
Toronto CISO Peer Roundtable
October 14, 2021 | 2:00pm EDT
October 14, 2021 | 2:00pm EDT
Securing the Sprawling Endpoint
Connect with a small group of C-level peers for a private, interactive conversation framed around a top priority for security leaders.
Join CISOs from the leading organizations in your area to discuss:
Securing critical applications even in a state of compromise
Tactics for monitoring a sprawling attack surface
Leveraging new technologies to quantify threats
Discussion Leaders
Members of the Toronto CISO community will lead the private, virtual discussion.

David Balcar
VMware Carbon Black
Security Strategist
Moderator

Michael Dundas
Manulife
Assistant Vice President of Cyber Protection
Discussion Leader

Stephen Kerkmann
Revera
Director IT Security & Risk Management
Discussion Leader
Agenda
October 14, 2021
2:00pm - 3:00pm EDT
Securing the Sprawling Endpoint
Hosted by VMware
The global health pandemic has forced CISOs into a new era of evolving challenges. With fully remote workforces and assets continuously moving to the cloud, securing endpoint protection has never been more critical. Attacks on third-party apps were the most experienced attack type in Canada, according to the recently released VMware Global Security Insights Report 2021. However, cloud-first maturity is also at the lowest level in Canada (only 25% of respondents said they were cloud-first for the more than 12 months) compared to other countries. So how are CISOs deploying next-generation endpoint protection to solve these obstacles?
Join this interactive session to discuss:
- Securing critical applications even in a state of compromise
- Tactics for monitoring a sprawling attack surface
- Leveraging new technologies to quantify threats
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.