, targeting of academic institutions and corporations to steal intellectual property, and engaging in criminal activity to raise revenue for activities otherwise prohibited by international sanctions.

This panel of experts will draw on their experience in government, the private sector and academia to explore how geopolitics is being played out through the internet and is an increasing threat to national security. Panelists will examine the impact of this threat on trust in public institutions, businesses, and the general public. They will share their perspectives on Canada's appropriate response and contemplate the necessary changes in the roles of both government and the private sector.

1:30pm – 2:30pm Salon D

Session 15C- Concurrent Panel: Safeguarding Healthcare Data: Unleashing the Power of AI Responsibly “Data Sharing and the Emergence of Privacy Enhancing Technologies (PETs)”

Opportunities exist for public health organizations to advance precision public health by adopting genomic sequencing and data sharing through highly curated, but interoperable, genomics data sharing. Privacy-enhancing technologies, backed by national statistical organizations such as the United Nations Statistics Division are examples of this. This panel will discuss key opportunities for IT to leverage PETs as the fastest path to early wins in pathogen genomic data sharing for important public health applications.

2:30pm – 3:00pm Bayshore Foyer

Afternoon Refreshment Break - Sponsored by Skyflow

3:00pm – 3:30pm Salon ABC Presentation Files Session 16A Slides

Session 16A - Concurrent Keynote by Cohesity: Safely Unlocking Corporate Data with Cohesity: AI-Powered Solutions for Privacy and Security

This talk explores how Cohesity's advanced toolsets leverage artificial intelligence (AI) to enable corporations to unlock their data securely, incorporating techniques from large language models. We'll begin by addressing the urgent need for modern data management solutions in the face of escalating privacy and security concerns. We'll then delve into how AI revolutionizes data management practices, facilitating data discovery, correlation, proactive threat detection, and compliance with regulatory standards.

Cohesity's platform stands out as a transformative solution, offering intelligent data classification, predictive analytics for security, and robust privacy features like end-to-end encryption and access controls. By embracing AI-powered solutions like Cohesity, businesses can confidently navigate the complexities of data management while safeguarding corporate privacy and security.

Presentation Files Session 16A Slides

3:00pm – 3:30pm Salon EF Presentation Files Session 16B Slides

Session 16B - Concurrent Keynote by Optiv/Tanium: Automated Endpoint Management and Optimizing ServiceNow Workflows

In this session you will hear how various global organizations are eliminating outages and automating with AI to drive better MTTR around ITOM, Security, and Risk. Learn how the power of strategic platforms delivers a complete organizational operating environment spanning IT and SecOps workflows. We’ll dive into the benefits of Tanium's powerful Converged Endpoint Management (XEM) platform and how it works directly with ServiceNow to deliver superior business outcomes that lower costs, reduce risk, increase productivity, and offer a better employee and customer experience.

Furthermore, with a shortage of skilled personnel, increased breaches, and the need to reduce CAPEX, there is an increasing demand for IT customers to look outside their organizations for help managing their network and endpoints. Optiv will discuss how they can help your organization get the most ROI out of your solutions.

Presentation Files Session 16B Slides

3:00pm – 3:30pm Salon D Presentation Files Session 16C Slides

Session 16C - Concurrent Keynote by Skyflow: The Inconvenient Truth About PII

Despite the billions spent on security, over 2.6 billion personal records have been leaked in recent years, indicating a growing issue with protecting personally identifiable information (PII). As we consider the impact of Bill C-27, it's time to ask ourselves some hard questions, like: are we simply doing it all wrong?

Much like storing valuable personal documents – your passport, your child's birth certificate, your marriage license – in the same drawer as your takeout menus, many products mix sensitive user data with general application data. This approach overlooks the unique nature of PII. Just like encryption keys and secrets, PII demands specialized handling.

In this talk, we’ll explore the necessity of rethinking PII storage and management to combat data leaks and improve data privacy and security. We’ll introduce the concept of a data privacy vault, a new standard for PII management that’s been endorsed by the IEEE and adopted by leading tech companies. The vault approach shifts privacy and security from an afterthought to a core engineering principle, fostering systems that are secure by default.

Presentation Files Session 16C Slides

3:35pm – 4:15pm Bayshore Ballroom Presentation Files Session 17 Slides

Session 17 - Keynote Address: AI – Friend and Foe: The Arms Race in Cyberspace

Presentation Files Session 17 Slides

4:15pm – 4:45pm Bayshore Ballroom

Session 18 - Closing Keynote Address: Better Together: BC's Outgoing Information and Privacy Commissioner on Why Collaboration is Critical for Today's Privacy Regulators

In this presentation, Commissioner McEvoy reflects on the power of national and international collaboration to effectively protect the data privacy rights of global citizens - especially in the AI era.

4:45pm – 4:55pm Bayshore Ballroom

Closing Remarks & Announcements:

Title Sponsor

Founding Sponsor

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Summit Sponsors

Marketing Partners

Westin Bayshore Hotel - Vancouver, BC

If you are attending the 26th Annual Vancouver International Privacy & Security Summit and need to make a hotel reservation we have a room block at the Westin Bayshore Hotel with room rates starting at $289. The room block ends February 5th. To book a room within this room block please click here.

With lush and serene Stanley Park at its doorstep, water lapping the Coal Harbour Shores, snow-capped North Shore mountains in sight, and the vibrant city centre just around the corner, The Westin Bayshore, Vancouver is in perfect balance with its breathtaking surroundings. An elegant base from which to explore Vancouver, this resort-style property is a hub for well-being, whether travelling for leisure or business. A variety of year-round signature wellness programs promote feeling your best, while premier food and beverage offerings recharge the body and mind. Over 71,000 sq. ft. of flexible meeting space, one of Western Canada’s largest hotel ballrooms, and customizable catering options make this iconic hotel an ideal destination for conferences and social events. The Westin Bayshore, Vancouver is your gateway to inspired revitalization.