28th Annual Victoria International Privacy & Security Summit Trust, Transparency & Transformation: Governing Artificial Intelligence March 3-5, 2026, Victoria, BC

General Information

Trust, Transparency & Transformation: Governing Artificial Intelligence

As the world enters the fifth industrial age, transforming the public sector has become an urgent priority. This shift necessitates innovative strategies to ensure that public servants are aptly trained in privacy and security issues. This adaptation is critical as we continue to accelerate our move to digital platforms, where safeguarding personal data is paramount.

The 28th Annual Victoria International Privacy & Security Summit, hosted at the Victoria Conference Centre, is poised to be a cornerstone event in this transformation. This fully in-person summit will welcome up to 1,000 professionals involved in public sector transformation, security, and privacy, offering them a unique opportunity to discuss how we securely live, work, and play in the digital era.

This year’s summit will highlight, “Trust, Transparency & Transformation: Governing Artificial Intelligence,” and will spearhead the intellectual odyssey. This summit brings together visionaries, experts, and innovators to explore the intricate intersection of advanced artificial intelligence with critical privacy and security imperatives.

Keynote sessions, interactive workshops, and collaborative panels will unravel the complex challenges and opportunities ushered in by our digital age. Participants will gain insights into creating strategies that seamlessly integrate AI advancements with an unwavering commitment to individual rights, data sovereignty, and technological trust.

Training public servants on issues of privacy and security is emphasized throughout the summit. The event aims to provide attendees with practical strategies to protect data effectively, ensuring that as digital platforms proliferate, the public sector continues to uphold trust and integrity.

Join us in charting a course towards a harmonious future, where the transformative potential of AI aligns with our steadfast commitments to privacy and security.

CPD/CPE Credits

We are proud to announce that delegates within local government and professionals in the industry can obtain CPD/CPE credits through The BC Law Society and various other organizations.

We acknowledge that gaining approval to attend training conferences can be challenging. As support in your continued privacy and security education, please click here for a sample Justification letter you can customize to build your case in attending. Once you click on the link, select “File” in the upper left corner, and download to edit.

Registration Information

Early Bird Rates (until December 31st)

Public Sector Private Sector
VIPSS  3-Day Pass
(Victoria Conference Centre)
$495.00CAD (plus GST) $795.00 CAD (plus GST)

Standard Rates (starting January 1st)

Public Sector Private Sector
VIPSS 3-Day Pass
(Victoria Conference Centre)
$650.00 CAD (plus GST) $995.00 CAD (plus GST)

If you are a post-secondary student please inquire about our special student rate.  If you have a group of 10+ individuals looking to attend please reach out regarding group discounts.

Please note we have 25 complimentary student tickets available sponsored by BC Freedom of Information and Privacy Association so please contact us if you would like one!

Registration Includes*:

  • Join us live in Victoria, B.C for our 3-day summit (March 3-5, 2026) – includes the pre-summit educational workshop day on March 3rd (no lunch served this day).
  • Collaborate with senior executives who are changing the privacy & security industry
  • Signature keynotes and concurrent keynotes by international subject matter experts in privacy & security
  • Concurrent panel sessions + interactive in-person Q & A
  • Unparalleled in-person networking via 1:1 meetings and small group conversations
  • Exhibit booths for our top tier sponsors
  • Lunch (March 4th & 5th) and coffee breaks (March 3-5)
*Subject to provincial guidelines (masks are currently optional).


Social Media

Stay connected and engaged in the conversation leading up to and during the summit by following along on X (Twitter) @VIPSSummit. Use the event hashtag #VIPSS and #VIPSS26 in your tweets to add to the existing discussions. We would appreciate you sharing your voice with our other followers.

Please join us on Bluesky and follow our new account for Reboot Communications

www.vipss.ca

 

 

Victoria Conference Centre

There’s nowhere in the world like Victoria. It’s small yet sophisticated; a technology leader and an historic capital city; a vibrant business community yet surrounded by nature. At its heart is the Victoria Conference Centre – an exceptional experience for delegates and world-class support for planners.

Victoria Conference Centre
720 Douglas Street
Victoria, BC
V8W 3M7

Keynote Speakers

Chris Burchell

Senior Solutions Engineer, Western Canada, Zscaler

Michael Cavallin

Senior Manager of Cyber Security & Risk, BCI

Lina Dabit

Executive Director, Office of the CISO, Optiv Canada

Cory Doctorow

Author, Activist, and Journalist; Special Advisor, Electronic Frontier Foundation

Philippe Dufresne

Privacy Commissioner of Canada

Brad Edwards

Domain Consultant, Security Operations Transformation, Palo Alto Networks

Honourable Diana Gibson

Minister, Ministry of Citizens’ Services, Province of BC

Tanya Janca

Founder, SheHacksPurple

Dr. Christian Leuprecht

Class of 1965 Professor in Leadership, Royal Military College; Director of the Institute of Intergovernmental Relations, School of Policy Studies, Queen’s University

Jason Maynard

Field CTO, Cybersecurity, Cisco Canada

Rishi Muchalla

National Strategist and Evangelist, Office of the CTO, Check Point Software Technologies

Aaron Parecki

Director of Identity Standards, Okta

Jim Richberg

Head of Cyber Policy and Global Field CISO, Fortinet

Pam Snively

Chief Data & Trust Officer, TELUS

Jody Thomas

Former Deputy Minister of the Department of National Defence, Government of Canada; Former National Security and Intelligence Advisor to the Prime Minister

Bridget Walshe

Associate Head, Canadian Centre for Cyber Security

Speakers

Gerry Akkerman

President, Vancouver Chapter, The CIO Association of Canada; Chief Information Officer, Legal Aid British Columbia

Walter Anderson

President, ISACA Victoria; Founder, PORTSECURE; CISO, Nanaimo Port Authority

Arielle Andrews

Senior Product Manager of Governance, Cybersecurity and Digital Trust Branch, Ministry of Citizens’ Services

Brent Arnold

Chair, The Canadian Internet Society; Principal, Capstan Legal; Partner, INQ Law

Claire Atkin

CEO, Check My Ads

Harry Baker

Senior Consultant, Elevate Consulting

Daria Batkin

CEO, Privacy & AI Lawyer at Icon Law Group

Brock Bauer

Security Architect Team Lead, Varonis

Marie-Eve Bedard

Chief, Centre for AI Research and Excellence (CAIRE), Statistics Canada

Vass Bednar

Senior Fellow, Centre for International Governance Innovation (CIGI); Managing Director, The Canadian Shield Institute

Dr. Nolan Beise

Founder and CEO, Circl Brain Health Metrics; Senior Advisor, Mitacs

Bojana Bellamy

President, Center for Information Policy Leadership

Bonnie Beyea

Governance Team Lead, Cybersecurity and Digital Trust Branch, Ministry of Citizens’ Services

Shelly Bruce

Distinguished Fellow, Centre for International Governance Innovation

Jillian Carruthers

Assistant Deputy Minister, Connected Services BC, Ministry of Citizens' Services, Province of BC

Dr. Anita Charters

Senior Advisor, Interdisciplinary Research and Programs, Genome BC

Andy Cheng

Enterprise Territory Manager, Western Canada, Tenable

Venkat Chintaluri

Specialist, Vulnerability Management, iON

Dr. Peter Chow-White

Director, GeNA Lab, Simon Fraser University

Dr. Andrew Clement

Professor Emeritus, Faculty of Information, University of Toronto

Barbara Cosgrove

Vice President, Chief Privacy and Digital Trust Officer, Workday

Don Costello

Manager, Cybersecurity, City of Victoria

Rob Davidson

Director of Security Services, CISO, Pacific Blue Cross

Elizabeth Denham

Chair, Jersey Data Protection Authority (JDPA); International Consultant, Baker McKenzie

Andrew Drummond

Director of Health Policy, Office of the Information and Privacy Commissioner of Ontario

Brad Edwards

Domain Consultant, Security Operations Transformation, Palo Alto Networks

Dr. Khaled El Emam

Canada Research Chair (Tier 1) in Medical AI and Director of Medical AI, Faculty of Medicine, University of Ottawa; Director, Electronic Health Information Laboratory

Sinisha Erceg

Senior Sales Engineer, Mimecast

Claire Feltrin

Counsel, Privacy, Cybersecurity & Data Protection, BLG

Christopher Gillespie

CPO and Director of Privacy & Access, UVic

Mira Gillis

COO, Young Digital Leaders of Canada

Bob Gordon

Strategic Advisor, Canadian Cyber Threat Exchange (CCTX)

James Gough

National Treasurer, The Pillar Society; Former Chief, China Operations, CSIS

Robin Gould-Soil

President, RGS Management Consulting Services; CPO, Pentavere

Matthew Gray

Director, Public Policy and Media Partnerships, Torstar Corporation

Omid Hamed

Founding Member and President, CISO Division, The CIO Association of Canada

Niki Harris

North American Engagement & Policy Director, Quantum Security Defence; Founder, The Future Brief

Matt Hatfield

Executive Director, OpenMedia

Rachel Hayward

Executive Director, CyberAlberta, Ministry of Technology and Innovation, Government of Alberta

Jamie Hodge

Senior Solutions Engineer, Cloudflare

Nathaniel Hunt

Business Analyst, Canadian Centre for Cyber Security

Jennifer Irish

Principal, Geopolitical Advisory & Information Integrity Practice, Pendulum Group

Tamir Israel

Director, Privacy, Surveillance & Technology Program, CCLA

Sunny Jassal

Chief Information Security Officer, BCIT; Vice President, ISACA Vancouver

Jennifer Jin

AI & Data Policy Analyst, Center for Information Policy Leadership

Amy Kirtay

Director, Information Security, Cybersecurity and Digital Trust Branch, Ministry of Citizens’ Services

Patricia Kosseim

Information and Privacy Commissioner of Ontario

Richard Larose

Cyber Principal, Strategic Advisor on Bill C-8, Canadian Centre for Cyber Security

Tara Laughlin

Investigator, Office of the Information and Privacy Commissioner for British Columbia

Caitlin Lemiski

Director of Policy, Office of the Information and Privacy Commissioner for British Columbia

Brian Lenahan

Founder & Chair, Quantum Strategy Institute

Alexander Longergan

Adjudicator, Office of the Information and Privacy Commissioner for British Columbia

Penny Longman

President, WiCyS Western Canada

Dr. Holly Longstaff

Director Research Integration and Innovation, Provincial Health Services Authority (PHSA)

Donald G. Mahar

Past National President, The Pillar Society; Former Deputy Chief, Counter Intelligence, Ottawa Region, CSIS

Ralph Mahar

Past National Vice President, The Pillar Society; Former Deputy Director General Operations, Scientific & Technical Services, CSIS

Amanda Maltby

Chief Privacy Officer, Environics Analytics

Nick Maltchev

President, ISACA Vancouver Chapter

Wendy Martel

Data Governance, Privacy, Ethics & AI Governance, Evata Consulting

Dr. Florian Martin-Bariteau

Associate Professor, Common Law Section; Director, Centre for Law, Technology and Society, University of Ottawa

Jason Maynard

Field CTO, Cybersecurity, Cisco Canada

Earl Maynard

Senior Strategic Advisor - Cyber Partnerships, Canadian Centre for Cyber Security

Drew McArthur

Principal, The McArthur Consulting Group

Tim McCreight

CEO & Founder, TaleCraft Security

Michael McEvoy

Former Information and Privacy Commissioner for British Columbia; ; Senior Advisor, Deloitte

Christine McKenna

Policy Analyst, Office of the Information and Privacy Commissioner of Ontario

Diane McLeod

Information and Privacy Commissioner of Alberta

Dr. Brenda McPhail

Senior Technology & Policy Advisor, Office of the Information and Privacy Commissioner of Ontario

Mark Milotay

Chief Information Officer, Corporate Shared Services, The Office of the Ombudsperson and The Office of the Information and Privacy Commissioner of BC

Dr. Ross Mitchell

Chair in AI In Health, Alberta Health Services; Professor, Department of Medicine, University of Alberta; Fellow, Alberta Machine Intelligence Institute

Harsh Modi

Director, Cyber Ensure Inc.

Iwona Mooney

Director at Large, National Board of Directors, The Pillar Society; Former Deputy Director General, CSIS

Suzanne Morin

Vice President, Chief Privacy & Data Ethics Officer, Sun Life

Bharath Nagaraj

Global Head of AI Specialist Presales, Cohesity

Elie Nasrallah

Principal Sales Engineer, SentinelOne

Nilou Noursadeghi

Director, Bahar Genetics Inc.

Jeff Owen

Senior Sales Engineer, Arctic Wolf

Donald Parker

Director General, Review, Transparency, and Information Sharing, Communications Security Establishment

Ian Paterson

CEO, Plurilock

Dr. Jessica Percy-Campbell

Investigator, Office of the Information and Privacy Commissioner for British Columbia

Dr. Lisa Pilgram

Clinician Scientist; Postdoctoral Fellow, Electronic Health Information Laboratory

Ethan Plato

Legal Counsel, Office of the Information and Privacy Commissioner for BC

Jennifer Quaid

Executive Director ,Canadian Cyber Threat Exchange (CCTX)

Julia Reinhard

Program Coordinator, NATO Field School and Simulation Program, Simon Fraser University

Jim Richberg

Head of Cyber Policy and Global Field CISO, Fortinet

Dr. Teresa Scassa

Canada Research Chair in Information Law and Policy, University of Ottawa

Dr. May Siksik

CEO, Innovation Network Global

Andrea Simpson

Director, Cryptographic Research, Engagement and Standards, Canadian Centre for Cyber Security

Maleena Singh

Director, Incident Response, Mirai Security

Pam Smith

CISO & Sr. Executive Director, Cybersecurity and Digital Trust Branch, Connected Services BC, Ministry of Citizens’ Services, Province of BC

Dan Stanton

Director of National Security, Professional Development Institute, University of Ottawa; Former CSIS Executive Manager

Sonik Surelia

Incident Response Consultant, Mirai Security

Cornelius Temple

Sales Director - BC, Microserve

Jories Timmers

Cybersecurity Director, Powerex Corp.

Oskar Trpisovsky

Privacy & Data Protection Leader, KPMG

oline Twiss

Deputy Commissioner, Office of the Information and Privacy Commissioner for BC

Sybila Valdivieso

Executive Director and Lead Counsel, Healthcare and Privacy Law, Privacy Operations, Island Health and PHSA

Jeannette Van Den Bulk

Deputy Commissioner, Policy, Adjudication, and Audit, Office of the Information and Privacy Commissioner for British Columbia

Tim Wostradowski

Principal Security Expert, Fortinet

John Wunderlich

Chief Privacy Officer, JLINC Labs
Print Agenda

*Invited Speaker

Click on the date of the agenda you would like to view. Please note the timezone listed on the agenda.

Tuesday, March 3, 2026

9:00 - 10:30am PST Theatre

Session 1A - Concurrent Workshop by Cisco: Prescriptive Based Response is Kryptonite to Adversaries

This immersive, hands-on lab experience will focus on developing key skills for investigating and responding to cyber incidents. Participants will learn practical techniques for identifying, analyzing, and responding to sophisticated advanced persistent threats (APTs) using Extended Detection & Response (XDR). The strategies and skills gained will be broadly applicable across a range of tools and environments. Learn how to empower your teams to go from endless investigation to remediating the highest priority incidents with greater speed, efficiency, and confidence. The session will be 80min lecture and then 10min to ensure everyone has access to the labs. The labs will be available to all attendees for up to 7 days. If you complete the labs, you will also get CPE credits. Please ensure you bring your laptops.

9:00 - 10:30am PST Oak Bay Room

Session 1B - Concurrent Workshop by OIPC BC: Surveillance in the Public and Private Sector

In this 3-part workshop facilitated by staff of the Office of the Information and Privacy Commissioner for BC, the workshop facilitators will first walk participants through the basics of how BC’s Freedom of Information and Protection of Privacy Act and Personal Information Protection Act apply to surveillance projects. In the second part, participants will break into small groups to discuss potential ideas for surveillance projects, and how FIPPA or PIPA might apply. Then, for the last part, the session leads will bring the group back together for a dialogue where participants can share what they learned, ask questions, and offer suggestions for future tools and guidance from the OIPC.

9:00 - 10:30am PST Saanich Room

Session 1C - Concurrent Workshop by Ministry of Citizens' Services: Cybersecurity and Digital Trust Branch: Engaging People Early: Working Openly in Cybersecurity Policy

This workshop shows how to do policy work in the open for cybersecurity—shifting from a closed, step‑by‑step process to sharing early drafts, involving people sooner, and improving the work through regular feedback. Through real examples and a short storyboard exercise, participants will see how this approach builds engagement, speeds iteration, and leads to clearer, more practical policies, especially when new technologies don’t fit what we have today.

9:00 - 10:30am PST Esquimalt Room

Session 1D - Concurrent Workshop: Quantum Technologies: The Privacy & Security Threat – And the Path to Quantum Readiness

This workshop is designed for cybersecurity professionals, privacy officers, risk managers, compliance leaders, and executives concerned with emerging threats. It demystifies quantum technologies while focusing on their direct implications for data privacy, encryption security, cyber risk, and organizational resilience in a post-quantum world.

10:30 - 10:45am PST First Floor Foyer

Morning Coffee Break

10:45am - 12:15pm PST Theatre

Session 2A - Concurrent Workshop by Fortinet: Protecting AI in 2026: What Broke, What Changed, and What Actually Works Now

AI is no longer a single tool, a single model, or a single risk. In 2026, organizations are operating across multiple models, local and cloud inference, agentic workflows, embedded copilots, and automated toolchains - often without realizing how exposed they’ve become.

This workshop skips AI 101 and focuses on what security leaders actually need to know now. We’ll break down how AI usage has fundamentally changed over the past four years, why many traditional security recommendations are just the start, and where new risks are emerging - from shadow agents and model sprawl to adversarial prompts and AI supply chain exposure.

Attendees will gain a clear, conceptual guide for protecting AI usage across people, models, agents, data, and tools - without blocking innovation or pretending AI can be “turned off.”

1:30 - 3:00pm PST Oak Bay Room

Session 2B - Concurrent Workshop: Cyber Resilience as a Public Good: Optimizing Grassroots Power to Counter Cyber Threats in BC

Cybersecurity is hardest for the organizations with the fewest resources. This session looks at how the BC Cyber Hub and grassroots collaboration are helping translate complex advice into practical, “no‑shame” support — and how you can play a role in improving community cyber resilience.

BC’s cybersecurity ecosystem is not uniformly strong. While large organizations often have the staff, budgets, and partners needed to stay secure, many small businesses, non‑profits, Indigenous governments, rural municipalities, and community organizations in British Columbia struggle to keep up.

This session shares the story of the BC Cyber Hub pilot, launched at last year’s Victoria International Privacy & Security Summit, and how it has evolved since. It begins with a brief, practical overview of the current cybersecurity landscape in BC and why smaller, under‑resourced organizations are often the most vulnerable.

We will explore how grassroots and volunteer‑led initiatives can help fill gaps that national programs and policies cannot always reach. Using the BC Cyber Hub as an example, speakers will show how experienced practitioners are sharing knowledge, building trust, and creating “no‑shame” spaces where organizations can ask for help.

The session will examine how a service design approach to grassroots cybersecurity initiatives can help meet organizations where they are and provide support they can actually use. It concludes with a call to action for participants to help strengthen community‑level cyber resilience, so no one is left behind.

10:45am - 12:15pm PST Saanich Room

Session 2C - Concurrent Workshop: Empower Your Practice Through Ethics Training

The goal of this 90-minute workshop is to empower participants to confidently manage risks associated with transformation and innovation through ethics training. The workshop will begin with an overview of fundamental ethics tools and concepts from the field of bioethics. Participants will then have the opportunity to apply these learnings by working through a series of interesting (and sometimes contentious), real-life case studies.

10:45am - 12:15pm PST Esquimalt Room

Session 2D - Concurrent Workshop: Agentic Browsers: Know the Risks

Agentic browsers are intended to save time by organizing our lives and performing mundane tasks without for us. But convenience always costs. In this workshop we’ll explain how these tools work, and discuss the cyber, privacy and legal risks that arise when we deploy agentic AI.

12:15 - 1:30pm PST

Lunch Break (Delegates on their own for lunch)

10:45am - 12:15pm PST Theatre

Session 3A - Concurrent Workshop: Where Security Meets Story

In an environment where privacy and security decisions carry real business, legal, and human impact, how those decisions are communicated matters as much as the controls themselves. Security and privacy leaders must move beyond metrics and technical language to tell stories that create understanding, trust, and action.

Where Security Meets Story is a highly interactive 90-minute workshop that helps security and privacy professionals translate complex risk, privacy, and security concepts into clear, compelling narratives that resonate with executives, boards, regulators, and non-technical stakeholders.

Drawing on over 40 years of real-world leadership experience, Tim McCreight explores how storytelling becomes a strategic capability enabling practitioners to connect business context, risk, and impact in ways that support better decisions. Participants will apply practical storytelling techniques through guided exercises they can immediately use in briefings, incident communications, and strategic discussions.

This session equips attendees with tools to make security and privacy messages stick - where clarity leads to alignment, and alignment leads to action.

1:30 - 3:00pm PST Oak Bay Room

Session 3B - Concurrent Workshop: Tabletop in a Box

1:30 - 3:00pm PST Saanich Room

Session 3C - Concurrent Workshop: Operational Technology Security - Protecting Critical Cyber Systems of the CI sectors (Bill C-8) in an Augmented Threat Environment

Bill C-26 has evolved into Bill C-8, and with it comes new cybersecurity obligations for operators of critical infrastructure across Canada — but what does this actually mean for your organization? This interactive workshop cuts through the legislative language to help you understand which provisions of Bill C-8 apply to you, what compliance could look like in practice, and what steps you should be taking now to avoid being caught off guard. We'll explore the real-world challenges of securing both IT and OT environments, address the complexities of IT/OT convergence that most organizations are navigating today, and point you to frameworks, resources, and guidance — including from the Canadian Centre for Cyber Security — that can accelerate your readiness journey. Whether you're in telecom, energy, transportation, or finance, you'll leave this session with practical tools, clear takeaways, and a stronger sense of where your organization stands on protecting its critical cyber systems.

1:30 - 4:45pm PST Esquimalt Room

Session 3D - Concurrent Workshop: Practical De-identification Methods - Part 1 (3 hour session)

Access to and sharing of data provides great benefits - it is the foundation for research, innovation, and progress - but it also brings concerns about privacy. Preserving the privacy of personal information is an ethical and regulatory responsibility when using and sharing data. Understanding the concepts of privacy disclosure and translating them into practical methodology is crucial when using or disclosing personal data in real world situations. This workshop on de-identification methods will guide you through the concepts and methods used in a risk-based de-identification approach.

Learning Objectives:
-Gain a broad understanding of the considerations around managing disclosure risks in data
-Learn practical methods for evaluating and managing disclosure risks
-Understand what are good practices for de-identification and for managing disclosure risks more generally
-Understand how to explain and justify practices for evaluating and managing disclosure risks.

3:00 - 3:15pm PST First Floor Foyer

Afternoon Refreshment Break

3:15 - 4:45pm PST Theatre

Session 4A - Concurrent Workshop

3:15 - 4:45pm PST Oak Bay Room

Session 4B - Concurrent Workshop by OIPC BC: OIPC Proceedings: Processes, Tips, and Tricks

Join Tara Laughlin (Investigator) and Alexander Lonergan (Adjudicator) of the Office of the Information and Privacy Commissioner for British Columbia as they discuss the types of administrative proceedings that come before the Commissioner’s office. This session will include an overview of the Office’s processes from intake to inquiry, as well as a closer look at the most common requests and interlocutory applications that parties make.

3:15 - 4:45pm PST Saanich Room

Session 4C - Concurrent Workshop: Cyber Resilience: From Incident Response Programs to Defensible Controls

This two‑part session gives attendees the essentials for building a defensible, framework‑aligned incident response capability—then shows how to operationalize it in Microsoft 365.

Part 1 — Incident Response Foundations
A quick, practical walkthrough of what every organization should have in place before an incident: clear IR documentation, defined processes, and alignment to a security framework so you’re ready when it matters.

Part 2 — M365 Security & Investigation Basics
A fast start on securing Microsoft 365 from the ground up, followed by how to leverage M365 audit logs and artifacts as a powerful investigation and forensics resource.

1:30 - 4:45pm PST Esquimalt Room

Session 4D - Concurrent Workshop: Practical De-identification Methods - Part 2 (3 hour session)

Access to and sharing of data provides great benefits - it is the foundation for research, innovation, and progress - but it also brings concerns about privacy. Preserving the privacy of personal information is an ethical and regulatory responsibility when using and sharing data. Understanding the concepts of privacy disclosure and translating them into practical methodology is crucial when using or disclosing personal data in real world situations. This workshop on de-identification methods will guide you through the concepts and methods used in a risk-based de-identification approach.

Learning Objectives:
-Gain a broad understanding of the considerations around managing disclosure risks in data
-Learn practical methods for evaluating and managing disclosure risks
-Understand what are good practices for de-identification and for managing disclosure risks more generally
-Understand how to explain and justify practices for evaluating and managing disclosure risks.

Wednesday, March 4, 2026

7:30am PST Lower & Upper Foyers

Registration & Exhibit Floor Opens

8:30 – 8:40am PST Salon ABC

Call to Conference & Territorial Acknowledgement

8:40 – 8:55am PST Salon ABC

Opening Remarks

8:55 – 9:35am PST Salon ABC

Session 1 - Keynote Address: Elbows Up: How Canada Can Disenshittify Tech, Reclaim Its Sovereignty, & Launch a New Tech Sector

13 years ago, the US trade rep bullied us into passing IP laws that ban our tech companies from reverse-engineering, modifying, improving and disenshittifying the tech products they sell to us. America told us that unless we passed these laws, they'd slap us with tariffs.

Welp, here we are: 13 years on, our tech sector is becalmed, RIM and Nortel are distant dreams, US tech giants spy on us with every hour that God sends, they rip off ever app maker, performer, seller and news outlet that relies on an app to the tune of 30 cents out of every dollar, they won't show us the news (not even during wildfires!)...*and* we've got tariffs.

Canada, we can do better than retaliatory tariffs. Changing the law means changing the way our technologists relate to US Big Tech. It means raiding the margins of history's greatest rent seekers, creating a vast consumer surplus and a durable source of industrial advantage for Canada. It beats the heck out of voluntarily deciding to pay more for the things we buy from America (which is a pretty weird way of punishing Americans).

9:35– 10:20am PST Salon ABC

Session 2 - Keynote Address by Fortinet: A GenAI Reality Check: Security, Privacy, and the Limits of Governance

GenAI is being adopted faster than any previous technology in history, and governance, security, and privacy strategies across both the public and private sectors struggle to keep up. Many organizations believe they are “managing” AI risk, when in reality they are operating based on unproven assumptions and in ways that create blind spots that increase vulnerability and create risks to privacy.

In this keynote, Fortinet’s Jim Richberg delivers a clear-eyed assessment of the real risks behind the GenAI hype. He explains how gaps in our understanding of how large language models work affects security and privacy, and why AI introduces governance challenges unlike anything leaders have faced before.

This session sets the tone for VIPSS by exploring GenAI’s impact on both cyber defenders and attackers, the privacy implications of emerging trends in AI use, and advice on how to select and implement AI governance inside an organization. Attendees will gain tips on practical guidance as well as strategic insight into how to balance risk and innovation in this fast-moving area.

10:20 – 10:45am PST Upper & Lower Foyers

Morning Coffee Break

10:45 – 11:45am PST Salon A

Session 3A - Concurrent Panel: Digital Sovereignty

10:45 – 11:45am PST Salon B

Session 3B - Concurrent Panel: Regulatory Design of AI Governance in Healthcare

A fast‑paced, insight‑driven session on how Canada should regulate AI in healthcare, this panel tackles the toughest questions head‑on—from evolving AI systems and accountability gaps to privacy blind spots and the ethics of data‑hungry models. With sharp provocations, real disagreement, and rapid‑fire takeaways, the conversation cuts through the hype to reveal what regulators must strengthen, rethink, and act on in the next year.

10:45 – 11:45am PST Theatre

Session 3C - Concurrent Panel: Reflections on the Past, Perspectives on the Future: Inside Canada's Intelligence Community

From the early days of CSIS to today’s evolving global security environment, this panel offers an opportunity to hear from those who helped shape Canada’s intelligence community. Former CSIS and RCMP Security Service officers will reflect on the early challenges and lessons learned. And they will discuss how AI could reshape intelligence work as well as how best to safeguard our democratic values and public trust.

11:50am – 12:20pm PST Salon A

Session 4A - Concurrent Keynote by KPMG & Icon Law: The Privacy Paradox: Why Less Data is Often More

De-identification and anonymization can be effective tools in removing personal information from data sets. However, in the age of AI and the not so distant future of quantum computing, organizations face risks arising at the intersection of de-identification, anonymization and predictive capabilities of AI. In this context, the panel will explore the practical realities, approaches and methods that can be used to reduce risks to personal data.

11:50am – 12:20pm PST Salon B

Session 4B - Concurrent Keynote: Human-centric Engineering: Moving from What’s Possible to What’s Beneficial

Let’s move beyond what AI can do and consider what it should do. Long-term, productivity-boosting AI adoption doesn't follow functionality - it follows trust. That requires human-centric engineering from day one: ensuring safety and robustness in real-world conditions, prioritizing accountability, and delivering respect through technology. It also requires engaging the stakeholders AI serves. These human-centric principles guiding us aren't constraints, they’re the basis for real innovation. When we engineer for trust, we don’t just build better systems, we build lasting ones that people will use.

11:50am – 12:20pm PST Theatre

Session 4C - Concurrent Keynote by Optiv/Palo Alto: Delegated Authority in the Age of Machine-Speed Threats

This session outlines the governance, policy, and cultural prerequisites for enabling your SOC to actually respond at the speed the threat environment now demands. We will examine how and who, or what, in the case of AI, can make consequential decisions when time is scarce, and determine whether we have the framework to align those decisions with organizational risk appetite.

12:20 – 1:35pm PST Salon ABC

Lunch Break

1:35 – 2:05pm PST Salon A

Session 5A - Concurrent Keynote: Global Game, Global Target: Understanding and Defending against the Hybrid Threat Landscape of FIFA 2026

While events like FIFA and the Olympics bring together our global community in a celebration of sport and national pride, they also attract threat actors who target every aspect of the games. FIFA 2026 will be the first games to host forty-eight national teams across three countries and have the additional challenge of defending against an unprecedented hybrid landscape. This session will explore layered security considerations and how to coordinate our efforts to combat evolving threats.

1:35 – 2:05pm PST Salon B

Session 5B - Concurrent Keynote by Okta: Governing the "Shadow AI" Mesh with Open Standards

For AI to be truly transformative in the public sector, it must be governed by open, vendor-neutral standards. This session explores the development of the IETF Identity Assertion Authorization Grant (Cross App Access) and its role in securing agentic AI.

1:35 – 2:05pm PST Theatre

Session 5C - Concurrent Keynote by Check Point: The Executive Playbook for Secure and Responsible AI

As AI becomes embedded in public-sector operations, it introduces new leadership, regulatory, and cybersecurity risks. AI is no longer just a technology initiative. It is a governed, regulated, and mission-critical asset.

This session reframes AI governance as an executive responsibility, examining how frameworks such as Canada’s Artificial Intelligence and Data Act (AIDA), privacy obligations, and cybersecurity requirements intersect with the need to secure AI systems against manipulation, data poisoning, and misuse. This session offers a clear executive lens on governing and securing AI to enable innovation while protecting public trust.

2:10 – 2:40pm PST Salon A

Session 6A - Concurrent Applied Session by Varonis: Navigating the Next Wave of AI Security Risk

2:10 – 2:40pm PST Salon B

Session 6B - Concurrent Applied Session by iON/Tenable: Proactive Exposure Management Across the Modern Attack Surface

As cyber threats become more complex, traditional vulnerability management isn’t enough. Exposure management offers a proactive, modern approach to identifying and reducing risk across IT, OT, cloud, identities, and applications. This session will explore how to gain unified visibility, understand critical attack paths, and reduce manual effort—helping you strengthen your security posture, minimize business impact and communicate risk throughout the organization.

2:10 – 2:40pm PST Salon C

Session 6C - Concurrent Applied Session by Arctic Wolf: Defending Against 2026’s Digital Threats: How to Combat Misinformation, AI Weaponization, and Ransomware

As global elections and major sporting events dominate headlines in 2026, organizations face unprecedented challenges: misinformation, disinformation, and the weaponization of AI. How can you safeguard your systems, users, and data in this evolving threat landscape?

Our experts will share insights drawn from hundreds of real-world digital forensics and incident response (DFIR) engagements worldwide, combined with research from our threat intelligence team. You’ll hear perspectives from Arctic Wolf specialists — including threat researchers, incident responders, and ransomware negotiators — to help you prepare for what’s ahead.

What you’ll learn:
-The top three industries most targeted by ransomware
-Why improved ransomware recovery is creating unexpected risks
-The social engineering tactic dominating 85% of cases
-Expert predictions for the threats organizations will face in 2026

2:10 – 2:40pm PST Theatre

Session 6D - Concurrent Applied Session by Cloudflare: The Rise of Volumetric DDOS - Attack of the TV's to Aisuru Botnets

Attack of the TV's to Aisuru Botnets profiles global volumetric DDOS attacks from 2024-2025 . The attacks underlines the increase in DDOS attacks and breaks down how volumetric attacks are rising in popularity and size within state and individual attackers.

2:10 – 2:40pm PST Saanich Room

Session 6E - Concurrent Applied Session by Cohesity: De-Risking Generative AI for Enterprises

Generative AI is advancing quickly in the enterprise, but trust, governance, and data control remain the primary barriers to scale. In this session, Bharath Nagaraj, Head of AI at Cohesity, presents a practical framework for de-risking generative AI adoption. The talk outlines an AI Trust Maturity model and shows how organizations can move from ad-hoc experimentation to governed, explainable, and audit-ready AI deployments. Attendees will learn four core priorities for safe GenAI scale: securing the data foundation, embedding governance and explainability, aligning AI with user workflows, and implementing guardrails that enable responsible innovation. The result is a clear blueprint for deploying generative AI with confidence, compliance, and measurable business value.

2:10 – 2:40pm PST Oak Bay Room

Session 6F - Concurrent Applied Session: Balancing Innovation and Privacy: AI Implementation in Alberta Healthcare

This presentation by Dr. J. Ross Mitchell covers the intersection of artificial intelligence and healthcare delivery in Alberta, organized around three themes. First, it introduces AI scribes — tools that record, transcribe, and summarize clinical encounters — with a focus on Berta, an open-source AI scribe developed in Alberta and now deployed across 105 AHS facilities by 198 emergency physicians, offering transparency, data sovereignty, and costs under $30 per physician per month. Second, it examines privacy considerations associated with commercial AI scribe platforms, including data storage location, retention policies, access controls, and the risk that many vendors train on clinical data. Third, it addresses the challenges researchers face in accessing de-identified health data for AI development, arguing that current data governance frameworks — designed decades ago — prioritize risk avoidance over the potential benefits of AI-driven clinical tools like early warning systems for patient deterioration.

After this presentation, participants should be able to: (1) describe how AI scribes function in clinical settings and articulate the advantages of open-source solutions such as Berta over commercial alternatives with respect to transparency, cost, and data governance; (2) identify key privacy considerations — including data storage, retention, third-party access, and model training practices — that healthcare organizations should evaluate when adopting AI-enabled tools; and (3) critically assess how existing health data access policies may need to evolve to balance patient privacy protections with the potential for AI research to improve clinical outcomes.

2:10 – 2:40pm PST Esquimalt Room

Session 6G - Concurrent Applied Session: Shadow AI - The Invisible Threat from your Most Productive Employees

This session examines how organisations can change from sanctions to sandboxes—providing secure, governed AI alternatives that meet productivity needs while addressing the socio-technical challenge through technical detection, organisational governance frameworks, board-level accountability, and zero-trust architectures. Drawing on multiple case studies, John Wunderlich provides you with actionable strategies for transforming Shadow AI from a liability into a governed capability.

2:40 – 3:05pm PST Upper & Lower Foyers

Afternoon Refreshment Break

3:05 – 4:05pm PST Salon A

Session 7A - Concurrent Panel: Children’s Privacy and Safety Regulation Policy: Canada’s Development of Children’s Privacy Framework

3:05 – 4:05pm PST Salon B

Session 7B - Concurrent Panel: Agentic AI: Fostering Responsible and Beneficial Development and Adoption

The emergence of agentic AI presents unprecedented opportunities, driving opportunities for innovation, scalability, and efficiency. This panel will explore best practices for implementing practical, governance-driven approaches to deploying agentic AI while navigating emerging risks, challenges and regulatory expectations.

3:05 – 4:05pm PST Salon C

Session 7C - Concurrent Panel: Misinformation/Disinformation

Misinformation and disinformation are reshaping public trust, policy, and digital ecosystems. The challenge of addressing the spread of false and misleading information is multifaceted and complex, with significant implications for democracy, privacy rights, and freedom of expression. With an emphasis on the role of transparency, this panel explores how different strategies, policies, and technologies can help support a healthy information ecosystem, strengthen public trust, and build resilience to mis- and disinformation.

3:05 – 4:05pm PST Theatre

Session 7D - Concurrent Panel: AI-powered Cyberattacks: Foreign Threats Driven by Geopolitical Conflict

Geopolitics is shaping an expanding and complex cyber threat landscape. State and non-state cyber actors are geopolitically motivated to engage in activity ranging from disruptive cyber threat activity to activity typically associated with criminals. Artificial intelligence is lowering the barriers to entry and increasing the effectiveness of malicious cyber threat activity. This session examines the increasing effectiveness of AI-powered cyberattacks from the perspective of both the attackers and the victims.

4:15 – 5:15pm PST Salon ABC

Session 8 - Privacy Commissioners Round Table

The intersection of groundbreaking technologies and the public interest is where you will find Canada’s privacy regulators. From AI to protecting children online, Commissioners have the challenging task of enabling the enormous potential that technologies offer while maintaining trust in those technologies by ensuring the protection of citizens’ rights. This special session will provide insight into how regulators do their work, with a focus on recent undertakings at a provincial, national and international level.

5:15 - 5:25pm PST Salon ABC

Session 9 - Remarks by ISACA Vancouver

Nick will close Day 1 by sharing insights shaped through 25 years of hands‑on work in cybersecurity, technology strategy, and organizational transformation — with a strong emphasis on how professional communities like ISACA strengthen the resilience of the sector.

5:25 – 5:30pm PST Salon ABC

Day 1 Closing Remarks

Thursday, March 5, 2026

8:00am PST Lower & Upper Foyers

Registration & Exhibit Floor Opens

8:30 – 8:40am PST Salon ABC

Administrative Announcements

8:40 – 9:10am PST Salon ABC

Session 10 - Keynote Address: Building Trust: Privacy and AI Governance

Like other data privacy authorities around the world, Privacy Commissioner of Canada Philippe Dufresne has been focused on issues such as AI governance and responsible innovation. In his keynote address, Commissioner Dufresne will talk about the work that his Office has been doing to shape the future of AI.

9:10 – 9:40am PST Salon ABC

Session 11 - Keynote Address

9:40 – 10:20am PST Salon ABC

Session 12 - Keynote Address by Cisco: Assuming Failure Provides Better Defensive Outcomes

In this session we will explore common adversarial tactics and the defensive capabilities to minimize these risks. This capability once operationalized provides a level of comfort but we as defenders need to proactively assume it will fail. Failure allows us to determine the next phase of the attack and therefore how we must advance our next phase of defensive capabilities. This provides a methodology that drives better overall cyber resilience even when we cannot get our risk mitigating capability 100% deployed 100% of the time - reality suggests 100% is rarely achieved throughout the lifecycle of most tooling. Time to rethink the approach.

10:20 – 10:55am PST Upper & Lower Foyers

Morning Coffee Break

10:55 – 11:55am PST Salon A

Session 13A - Concurrent Panel: Digital Payments - Identity Management: Agentic Commerce

10:55 – 11:55am PST Salon B

Session 13B - Concurrent Panel: Canadian Privacy Law Reform - Take 3

As the federal government signals a new effort to modernize PIPEDA, informed by Bills C-11 and C-27, this session will examine what the next generation of Canadian privacy law should retain, revise, or rethink. Panelists will discuss the strengths and gaps of the CPPA framework, its ability to address AI-driven data use and automated decision-making, and how future reforms can deliver greater regulatory certainty while reducing compliance risk. The conversation will focus on building a durable, adaptive privacy regime that supports innovation, interoperability, enforcement, and public trust.

10:55 – 11:55am PST Salon C

Session 13C - Concurrent Panel: Genetic Privacy - Their Data Your DNA (Investigative Genetic Genealogy)

The landscape of genetic privacy is increasingly complex as advancements in genomic research and technology continue to evolve. While genetic data holds significant promise for personalized medicine and innovative healthcare solutions, it also presents substantial challenges concerning data security, informed consent, and the risk of discrimination. Individuals may find themselves vulnerable to unauthorized access to their genetic information, raising concerns over who owns this data and how it may be utilized. Moreover, the current regulatory framework is often inadequate, leading to a lack of clarity and protection for individuals. Navigating these challenges presents an opportunity to create robust privacy policies and enhance public understanding, ultimately allowing for responsible use of genetic information while safeguarding individual rights.

10:55 – 11:55am PST Theatre

Session 13D - Concurrent Panel: Quantum Computing

This engaging panel explores the transformative impact of quantum computing on privacy and security in the current era. Panelists will discuss how advancing quantum technologies can strengthen national cybersecurity defenses while driving economic growth and innovation in Canada's quantum ecosystem and examine the risks to data privacy, encryption vulnerabilities, and the urgent need for ethical, risk-based regulatory frameworks to safeguard society.

12:00 – 12:30pm PST Salon B

Session 14B - Concurrent Keynote: Insecure Vibes: The Risks of AI-Assisted Coding

AI coding assistants like GitHub Copilot and ChatGPT are changing how developers write and ship software, faster than security teams can keep up. But speed comes at a cost: “vibe coding” encourages developers to trust confident-looking code that may be dangerously insecure.

In this talk, we’ll look at real-world examples and research showing how AI tools replicate and amplify insecure patterns, why traditional AppSec controls often fail to catch these issues in time, and how teams can adapt. We’ll explore modern strategies to make AI-assisted coding safer without making it slow (secure RAG references, MCP enforcement layers in the IDE, guardrails, policy integration, and developer education).

Whether you’re on the AppSec side or writing code, this session will equip you with a clearer threat model and practical tools to secure your AI-augmented SDLC.

12:00 – 12:30pm PST Theatre

Session 14C - Concurrent Keynote by Zscaler: From Zero Trust to Trusted AI: A Public Sector Perspective

As public sector organizations explore AI, the real challenge isn’t adoption - it’s governance, trust, and security at scale.

In this session, Zscaler and the British Columbia Investment Corporation (BCI) come together for a practical, experience-led discussion on how strong Zero Trust foundations enable responsible AI adoption. We’ll open with a short, educational perspective on how Zero Trust is evolving in the AI era, then move into a fireside chat with Michael Cavallin, Senior Manager of Cyber Security & Risk at BCI.

BCI has already embraced Zero Trust to secure its workforce. Now, like many organizations, it’s navigating AI policy, evaluating emerging tools, and determining how to safely enable generative and embedded AI - without introducing new risk.

This session focuses on real-world lessons and critical questions public sector leaders should be asking today:
- What needs to be in place before scaling AI?
- How do Zero Trust principles apply to AI use cases?
-How can organizations balance innovation with transparency and trust?

Attendees will leave with practical insights to help guide secure, responsible AI adoption in the public sector.

12:30 – 1:45pm PST Salon ABC

Lunch Break - Sponsored by PBC Solutions

1:45 – 2:45pm PST Salon A

Session 15A - Concurrent Panel: CISO Panel - Major Challenges and Opportunities in the New World of AI

1:45 – 2:45pm PST Salon B

Session 15B - Concurrent Panel: Data Security in the Age of Artificial Intelligence: Best Practices on Bringing AI Into Your Organization

Most organizations implementing AI are unknowingly creating their next major security incident. Join four leading experts from government research, privacy regulation, public sector infrastructure, and offensive security as they reveal the critical vulnerabilities most organizations miss when onboarding AI systems. Learn actionable frameworks for securing AI data pipelines, implementing technical controls for generative AI, and balancing innovation with security and privacy. Walk away with concrete strategies for responsible AI governance and vendor risk management that protect your organization while enabling innovation.

1:45 – 2:45pm PST Salon C

Session 15C - Concurrent Panel: What Breaks Next: AI, Privacy, and Trust

A fast, plain-language briefing on what’s most likely to fail next in AI, privacy, and trust, and what leaders can do now to reduce operational and public trust risk. Panelists will identify the key failure points to watch over the next five years, what they look like in practice, and what can prevent damage. We’ll also surface the internal habits that quietly create repeat breakdowns where leadership choices undermine outcomes with actionable solutions. The session closes with what makes privacy and security messaging backfire, and how to make it land.

1:45 – 2:45pm PST Theatre

Session 15D - Concurrent Panel: Canada’s Approach to Digital Regulation: Advancing a Digital North Star for Canada Amid a Fractured Firmament

Data policy—and consequently, the work of data governance professionals—is increasingly tied to broader currents in geopolitics. As Canada moves forward with potential PIPEDA reforms and other digital regulation strategies, what trends on a global scale should not be overlooked and how should they inform policymaking in Ottawa and beyond?

2:45 – 3:15pm PST Upper & Lower Foyers

Afternoon Refreshment Break

3:15 – 3:45pm PST Salon A

Session 16A - Concurrent Applied Session by X10 Technologies and Cynet: AI Arms Race: How Attackers Weaponize AI — And How Defenders Win

AI has become the ultimate force multiplier, for both innovation and cybercrime. Attackers are now using AI to launch hyper-realistic phishing, automate attacks, and bypass traditional defenses at unprecedented speed. The question is no longer if your organization will face AI-driven threats, but how prepared you are to stop them.
In this must-attend session, X10 Technologies and Cynet reveal how attackers are operationalizing AI and how defenders can fight back. Learn how modern security teams use AI-powered detection, automation, and unified visibility to outpace attackers, reduce risk, and regain control. Walk away with the insight and strategy needed to defend with confidence in the age of AI.

3:15 – 3:45pm PST Salon B

Session 16B - Concurrent Applied Session by Microserve: From Shadow to Signal: Making AI Safe, Transparent, and Productive

Shadow AI is becoming part of everyday work. Instead of treating it as a problem to shut down, what if we treated it as an opportunity to build trust, transparency, and better ways of working?

In this session, Microserve and SentinelOne team up to explore how organizations can understand what AI tools are being used, protect sensitive information, and still support employees who want to work smarter with AI. We’ll share simple, practical ways to introduce clear guardrails, create safer pathways for AI experimentation, and use real‑time insights to prevent risky behaviour without slowing people down.

You’ll walk away with a clearer picture of what Shadow AI really looks like inside organizations today and a roadmap for turning it from a hidden risk into a governed, trusted, and productive part of your workplace.

3:15 – 3:45pm PST Salon C

Session 16C - Concurrent Applied Session by Mimecast: Incydr & Human Risk Management with Mimecast

The way we work has changed. It's time data protection changes too. Join this interactive session hosted by Sinisha Erceg, Senior Sales Engineer with Mimecast, where we'll dive into robust strategies for insider risk management and data protection, helping you identify and mitigate internal threats before they become costly incidents.

3:15 – 3:45pm PST Theatre

Session 16D - Concurrent Applied Session by Forescout

3:15 – 3:45pm PST Saanich Room

Session 16E - Concurrent Applied Session: Inside the Mind: The Promise and Peril of Brainwave Technology

Advances in sensors, computing, and consumer devices have made brainwave measurement more accessible than ever, moving from research labs into homes, workplaces, and healthcare settings.

This talk explores how brainwave data is used today, from wellness and performance tools to clinical and occupational applications, and how it may be used in the future to dramatically improve brain health. At the same time, brainwaves offer a uniquely intimate window into our mental state, raising profound questions about privacy, consent, and misuse.

We’ll examine the benefits and risks of widespread brainwave measurement, how these technologies are currently regulated, and how companies navigate the line between wellness, healthcare, and surveillance. The goal is not to fear the technology, but to understand the responsibility that comes with reading the human mind.

3:15 – 3:45pm PST Oak Bay Room

Session 16F - Concurrent Applied Session by CIOCAN: Shared Vigilance: Bringing Cyber Risk Out of the SOC and into the Boardroom

Organizations of all sizes continue to face rising cyber threats, growing regulatory expectations, and increasingly complex technology environments—often without the luxury of large cybersecurity teams or dedicated leadership. In many cases, CIOs, CISOs, IT directors, and privacy leaders must manage enterprise‑level cyber risk “off the side of their desk,” all while communicating risks to executives who may not fully understand the technical implications.

In this applied, fireside‑style session, seasoned cybersecurity and technology leaders from CIO Association of Canada (https://www.ciocan.ca/) share practical, real‑world strategies for transforming cybersecurity from a technical discussion into a meaningful business conversation. Drawing on examples from public‑sector and private‑sector environments, the speakers will explore how to communicate risk in terms executives understand, build shared accountability, create urgency in organizations that have “never been breached,” and prioritize limited resources for maximum impact.

Attendees will leave with actionable insights on:
-Engaging boards and executive teams in cyber‑risk decisions
-Translating technical risk into business‑relevant terms
-Reducing the burden on CIOs/CISOs through shared ownership
-Avoiding the common pitfalls organizations face when security lacks senior advocacy

Whether you are a CIO, CISO, security leader, or privacy professional, this session offers pragmatic, practitioner‑level guidance for elevating cybersecurity to a true business conversation.

3:55 – 4:25pm PST Salon ABC

Session 17 - Closing Keynote Address: Strategic Outlook for a Disrupted Order: Privacy, Prosperity, Security, and Democratic Trust

Political, economic, financial and technological forces have profoundly disrupted the status quo on privacy and security. How did we get caught off guard? Why did we get blindsided? This keynote will outline the path forward for Canada—shifting from a reactive posture to taking the initiative and shaping the privacy and security environment in a way that is fit for purpose in the twenty-first century.

4:25 – 4:35pm PST Salon ABC

Closing Remarks & Announcements:

Title Sponsor

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Summit Sponsors & Marketing Partners

Hotel Room Block

Fairmont Empress Hotel Room Block

If you need to make accommodation arrangements, the Fairmont Empress is offering a special conference rate of $249/night for Corporate and Government reservations. Please note that this room block ends February 11, 2026.

Please contact the hotel directly at (250) 384-8111 or 1 (800) 230-6922 to book a room or book online using the following link. If booking by phone please indicate you are with the “28th Annual Victoria International Privacy & Security Summit” group.

Make online reservations here

Please note that once the above room block is full we do also have a special rate of $259/night still being offered if rooms are available in the hotel’s general inventory – to book at this rate please click here.

Fairmont Empress
721 Government Street
Victoria, BC
V8W 1W5

https://www.fairmont.com/empress-victoria/