IN-PERSON

Toronto CISO Executive Summit

June 25, 2025 | Marriott Downtown at CF Toronto Eaton Centre

June 25, 2025
Marriott Downtown at CF Toronto Eaton Centre

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Toronto's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Building cyber resilience to withstand and quickly recover from attacks

Implementing and optimizing robust data sharing and lifecycle management practices

Strengthening cybersecurity's influence as a key facilitator of enterprise risk decisions

Toronto CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Toronto CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 25, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Building a Powerful, Personal Executive Brand

Sean Barnes headshot

Sean Barnes

Executive Coach & Host, "The Way of the Wolf" podcast

Founder & Principal, WSS Solutions

Every leader has a reputation, but not every leader has a brand. And while both impact your success, an intentionally crafted executive brand not only speaks for you when you're not in the room but puts you in a position to attract, recognize and realize opportunities that further your goals.  

Sean Barnes — a CIO and CHRO turned executive coach — shares insights learned from his own journey of discovering and developing a powerful personal brand, highlighting the opportunities and challenges leaders face in doing so. You'll leave this talk inspired and empowered to take control of how the world sees you, with actionable tips for:

  • Becoming known for the things that matter to you
  • Crafting an executive brand that is authentically yours
  • Owning your brand inside and outside your organization

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Secure Identity. Secure Everything.

Sandeep Kumbhat headshot

Sandeep Kumbhat

Field CTO

Okta

CISOs know identity is the #1 attack vector, with over 80% of breaches stemming from an Identity attack. With identity playing such an integral role in keeping your organization secure, how can you strengthen your identity solution to work for you, not against you? 

Join this session to discuss:

  • Gaining end-to-end visibility and real-time remediation
  • Identifying, managing, and securing service accounts across the environment
  • Enforcing security policies and automating lifecycle management

9:40am - 10:25am  Executive Boardroom

Employing Cyber Intelligence to Improve Resiliency

Stephen Boyer headshot

Stephen Boyer

Co-founder & Chief Innovation Officer

BitSight

As cyber threats escalate, organizations must build resilience to effectively withstand and recover from attacks. Real-time threat intelligence provides CISOs with crucial insights to understand the company's risk landscape and respond swiftly. Cyber Threat Intelligence (CTI) is essential for fortifying resilience and enhancing communication with the C-suite and Board.

Join this session to discuss:

  • Leveraging CTI to align cybersecurity strategies with organizational goals
  • Using evidence-based threat intelligence to boost proactive defense and recovery
  • Improving communication with executive leadership on risk management strategies

9:40am - 10:25am  Executive Boardroom

Generative to Agentic — Is the Risk Worth the Evolution?

Anthony Scarfe headshot

Anthony Scarfe

Deputy CISO

Elastic

GenAI is changing rapidly, and the next major step is agentic AI — systems that are capable of taking actions without human oversight. This brings a new level of complexity, but there are benefits for security teams as well. Security leaders are now exploring the value and risk of agentic AI to determine how to advance safely. 

Join Elastic’s security leadership to explore:

  • The use of GenAI in security and how it's advanced to meet different team needs
  • How AI adoption changes your attack surface 
  • The different ways AI augments security teams and workflows

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Breakout Session presented by Proofpoint

Session details coming soon!

11:10am - 11:55am  Executive Boardroom

Fostering a Digital Native Mindset to Cybersecurity

It is clear in today's landscape that businesses must develop IT security strategies that not only respond to attacks but also prevent them from happening. Many organizations are shifting towards zero trust frameworks that focus on people, applications, and networks to meet this mission and digital native businesses are particularly well-poised to advance impactful zero trust initiatives.

Join this session to discuss:

  • Cultivating a digital native mindset across the organization
  • Analyzing organizations that found the right balance of innovation and security for strategic differentiation
  • Prioritizing seamless IT experiences that align with user needs and security requirements

11:10am - 11:55am  Executive Boardroom

From Chaos to Clarity ― AI’s Role in Data Security

Kayla Williams headshot

Kayla Williams

Field CISO

Cyera

As leaders, you're expected to enable secure, data-driven innovation. That requires a clear understanding of what data you have, where it resides, its risk, who can access it, and how it's used. This interactive discussion will explore how CISOs tackle data visibility and ensure compliance.

Join this session to discuss:

  • Gaining data visibility as a foundation for data governance
  • Navigating evolving data security regulations and standards
  • Enabling compliance through shared responsibility and the right tools

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Securing Data Flow in the AI-Quantum Era

Steve Riley headshot

Steve Riley

VP & Field CTO

Netskope

Sensitive data movement can be risky but restricting it outright can create operational and security challenges. In an era of agentic AI, generative AI, and emerging quantum computing, organizations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases and prepare for the post-quantum encryption (PQE) shift.

Join this keynote to learn:

  • How to choose the right secure access method for each use case
  • Why security must be adaptive to risk, user behavior and AI-driven interactions
  • How to prepare for post-quantum encryption and its enterprise security impact

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Going on the Offensive – The Art of Testing in Cyber Warfare

Kees Pouw headshot

Kees Pouw

CISO

Questrade

We’re all familiar with the idea that “the best defense is a good offense.” But for cybersecurity – where the mandate has always been “defend and protect” – how do CISOs truly go on the offensive? For Kees Pouw, CISO at Questrade, the answer lies in a high-fidelity cyber testing strategy. 

In this session, Kees shares how he built out an offensive security team that helped propel Questrade’s cybersecurity program, covering:

  • Challenges preventing CISOs from doing enough testing to build confidence in controls
  • Strategies and resources for building an offensive security strategy, whether inhouse or outsourced
  • Considerations on the use of GenAI by inhouse cybersecurity office team

1:30pm - 2:15pm  Executive Boardroom

Beyond the Noise – Real-World Threat Intel Strategies for Overwhelmed Security Teams

Michal Jankech headshot

Michal Jankech

Global VP of Enterprise, SMB & MSP

ESET

Canadian CISOs aren’t just battling malware—they’re managing analyst burnout, navigating U.S.-Canada political friction, and rethinking trust in their tech stacks. Add in adversarial AI, alert fatigue, and the eternal skills shortage, and you've got a landscape where threat intel can feel more like background noise than actionable signal. Meanwhile, AI is becoming the double-edged sword of our time—accelerating detection on one hand, fueling smarter phishing and deepfake attacks on the other.

Join this closed-door discussion to hear and discuss concrete insights for improving your threat intel program, including:

  • Making your threat intelligence program actually usable across strategic, tactical, and technical layers
  • Where to focus your limited people, money, and time without inducing a mutiny
  • What shifting global alliances and data politics mean for vendor selection, compliance, and resilience

1:30pm - 2:15pm  Executive Boardroom

Transitioning to Post-Quantum Cryptography is a Marathon, Not a Sprint

Agnelo Dias headshot

Agnelo Dias

VP, Information Security & IT Risk

IGM Financial

Quantum computing could make traditional cryptography unsafe within five years and break current encryption methods within ten years. Malicious actors are saving encrypted data now to decrypt it later when quantum computers are powerful enough. To protect against these future threats, governments and organizations are developing post-quantum cryptography (PQC) standards. As CISOs, it's important to stay updated with regulations and vendor capabilities for compliance and trust.

Join this roundtable session to:

  • Enhance your understanding of the post-quantum cryptography landscape/timeline
  • Connect with peers on how they are navigating quantum-readiness conversations
  • Delve into essential considerations for leading security teams in a post-quantum era

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Articulating Your Cybersecurity Program’s Business Value

Pierre Gourdon headshot

Pierre Gourdon

Executive Partner, Security & Risk Management

Gartner

There is no one-size-fits-all method for articulating cybersecurity business value to the board and other stakeholders, often making it a challenge for CISOs to compete for continued investment and buy-in. How can cybersecurity leaders translate the strategic benefits of their programs into business value when quantitative data is limited, unavailable or difficult to defend?

In this session, Gartner Executive Partner Pierre Gourdon leverages the latest insights from the Gartner Research team to facilitate an interactive discussion on:

  • Expressing the value of a cybersecurity in terms that relate to the board
  • Evaluating the capabilities of your security and risk management program
  • Developing a roadmap to balance risk management with facilitating business outcomes

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Rewiring Security – Leading Beyond the Reactive Loop

Mike Melo headshot

Mike Melo

VP Technology Shared Services & CISO

LifeLabs

Rob Oddi headshot

Rob Oddi

The Change Expert

Change Management, Culture & Leadership Expert

While most cybersecurity programs are trapped in an endless cycle of patches and fixes, true transformation happens when CISOs shift both their mindsets and methods to break free of traditional thinking and welcome innovation.

Join veteran CISO Mike Melo and transformation expert Rob Oddi for a candid dialogue about reimagining the entire mindset of security leadership, addressing key concerns like:

  • Reframing the role of security from reactive defense to strategic influence
  • Demonstrating business value that resonates from the boardroom to the server room
  • Embracing transformative change and driving true organizational impact

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by the Toronto CISO Governing Body.

June 25, 2025

We look forward to seeing you at an upcoming in-person gathering


Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


A block of rooms has been reserved at the Marriott Downtown at CF Toronto Eaton Centre at a reduced conference rate. Reservations should be made online or by calling 416-597-9200. Please mention Gartner Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $403 CAD (plus tax) is June 2, 2025.

Your Community Sponsors


CISO Thought Leaders
Key Sponsors
Program Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Lynn Morrow

Senior Community Program Manager

503-805-5624

lynn.morrow@gartner.com