
Toronto CISO Community
Executive Summit
December 12, 2023 | Beanfield Centre
December 12, 2023
Beanfield Centre
Collaborate with your peers
Get together with Toronto's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Quantifying the business's cyber-risk appetite and leveraging it to frame security investments
Improving the agility of security operating models to keep pace with organizational priorities
Modernizing IAM infrastructure to better support zero-trust/identity-first initiatives
Toronto CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Samer Adi
GreenShield
CISO

Sandra Liepkalns
Choice Properties REIT
VP, Information Security & Data Governance

Ranjika Manamperi
Ontario Power Generation
VP Cybersecurity & CISO
What to Expect
Agenda
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
You Speak, They Swarm — The Power of Story in Reaching Your Audience
Hosted by SentinelOne

Arthur Zards
Thought Leader, TED/TEDx Speaker, Coach & Producer
Speakers want action, not just applause. But busy executives don’t have time to learn complex communication models or esoteric storytelling processes — they need a simple, effective speaking framework that can help them not only connect with any audience, but also elicit real change. Enter the "Swarm Effect."
Join this session with Arthur Zards — a thought leader, TEDster and provocateur — to:
- Hone your skills in executive influence
- Adopt a more authentic and engaging approach to speaking
- Take your next presentation from “understandable” to “compelling"
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Our Threats are Your Risks — The Emerging Threat Landscape for Canadian Companies
Hosted by Wiz

Terry T
Unit Head, Toronto Region Cyber Investigations Unit
Canadian Security Intelligence Service

Tony Lee
Associate Director, CISO
Apotex
Join this open dialogue with a cyber expert from the Canadian Security Intelligence Service (CSIS) to discuss:
- How CSIS views the global and national threat environment, and what they are doing to combat it
- Strategies for addressing the emerging threat landscape
- How CISOs can build partnerships – with the government and their peers – to improve threat intel sharing
9:40am - 10:25am Executive Boardroom
Lessons Only a Breach Can Teach

Alfio Costantino
Director, IT Infrastructure, Support and Security
Canada Cartage

Ben Blakely
VP, Information Security & CISO
Maple Leaf Foods

Fred Hopper
VP, Security
Giesecke+Devrient Canada
In today's ever-changing threat landscape, data breaches are not an "if" but a "when", even for organizations with mature cybersecurity programs. To navigate a breach successfully and come out stronger, it is essential to communicate to the executive team, the board and regulators swiftly and confidently.
Join this executive boardroom for a candid, peer-driven conversation about:
- The reality of breaches and how to learn from them
- Fundamental priorities while responding and recovering
- The future of cyber breach reporting and recovery
9:40am - 10:25am Executive Boardroom
Securing the Sprawling Endpoint

Mark Pryce
Manager Cybersecurity
Toromont

Clifton Sookdeo
Director Information Security
Element Fleet Management
As enterprises increasingly make access to data more fluid and move assets to the cloud endpoint protection has become vital. These shifting perimeters lack clear definition and require new layers of security through endpoint protection.
Join this executive boardroom to connect with peers on your respective journeys of endpoint management, including concerns over vendor validation, data and asset visibility as well as success and failure stories related to:
- Tactics for monitoring a sprawling attack surface of connective devices
- Strategies to identify your most vulnerable endpoints
- Critical elements of a multi-layer approach to endpoint security
10:25am - 11:00am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:00am - 11:45am Breakout Session
Enabling A Secure Business with a Borderless Data Strategy
Hosted by Protegrity

Anthony Cammarano
Global VP Security, Privacy & Strategy
Protegrity
Borders come in many forms: geographic, political, cultural, legal, lines of business, third parties, etc. But our increasingly interconnected world has caused some of these previously hard lines to blur. In response, many regulatory bodies across the world have enacted laws governing the data within the borders they do control, leaving global enterprises to navigate a difficult balancing act of complying with a seemingly never-ending sea of red tape and providing enough access to data so teams can operate efficiently and effectively.
Join Anthony Cammarano, Protegrity's Global VP of Security, Privacy and Strategy in this session to discuss:
- How some of the world’s largest enterprises are addressing this burgeoning challenge
- Real-world examples demonstrating effectively leveraging cross-border and third-party data sharing for advanced AI
- Navigating and driving compliance across multiple - and sometimes disparate - data protection laws while maximizing business opportunities
11:00am - 11:45am Breakout Session
Finding Long-Term Success as a Security Leader

Andrew Faber
Director Security Technology Services
Toronto Pearson Airport

Brent Thomas
CISO
Traffic Tech
Being a well-rounded security leader can't be hacked. It takes consistent reflection and reinvention as the role, the industry, the world - and you - evolve. How do you ensure that you are continuing to meet the challenges of the modern security leader, while also making sure the role continues to serve you despite these ever-escalating nature of cybersecurity?
Join this interactive session to discuss:
- Identifying common threads of successful security leaders
- Building a strong network of support
- Sustaining long-term success as a security leader
11:00am - 11:45am Executive Boardroom
Break the Attack Chain — The Importance of Integrated Threat Protection
Hosted by Proofpoint

Brian Reed
Senior Director, Cybersecurity Strategy
Proofpoint

Sohaib Syeed Ahmed
Assistant Vice President, Information Security
First National Financial

Umar Hossain
Global Leader, IT Infrastructure & Operations
Mattr

Raghavendra Kumar
AVP CSOC Detection and Response & Application Security
Hudson's Bay Co
Organizations worldwide are being faced with multistage attacks such as BEC, ransomware, and supply chain, that happen with the same basic steps in the same sequence. It’s been a decade since defenders began referring to this as the attack chain, but the attacks continue to successful with the same tactics, from phishing to Active Directory abuse to data exfiltration. So how do we finally turn the tables on adversaries, and take away what they depend across the attack chain?
Join this interactive round table as CISOs discuss:
- Understanding the evolving nature of initial compromises
- The art and science of preventing small compromises from becoming big incidents
- Reducing your team's workload by using the attack chain to prioritize controls
11:00am - 11:45am Executive Boardroom
Strategic Pitfalls in Third-Party Risk Management
Hosted by RiskRecon, a Mastercard Company

Frank Konig
Sales Director, Canada
RiskRecon - A MasterCard Company

Shakeel Sagarwala
AVP, CISO
Canadian Tire Bank

Paul Min
VP, Technology Operations and Security
Cadillac Fairview
Managing cyber risk across an enterprise IT infrastructure has never been harder. Remote workers, advancing attack methods, and an ever-expanding vendor network are challenging every firm, as total visibility into threats has become nearly impossible. As digital business strategy matures, more organizations are becoming dependent on the cyber posture and protection of third parties. Third-party risks present a unique challenge because you are depending on vendors and partners to operate securely to keep your data and information safe. How are you mitigating the associated risks and demonstrating this to the business to ensure effective security programs?
Join this roundtable session to share and discuss:
- Common failings across TPRM programs that led to breach events
- How executives can provide strategic direction for third-party risk teams
- Key practices being implemented by leading vendor risk firms to maintain strong supply chain risk management
11:45am - 12:30pm Lunch Service
Apply to Participate
Apply to participate in the Toronto CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Beanfield CentreParking
Parking is available for $16 in the Enercare Centre underground garage. Use the East Garage Entrance off of Canada Blvd or the West Garage Entrance off of Nova Scotia Ave./Nunavut Road. Once parked, there are doors on the East End of the garage that access the underground tunnel that connects to the Beanfield Centre.
Hotels Nearby
111 Princes' Blvd, Toronto, ON M6K 3C3, Canada
290 m
550 Wellington St W, Toronto, ON M5V 2V4, Canada
1.7 km
Toronto Marriott City Centre Hotel
One Blue Jays Way, Toronto, ON M5V 1J4, Canada
2.1 km
*Evanta does not have any affiliation with the suggested hotels listed. The list above is solely for informational purposes.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.