2019 Toronto
Information Security Forum

#IANSToronto #IANSEvents

April 9 - 10, 2019
Sheraton Centre Toronto, 123 Queen Street West, Toronto, ON

The IANS 2019 Toronto Information Security Forum delivers an immersive curriculum with 30+ sessions led by esteemed IANS Faculty, global information security thought leaders and solution providers. Attend the two-day Forum to gain actionable technical solutions and leadership insights focused on current and emerging challenges facing enterprise security leaders. Network with peers to benchmark your information security practices and engage with IANS Faculty during interactive sessions.

Let your colleagues know you're coming!

This event has ended.

Check out our other upcoming events!

View All Events

DAY 1

Registration & Breakfast

Come check in to receive your program and CPEs while enjoying a complimentary continental breakfast.

IANS Welcome & State of the Industry

Come join us as we welcome you to the Forum.
Bobby Singh

Bobby Singh

CISO & global head of infrastructure, TMX Group

Bobby Singh, CISO and Global Head of Infrastructure, is responsible for delivering secure and highly available common technology services across TMX. As a member of the executive leadership team, Bobby is defining TMX's cyber security and technology vision and strategy, to advance the organizational agenda. He is responsible for TMX's corporate information and IT systems and services, as well as all aspects of security, governance, risk, and compliance. He  represents TMX in key forums focused on critical infrastructure, network evolution, intelligence, and availability. With more than two decades of executive experience, Bobby brings a wide range of technical and security knowledge to his current role. He has broad expertise in developing and implementing security programs for public and private sector organizations. Prior to joining TMX, Bobby has held positions at TD Bank, Rogers Communications and eHealth, where he designed multi-year technology and culture transformation programs. He received his MBA from University of Pittsburgh and holds CISSP, CISM, CISA and CPA designations.

Phil Gardner

Founder & Chief Executive Officer

Having built IANS’ end-user research offering, Phil now oversees all strategic and operational decisions at IANS. Phil began his career in security with seven years with the U.S. Navy as a Strike Fighter Pilot & Ordnance Requirements Officer. After receiving a Masters in Business Administration from Harvard Business School, he joined Goldman, Sachs & Co. in Mergers & Acquisitions and later became an associate with McKinsey & Company in Boston, MA. In 1996, Phil became one of the founders of Provant, Inc., a publicly traded training company serving the Fortune 1000 and Federal Government. He left Provant in 2000 to launch IANS. He graduated at the top of his class in US Navy Flight School.

Keynote Interview: A Discussion with Bobby Singh

with Bobby Singh and Phil Gardner

Join Phil Gardner and Bobby Singh, CISO at TMX, for an interview on what it’s like to be a CISO in today’s fast-changing environment. Topics for their discussion will include:

  • Tell us your story. How did you get your CISO job?
  • Give us some examples of how your InfoSec team supports your business.
  • Share a mistake that you’ve made. What did you learn?
  • How do you stay organized?

Tabletop Break

IANS Tabletops gives you an opportunity to connect with information security leaders in a relaxed environment. Come stretch your legs and network with your peers and solution providers over snacks and coffee.

Technology Spotlight Group 1

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
davi-ottenheimer

Davi Ottenheimer

IANS Faculty

Davi Ottenheimer is a security executive, board member and founder who has led global teams in developing and managing secure systems for more than twenty years. Currently he is working on product security at mongoDB making big data secure, IoT safe and AI trusted. Davi is also a recognized strategist and author specializing in cyber defense ethics and safely navigating the cultural disruptions of emerging technology. He co-authored in 2012 a cloud security book “Securing the Virtual Environment: How to Defend the Enterprise Against Attack” and is author of the upcoming book "Realities of Securing Big Data". Davi is a frequent top-rated public speaker and in 2018 he established the Excellence in Humanitarian Service Award at the RSA Conference; inaugural award was for building and managing resilient encryption systems that were instrumental to ending South African Apartheid. While serving as a Dedicated Paranoid at Yahoo! and responsible for managing security for hundreds of millions of mobile, broadband and digital home products, he invented an ephemeral authentication system for IoT that is in ubiquitous use today. An expert in governance, assessments, audit and compliance leadership Davi was a qualified PCI DSS and PA-DSS assessor (QSA and PA-QSA) for 7 years, and former Board Member for the Payment Card Industry Security Alliance and the Silicon Valley chapters of ISACA and OWASP. He received his postgraduate academic Master of Science degree in International History from the London School of Economics.

Morning Roundtable How-To Sessions Improve Infrastructure and Ops

DevSecOps Business Cases

with Davi Ottenheimer

Companies still struggle to get developers and security on the same page. They need case studies to show them where and how DevSecOps successes have happened. To that end, this session explores:

  • Case studies of DevSecOps done right
  • How to measure your maturity for DevSecOps -- Phase 1 to Phase 5, for example
  • How to put the “Shift Left” DevSecOps workflow in place
  • How DevSecOps leads to more secure cloud deployments
  • How to use DevSecOps to improve security in IoT technology when they are at the development stage
jake-williams

Jake Williams

IANS Faculty

Jake Williams, the founder of Rendition Infosec, has almost two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding Rendition Infosec, Williams worked with various government agencies in information security and CNO roles. He also works with SANS where he teaches and authors courses in Malware Reverse Engineering, Memory Forensics, Cyber Threat Intelligence, and Advanced Exploit Development. He is the two-time victor of the annual DC3 Forensics Challenge. He has spoken at Blackhat, DEFCON, Shmoocon, CEIC, RSA, EnFuse, and DC3 Conference (among others). His research areas include automating incident response throughout the enterprise, threat modeling and analysis, binary analysis, and malware C2. The primary focus of his work is increasing enterprise security by presenting complex topics in a way that anyone can understand.

Detect, Respond, and Recover

Phishing and Social Engineering: New Solutions to an Old Problem

with Jake Williams

Phishing is an old social engineering technique and organizations have certainly tried to make employees aware of email links they shouldn’t open. But phishing remains a highly successful technique for the bad guys. So what do we keep doing wrong? This session explores:

  • New phishing security tools that may help
  • What organizations can do to enhance security awareness among employees
george-gerchow

George Gerchow

IANS Faculty

As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines. Mr. Gerchow has years of practical experience in building agile security, compliance and, modern day Security Operation Centers in rapid development organizations. These insights make him a highly regarded speaker, and invited panelist on topics including DevSecOps, cloud secure architecture design, virtualization, compliance, configuration management, and operational security and compliance. George has been on the bleeding edge of public cloud security and privacy since being a co-founder of the VMware Center for Policy & Compliance. Mr. Gerchow is also an active Board Member for several technology start-ups and the co-author of the Center for Internet Security - Quick Start Cloud Infrastructure Benchmark v1.0.0 and the MISTI Fundamentals in Cloud Security. He is a Faculty Member for IANS (Institute for Applied Network Security) and Cloud Academy.

Manage Privacy and Risk

GDPR: Learning from EU Regulatory Enforcement Actions

with George Gerchow

The EU hasn’t found its posterchild for GDPR punishment yet. Companies are left guessing what they still must do and how much time they’ll have to do it. To help prepare you, this session will explore:

  • How to use EU enforcement actions as a guide to assess GDPR strengths and weaknesses
  • Preparing for the chance your company will eventually be found lacking by regulators
mike-rothman

Mike Rothman

IANS Faculty

Mike has been in the information security industry for over 10 years. He is currently President and Analyst at Securosis, a firm exclusively focused on information security and research analysis. He started Security Incite in 2006 to provide the "voice of reason" in what was considered an overhyped, yet underwhelming security industry. After a brief detour as SVP, Strategy and Chief Marketing Officer at eIQNetworks, Mike joined Securosis at the start of 2010 with a "rejuvenated cynicism" about security. In 2007, Mike published "The Pragmatic CSO" to introduce technically oriented security professionals to the nuances of what is required to become a senior security professional.

Detect, Respond and Recover

How to Fill SIEM Gaps with UEBA/SOAR

with Mike Rothman

Organizations want their SIEM to alert them in real time, but that’s not happening. Instead, their SIEM only helps determine how a breach occurred after the fact. Practitioners have heard that UEBA and SOAR can be used to overcome the limits of their current SIEM set up, but they seek concrete answers about how it all works and what kind of training and investments are required. In this session, attendees will learn:

  • The specific actions they must take in order to fully understand where their SIEM is hitting the wall,
  • A list of ways to tell if their MSSP is properly goaled/resourced/qualified to correlate and alert in real time, and
  • A clearer understanding of the small and well-defined situations AI/ML is best suited for.

Technology Spotlight Group 1

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
Hardik Modi

Hardik Modi

Netscout | Arbor, Senior Director of Security Research

Senior Director of Security Research, Netscout | Arbor

Lunch & Sponsor Keynote: The World of Internet-Scale Threats

with Hardik Modi

The largest DDoS attack on record, the evolution of IoT botnets, the inclusion of worms across the crime landscape, supply chain attacks by APT – the past year has been a busy one on the threat landscape. This talk covers the findings captured in the recent NETSCOUT Threat Intelligence Report, going behind the scenes to discuss the significance and import of each of them.

jake-williams

Jake Williams

IANS Faculty

Jake Williams, the founder of Rendition Infosec, has almost two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding Rendition Infosec, Williams worked with various government agencies in information security and CNO roles. He also works with SANS where he teaches and authors courses in Malware Reverse Engineering, Memory Forensics, Cyber Threat Intelligence, and Advanced Exploit Development. He is the two-time victor of the annual DC3 Forensics Challenge. He has spoken at Blackhat, DEFCON, Shmoocon, CEIC, RSA, EnFuse, and DC3 Conference (among others). His research areas include automating incident response throughout the enterprise, threat modeling and analysis, binary analysis, and malware C2. The primary focus of his work is increasing enterprise security by presenting complex topics in a way that anyone can understand.

Afternoon Roundtable Workshop Sessions Secure the Cloud

Adapting the SOC to a Cloud Environment

with Jake Williams

Security Operations Centers remain rooted in the same tech, procedures and mindsets that existed before the cloud. They need to adapt to life in the cloud, and this session will explore how to get there. Issues addressed include:

  • How an old-world SOC differs from one in the cloud
  • Changes you need to make with your SOC
  • How to make that transition without dropping the ball in either world
  • Skills that need to be picked up in the new cloud-based SOC
  • Examples of cloud detection and response
george-gerchow

George Gerchow

IANS Faculty

As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines. Mr. Gerchow has years of practical experience in building agile security, compliance and, modern day Security Operation Centers in rapid development organizations. These insights make him a highly regarded speaker, and invited panelist on topics including DevSecOps, cloud secure architecture design, virtualization, compliance, configuration management, and operational security and compliance. George has been on the bleeding edge of public cloud security and privacy since being a co-founder of the VMware Center for Policy & Compliance. Mr. Gerchow is also an active Board Member for several technology start-ups and the co-author of the Center for Internet Security - Quick Start Cloud Infrastructure Benchmark v1.0.0 and the MISTI Fundamentals in Cloud Security. He is a Faculty Member for IANS (Institute for Applied Network Security) and Cloud Academy.

Secure the Cloud

Choosing a Cloud Provider

with George Gerchow

There are too many vendors, an over-saturated market and confusion over the security requirements that truly matter vs. the vendor fluff. In this session, you’ll learn how cut through the confusion and address:

  • What the cloud provider landscape look like
  • When to go with a big player as opposed to smaller players
  • Questions you should ask internally before looking at potential providers
  • The right (or wrong) questions to ask prospective cloud providers
davi-ottenheimer

Davi Ottenheimer

IANS Faculty

Davi Ottenheimer is a security executive, board member and founder who has led global teams in developing and managing secure systems for more than twenty years. Currently he is working on product security at mongoDB making big data secure, IoT safe and AI trusted. Davi is also a recognized strategist and author specializing in cyber defense ethics and safely navigating the cultural disruptions of emerging technology. He co-authored in 2012 a cloud security book “Securing the Virtual Environment: How to Defend the Enterprise Against Attack” and is author of the upcoming book "Realities of Securing Big Data". Davi is a frequent top-rated public speaker and in 2018 he established the Excellence in Humanitarian Service Award at the RSA Conference; inaugural award was for building and managing resilient encryption systems that were instrumental to ending South African Apartheid. While serving as a Dedicated Paranoid at Yahoo! and responsible for managing security for hundreds of millions of mobile, broadband and digital home products, he invented an ephemeral authentication system for IoT that is in ubiquitous use today. An expert in governance, assessments, audit and compliance leadership Davi was a qualified PCI DSS and PA-DSS assessor (QSA and PA-QSA) for 7 years, and former Board Member for the Payment Card Industry Security Alliance and the Silicon Valley chapters of ISACA and OWASP. He received his postgraduate academic Master of Science degree in International History from the London School of Economics.

Improve Infrastructure and Ops

IoT: Who Owns Device Risk Management

with Davi Ottenheimer

There’s no clear consensus on who is responsible for managing risks associated with IoT devices in an organization. This session is designed to clear up that confusion. Attendees will learn:

  • Where all the IOT devices are
  • The breakdown of who should be in charge of security risks related to IOT
  • How to assemble a responsibility tree for who does what if an IOT-related compromise happens
mike-rothman

Mike Rothman

IANS Faculty

Mike has been in the information security industry for over 10 years. He is currently President and Analyst at Securosis, a firm exclusively focused on information security and research analysis. He started Security Incite in 2006 to provide the "voice of reason" in what was considered an overhyped, yet underwhelming security industry. After a brief detour as SVP, Strategy and Chief Marketing Officer at eIQNetworks, Mike joined Securosis at the start of 2010 with a "rejuvenated cynicism" about security. In 2007, Mike published "The Pragmatic CSO" to introduce technically oriented security professionals to the nuances of what is required to become a senior security professional.

Advance Your Team

Case Study: Building a Better Security Culture

with Mike Rothman

Companies struggle to find a successful recipe for their security culture and need a concrete example of what another company has done to get it right. This session will offer:

  • A case study for a company that has succeeded in growing a true security culture
  • Three things you can do to change that trajectory and actually make your program effective
  • Ways to expand the team with non-traditional security staff (i.e. ambassadors/champions)

Technology Spotlight Group 2

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.

Tabletop Break

IANS Tabletops gives you an opportunity to connect with information security leaders in a relaxed environment. Come stretch your legs and network with your peers and solution providers over snacks and coffee.

Technology Spotlight Group 2

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
jake-williams

Jake Williams

IANS Faculty

Jake Williams, the founder of Rendition Infosec, has almost two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding Rendition Infosec, Williams worked with various government agencies in information security and CNO roles. He also works with SANS where he teaches and authors courses in Malware Reverse Engineering, Memory Forensics, Cyber Threat Intelligence, and Advanced Exploit Development. He is the two-time victor of the annual DC3 Forensics Challenge. He has spoken at Blackhat, DEFCON, Shmoocon, CEIC, RSA, EnFuse, and DC3 Conference (among others). His research areas include automating incident response throughout the enterprise, threat modeling and analysis, binary analysis, and malware C2. The primary focus of his work is increasing enterprise security by presenting complex topics in a way that anyone can understand.

Afternoon Roundtable Workshop Sessions Detect, Respond and Recover

The Changing Face of Ransomware

with Jake Williams

Ransomware continues to be a significant problem for many organizations, and it has shown a ferocious ability to evolve. One reason is ransomware as a service, where people with little skill can buy ransomware-making kits online. This session explores:

  • Ways ransomware has evolved in the last 6-12 months
  • What ransomware as a service looks like and why it’s such a problem
  • What vendors are doing to get ahead of the bad guys
george-gerchow

George Gerchow

IANS Faculty

As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines. Mr. Gerchow has years of practical experience in building agile security, compliance and, modern day Security Operation Centers in rapid development organizations. These insights make him a highly regarded speaker, and invited panelist on topics including DevSecOps, cloud secure architecture design, virtualization, compliance, configuration management, and operational security and compliance. George has been on the bleeding edge of public cloud security and privacy since being a co-founder of the VMware Center for Policy & Compliance. Mr. Gerchow is also an active Board Member for several technology start-ups and the co-author of the Center for Internet Security - Quick Start Cloud Infrastructure Benchmark v1.0.0 and the MISTI Fundamentals in Cloud Security. He is a Faculty Member for IANS (Institute for Applied Network Security) and Cloud Academy.

Secure the Cloud

Achieving Cloud Migration

with George Gerchow

Fortune 1000 organizations have a complex legacy of platforms, software and networks, and there’s no single playbook to move it all to a new platform because each piece of infrastructure is so different. But there are ways to achieve success. This session will show you how by addressing:

  • The proper sequence of events?
  • Problems to expect in different industries and from different data types
  • Regulatory considerations
  • Tools of note
  • How Hashicorp and the Shared Responsibility Model can help
mike-rothman

Mike Rothman

IANS Faculty

Mike has been in the information security industry for over 10 years. He is currently President and Analyst at Securosis, a firm exclusively focused on information security and research analysis. He started Security Incite in 2006 to provide the "voice of reason" in what was considered an overhyped, yet underwhelming security industry. After a brief detour as SVP, Strategy and Chief Marketing Officer at eIQNetworks, Mike joined Securosis at the start of 2010 with a "rejuvenated cynicism" about security. In 2007, Mike published "The Pragmatic CSO" to introduce technically oriented security professionals to the nuances of what is required to become a senior security professional.

Secure the Cloud

Comparing Google to the Big Cloud Providers

with Mike Rothman

Fortune 1000 companies struggle to grasp the management, technological and architectural differences between Google Cloud and AWS/Azure. Since many are either going the all-Google route or using both, they need clarity. This session will explore:

  • Differences between AWS, Azure and Google Cloud
  • Instances where one should be deployed over the other
  • Which security tools work better for each
davi-ottenheimer

Davi Ottenheimer

IANS Faculty

Davi Ottenheimer is a security executive, board member and founder who has led global teams in developing and managing secure systems for more than twenty years. Currently he is working on product security at mongoDB making big data secure, IoT safe and AI trusted. Davi is also a recognized strategist and author specializing in cyber defense ethics and safely navigating the cultural disruptions of emerging technology. He co-authored in 2012 a cloud security book “Securing the Virtual Environment: How to Defend the Enterprise Against Attack” and is author of the upcoming book "Realities of Securing Big Data". Davi is a frequent top-rated public speaker and in 2018 he established the Excellence in Humanitarian Service Award at the RSA Conference; inaugural award was for building and managing resilient encryption systems that were instrumental to ending South African Apartheid. While serving as a Dedicated Paranoid at Yahoo! and responsible for managing security for hundreds of millions of mobile, broadband and digital home products, he invented an ephemeral authentication system for IoT that is in ubiquitous use today. An expert in governance, assessments, audit and compliance leadership Davi was a qualified PCI DSS and PA-DSS assessor (QSA and PA-QSA) for 7 years, and former Board Member for the Payment Card Industry Security Alliance and the Silicon Valley chapters of ISACA and OWASP. He received his postgraduate academic Master of Science degree in International History from the London School of Economics.

Improve Infrastructure and Ops

Advances in Network Visibility

with Davi Ottenheimer

Network security and monitoring remains essential in light of increasing volumes of data and an ever-expanding threat landscape, but comprehensive network visibility is hard, and organizations need better guidance. This session aims to provide that by looking at:

  • What organizations are missing and which vendors and techniques can help

Networking Reception

Come network with your peers! Hors d'eouvres and cocktails will be served!

DAY 2

Registration & Breakfast

Come check in to receive your program and CPEs while enjoying a complimentary continental breakfast.
george-gerchow

George Gerchow

IANS Faculty

As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines. Mr. Gerchow has years of practical experience in building agile security, compliance and, modern day Security Operation Centers in rapid development organizations. These insights make him a highly regarded speaker, and invited panelist on topics including DevSecOps, cloud secure architecture design, virtualization, compliance, configuration management, and operational security and compliance. George has been on the bleeding edge of public cloud security and privacy since being a co-founder of the VMware Center for Policy & Compliance. Mr. Gerchow is also an active Board Member for several technology start-ups and the co-author of the Center for Internet Security - Quick Start Cloud Infrastructure Benchmark v1.0.0 and the MISTI Fundamentals in Cloud Security. He is a Faculty Member for IANS (Institute for Applied Network Security) and Cloud Academy.

IANS Faculty Keynote: Building a DevSecOps Team and Methodology

with George Gerchow

DevSecOps is the process and practice of development that makes every team member responsible for safety. By stressing a security-first, security-always approach, DevSecOps incorporates security into the code level. It builds infrastructure and applications that can securely scale at the speed of modern business. But for those building a team and methodology, where do you begin? In this keynote, IANS Faculty member George Gerchow will present an outline. Discussion points will include:

  • 6 steps to bake security into the DNA of your company
  • Streamlining traditional processes with automation
  • Agility and transparency as the keys to success

Technology Spotlight Sessions Group 2

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.

Technology Spotlight Sessions Group 2

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.

Tabletop Break

IANS Tabletops gives you an opportunity to connect with information security leaders in a relaxed environment. Come stretch your legs and network with your peers and solution providers over snacks and coffee.

mike-rothman

Mike Rothman

IANS Faculty

Mike has been in the information security industry for over 10 years. He is currently President and Analyst at Securosis, a firm exclusively focused on information security and research analysis. He started Security Incite in 2006 to provide the "voice of reason" in what was considered an overhyped, yet underwhelming security industry. After a brief detour as SVP, Strategy and Chief Marketing Officer at eIQNetworks, Mike joined Securosis at the start of 2010 with a "rejuvenated cynicism" about security. In 2007, Mike published "The Pragmatic CSO" to introduce technically oriented security professionals to the nuances of what is required to become a senior security professional.

Morning Roundtable How-To Sessions Secure the Cloud

The Cloud Security Maturity Roadmap

with Mike Rothman

Securing the cloud is fundamentally different from how it’s done on-premises, yet there are very few guidebooks or clear methods to ensure adequate protection. This session will take you to the next level by exploring:

  • The Securosis/IANS Cloud Security Maturity Model
  • The difference between being a cloud native and a cloud tourist
  • Best practices to set up a secure cloud environment
  • How serverless functions enable continuous cloud security
  • How to implement guardrails around your Cloud
george-gerchow

George Gerchow

IANS Faculty

As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines. Mr. Gerchow has years of practical experience in building agile security, compliance and, modern day Security Operation Centers in rapid development organizations. These insights make him a highly regarded speaker, and invited panelist on topics including DevSecOps, cloud secure architecture design, virtualization, compliance, configuration management, and operational security and compliance. George has been on the bleeding edge of public cloud security and privacy since being a co-founder of the VMware Center for Policy & Compliance. Mr. Gerchow is also an active Board Member for several technology start-ups and the co-author of the Center for Internet Security - Quick Start Cloud Infrastructure Benchmark v1.0.0 and the MISTI Fundamentals in Cloud Security. He is a Faculty Member for IANS (Institute for Applied Network Security) and Cloud Academy.

Manage Privacy and Risk

Building a Better Privacy Program

with George Gerchow

The existing and forecasted data privacy/protection legislation is taxing the current privacy model inside large organizations. This session will explore how the CISO and CPO can mature their orgs to meet the new level of regulation. Topics to be explored:

  • How these regulations are changing the privacy function inside organizations
  • Key areas where you need to mature your privacy function
  • What new skills are required?
  • What changes are needed in people, processes and tech
  • How to clarify what GDPR is really requiring when it comes to having a CPO
  • What responsibilities fall under security vs. privacy?
jake-williams

Jake Williams

IANS Faculty

Jake Williams, the founder of Rendition Infosec, has almost two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding Rendition Infosec, Williams worked with various government agencies in information security and CNO roles. He also works with SANS where he teaches and authors courses in Malware Reverse Engineering, Memory Forensics, Cyber Threat Intelligence, and Advanced Exploit Development. He is the two-time victor of the annual DC3 Forensics Challenge. He has spoken at Blackhat, DEFCON, Shmoocon, CEIC, RSA, EnFuse, and DC3 Conference (among others). His research areas include automating incident response throughout the enterprise, threat modeling and analysis, binary analysis, and malware C2. The primary focus of his work is increasing enterprise security by presenting complex topics in a way that anyone can understand.

Detect, Respond and Recover

Deception and Honeypots

with Jake Williams

Companies struggle enough with basic security tasks and don’t truly know if deception/honeypots are worth trying or if they would provide the adequate ROI. To help them reach a better place, this session will explore:

  • What level of operational maturity one must have for honeypots/deception to make sense?
  • How to find balance when it comes to how many doors to leave open for snoopers and would-be thieves
  • The latest honeypot/deception technologies worth deploying
  • The management/technology overhang associated with them?
  • Buying versus building
davi-ottenheimer

Davi Ottenheimer

IANS Faculty

Davi Ottenheimer is a security executive, board member and founder who has led global teams in developing and managing secure systems for more than twenty years. Currently he is working on product security at mongoDB making big data secure, IoT safe and AI trusted. Davi is also a recognized strategist and author specializing in cyber defense ethics and safely navigating the cultural disruptions of emerging technology. He co-authored in 2012 a cloud security book “Securing the Virtual Environment: How to Defend the Enterprise Against Attack” and is author of the upcoming book "Realities of Securing Big Data". Davi is a frequent top-rated public speaker and in 2018 he established the Excellence in Humanitarian Service Award at the RSA Conference; inaugural award was for building and managing resilient encryption systems that were instrumental to ending South African Apartheid. While serving as a Dedicated Paranoid at Yahoo! and responsible for managing security for hundreds of millions of mobile, broadband and digital home products, he invented an ephemeral authentication system for IoT that is in ubiquitous use today. An expert in governance, assessments, audit and compliance leadership Davi was a qualified PCI DSS and PA-DSS assessor (QSA and PA-QSA) for 7 years, and former Board Member for the Payment Card Industry Security Alliance and the Silicon Valley chapters of ISACA and OWASP. He received his postgraduate academic Master of Science degree in International History from the London School of Economics.

Protect Applications and Data

Prioritizing Privilege Management

with Davi Ottenheimer

As IT infrastructure gets more complex and infrastructure-as-a-service (IaaS) becomes a reality, one of the few controls we have left is privileged user management (PUM). But it’s difficult to get it right. To advance in the right direction, this session will explore:

  • How to link privileged access management to change management
  • How to identify what is happening with the use of these credentials
  • How to Identify the appropriate tools to use for privileged access management
  • How to handle insider threats related to privilege abuse/misuse
Wade Lance

Wade Lance

Illusive Networks, Principal Solutions Architect

Lunch & Sponsor Keynote: Attackers Live off the Land; Starve Them to Stop Them

with Wade Lance

Every day, users and processes in your network leave goodies for attackers—credentials and connections that enable lateral movement and network persistence. In this session, we’ll show how to reveal this facet of the attack surface and audit the effectiveness of control systems like Active Directory, PAM and IAM solutions.

Technology Spotlight Sessions Group 1

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.

Technology Spotlight Sessions Group 1

Join the Technology Spotlight session where Sponsors will present their innovative technology. Each session will last 35 minutes and are both technical and educational in nature. This is your opportunity to stay current on emerging technologies and see what is going on in the space.
mike-rothman

Mike Rothman

IANS Faculty

Mike has been in the information security industry for over 10 years. He is currently President and Analyst at Securosis, a firm exclusively focused on information security and research analysis. He started Security Incite in 2006 to provide the "voice of reason" in what was considered an overhyped, yet underwhelming security industry. After a brief detour as SVP, Strategy and Chief Marketing Officer at eIQNetworks, Mike joined Securosis at the start of 2010 with a "rejuvenated cynicism" about security. In 2007, Mike published "The Pragmatic CSO" to introduce technically oriented security professionals to the nuances of what is required to become a senior security professional.

Afternoon Roundtable How-To Sessions Improve Infrastructure and Ops

Vendor Optimization: Thinning the Herd

with Mike Rothman

There are too many security vendors that have expanded offerings in a way that has created a lot of overlap and complexity within Fortune 1000 companies’ environments. This session will explore:

  • How to do an assessment and logically start pruning your stack
  • How one tool can replace several others without loss of functionality or controls coverage
  • The most important questions to ask your existing and prospective vendors in order to determine where the overlap exists
  • Specific examples of what you can kill?
  • Integrations between products that currently exist but are not being leveraged
george-gerchow

George Gerchow

IANS Faculty

As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines. Mr. Gerchow has years of practical experience in building agile security, compliance and, modern day Security Operation Centers in rapid development organizations. These insights make him a highly regarded speaker, and invited panelist on topics including DevSecOps, cloud secure architecture design, virtualization, compliance, configuration management, and operational security and compliance. George has been on the bleeding edge of public cloud security and privacy since being a co-founder of the VMware Center for Policy & Compliance. Mr. Gerchow is also an active Board Member for several technology start-ups and the co-author of the Center for Internet Security - Quick Start Cloud Infrastructure Benchmark v1.0.0 and the MISTI Fundamentals in Cloud Security. He is a Faculty Member for IANS (Institute for Applied Network Security) and Cloud Academy.

Secure the Cloud

Security Tools for a Multi-Platform Cloud Environment

with George Gerchow

It’s difficult to choose and implement security tools that scale in an environment where multiple platforms have different settings, features and requirements. This session will address the technical remedies, including:

  • Differences to accounted for between one platform and the next during tool selection
  • Different vendor and tool categories and how do they compare
  • Pros and cons of multi-cloud access brokers?
jake-williams

Jake Williams

IANS Faculty

Jake Williams, the founder of Rendition Infosec, has almost two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding Rendition Infosec, Williams worked with various government agencies in information security and CNO roles. He also works with SANS where he teaches and authors courses in Malware Reverse Engineering, Memory Forensics, Cyber Threat Intelligence, and Advanced Exploit Development. He is the two-time victor of the annual DC3 Forensics Challenge. He has spoken at Blackhat, DEFCON, Shmoocon, CEIC, RSA, EnFuse, and DC3 Conference (among others). His research areas include automating incident response throughout the enterprise, threat modeling and analysis, binary analysis, and malware C2. The primary focus of his work is increasing enterprise security by presenting complex topics in a way that anyone can understand.

Detect, Respond and Recover

Insider Threats

with Jake Williams

Companies are usually unaware that a malicious insider is up to no good in their networks until it’s too late. They need help knowing how to identify early red flags. To that end, this session will explore:

  • Early red flags to look for
  • Security controls you can put in place to detect and prevent insider threat activity
  • Top insider threat monitoring solutions, their strengths and weaknesses
  • Detection tool essentials
davi-ottenheimer

Davi Ottenheimer

IANS Faculty

Davi Ottenheimer is a security executive, board member and founder who has led global teams in developing and managing secure systems for more than twenty years. Currently he is working on product security at mongoDB making big data secure, IoT safe and AI trusted. Davi is also a recognized strategist and author specializing in cyber defense ethics and safely navigating the cultural disruptions of emerging technology. He co-authored in 2012 a cloud security book “Securing the Virtual Environment: How to Defend the Enterprise Against Attack” and is author of the upcoming book "Realities of Securing Big Data". Davi is a frequent top-rated public speaker and in 2018 he established the Excellence in Humanitarian Service Award at the RSA Conference; inaugural award was for building and managing resilient encryption systems that were instrumental to ending South African Apartheid. While serving as a Dedicated Paranoid at Yahoo! and responsible for managing security for hundreds of millions of mobile, broadband and digital home products, he invented an ephemeral authentication system for IoT that is in ubiquitous use today. An expert in governance, assessments, audit and compliance leadership Davi was a qualified PCI DSS and PA-DSS assessor (QSA and PA-QSA) for 7 years, and former Board Member for the Payment Card Industry Security Alliance and the Silicon Valley chapters of ISACA and OWASP. He received his postgraduate academic Master of Science degree in International History from the London School of Economics.

Improve Infrastructure and Ops

Cutting Through the AI/ML Vendor Hype

with Davi Ottenheimer

Vendors hype the benefits of AI/ML too broadly when it’s really meant for small, well-defined situations. This session will address the following:

  • When we say AI/ML is for small or well-defined situations, what are examples of those?
  • What are specific examples of where AI/ML works, and where it doesn’t?

Closing Ceremonies

2019 Toronto Speakers

george-gerchow

George Gerchow

IANS Faculty

As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines. Mr. Gerchow has years of practical experience in building agile security, compliance and, modern day Security Operation Centers in rapid development organizations. These insights make him a highly regarded speaker, and invited panelist on topics including DevSecOps, cloud secure architecture design, virtualization, compliance, configuration management, and operational security and compliance. George has been on the bleeding edge of public cloud security and privacy since being a co-founder of the VMware Center for Policy & Compliance. Mr. Gerchow is also an active Board Member for several technology start-ups and the co-author of the Center for Internet Security - Quick Start Cloud Infrastructure Benchmark v1.0.0 and the MISTI Fundamentals in Cloud Security. He is a Faculty Member for IANS (Institute for Applied Network Security) and Cloud Academy.

Presentations
  • Choosing a Cloud ProviderDAY 112:00 AM - 12:00 AM
  • Achieving Cloud MigrationDAY 112:00 AM - 12:00 AM
  • GDPR: Learning from EU Regulatory Enforcement ActionsDAY 112:00 AM - 12:00 AM
  • Security Tools for a Multi-Platform Cloud EnvironmentDAY 212:00 AM - 12:00 AM
  • Building a Better Privacy ProgramDAY 212:00 AM - 12:00 AM
  • IANS Faculty Keynote: Building a DevSecOps Team and MethodologyDAY 29:00 AM - 9:30 AM
Wade Lance

Wade Lance

Illusive Networks, Principal Solutions Architect

Presentations
  • Lunch & Sponsor Keynote: Attackers Live off the Land; Starve Them to Stop ThemDAY 212:50 PM - 1:40 PM
Hardik Modi

Hardik Modi

Netscout | Arbor, Senior Director of Security Research

Senior Director of Security Research, Netscout | Arbor

Presentations
  • Lunch & Sponsor Keynote: The World of Internet-Scale ThreatsDAY 112:00 PM - 12:50 PM
davi-ottenheimer

Davi Ottenheimer

IANS Faculty

Davi Ottenheimer is a security executive, board member and founder who has led global teams in developing and managing secure systems for more than twenty years. Currently he is working on product security at mongoDB making big data secure, IoT safe and AI trusted. Davi is also a recognized strategist and author specializing in cyber defense ethics and safely navigating the cultural disruptions of emerging technology. He co-authored in 2012 a cloud security book “Securing the Virtual Environment: How to Defend the Enterprise Against Attack” and is author of the upcoming book "Realities of Securing Big Data". Davi is a frequent top-rated public speaker and in 2018 he established the Excellence in Humanitarian Service Award at the RSA Conference; inaugural award was for building and managing resilient encryption systems that were instrumental to ending South African Apartheid. While serving as a Dedicated Paranoid at Yahoo! and responsible for managing security for hundreds of millions of mobile, broadband and digital home products, he invented an ephemeral authentication system for IoT that is in ubiquitous use today. An expert in governance, assessments, audit and compliance leadership Davi was a qualified PCI DSS and PA-DSS assessor (QSA and PA-QSA) for 7 years, and former Board Member for the Payment Card Industry Security Alliance and the Silicon Valley chapters of ISACA and OWASP. He received his postgraduate academic Master of Science degree in International History from the London School of Economics.

Presentations
  • Advances in Network VisibilityDAY 112:00 AM - 12:00 AM
  • IoT: Who Owns Device Risk ManagementDAY 112:00 AM - 12:00 AM
  • DevSecOps Business CasesDAY 110:35 AM - 11:10 AM
  • Prioritizing Privilege ManagementDAY 212:00 AM - 12:00 AM
  • Cutting Through the AI/ML Vendor HypeDAY 212:00 AM - 12:00 AM
mike-rothman

Mike Rothman

IANS Faculty

Mike has been in the information security industry for over 10 years. He is currently President and Analyst at Securosis, a firm exclusively focused on information security and research analysis. He started Security Incite in 2006 to provide the "voice of reason" in what was considered an overhyped, yet underwhelming security industry. After a brief detour as SVP, Strategy and Chief Marketing Officer at eIQNetworks, Mike joined Securosis at the start of 2010 with a "rejuvenated cynicism" about security. In 2007, Mike published "The Pragmatic CSO" to introduce technically oriented security professionals to the nuances of what is required to become a senior security professional.

Presentations
  • Comparing Google to the Big Cloud ProvidersDAY 112:00 AM - 12:00 AM
  • How to Fill SIEM Gaps with UEBA/SOARDAY 112:00 AM - 12:00 AM
  • Case Study: Building a Better Security CultureDAY 112:00 AM - 12:00 AM
  • The Cloud Security Maturity RoadmapDAY 211:20 AM - 12:50 PM
  • Vendor Optimization: Thinning the HerdDAY 23:20 PM - 4:20 PM
Bobby Singh

Bobby Singh

CISO & global head of infrastructure, TMX Group

Bobby Singh, CISO and Global Head of Infrastructure, is responsible for delivering secure and highly available common technology services across TMX. As a member of the executive leadership team, Bobby is defining TMX's cyber security and technology vision and strategy, to advance the organizational agenda. He is responsible for TMX's corporate information and IT systems and services, as well as all aspects of security, governance, risk, and compliance. He  represents TMX in key forums focused on critical infrastructure, network evolution, intelligence, and availability. With more than two decades of executive experience, Bobby brings a wide range of technical and security knowledge to his current role. He has broad expertise in developing and implementing security programs for public and private sector organizations. Prior to joining TMX, Bobby has held positions at TD Bank, Rogers Communications and eHealth, where he designed multi-year technology and culture transformation programs. He received his MBA from University of Pittsburgh and holds CISSP, CISM, CISA and CPA designations.

Presentations
  • Keynote Interview: A Discussion with Bobby SinghDAY 18:45 AM - 9:30 AM
jake-williams

Jake Williams

IANS Faculty

Jake Williams, the founder of Rendition Infosec, has almost two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding Rendition Infosec, Williams worked with various government agencies in information security and CNO roles. He also works with SANS where he teaches and authors courses in Malware Reverse Engineering, Memory Forensics, Cyber Threat Intelligence, and Advanced Exploit Development. He is the two-time victor of the annual DC3 Forensics Challenge. He has spoken at Blackhat, DEFCON, Shmoocon, CEIC, RSA, EnFuse, and DC3 Conference (among others). His research areas include automating incident response throughout the enterprise, threat modeling and analysis, binary analysis, and malware C2. The primary focus of his work is increasing enterprise security by presenting complex topics in a way that anyone can understand.

Presentations
  • Phishing and Social Engineering: New Solutions to an Old ProblemDAY 112:00 AM - 12:00 AM
  • Adapting the SOC to a Cloud EnvironmentDAY 11:00 PM - 2:15 PM
  • The Changing Face of RansomwareDAY 14:05 PM - 4:40 PM
  • Deception and HoneypotsDAY 212:00 AM - 12:00 AM
  • Insider ThreatsDAY 212:00 AM - 12:00 AM

Sheraton Centre Toronto Hotel

123 Queen Street West, Toronto, ON M5H 2M9

Onsite Questions

Are the presentations available for viewing after the Forum?

All roundtable sessions will be available after the Forum. Many presentations are uploaded to the Mobile App prior to the Forum.

Does IANS provide a Mobile App?

The IANS Information Security Forum App will be available 1 week prior to the event. To download the Mobile App go to the App Store or Google Play Store on your device and search IANS.

How can I promote my involvement with the event?

Please share your thoughts and excitement using our event hashtags found at the top of this page.

How can I submit my feedback on the Forum?

We encourage you to fill out our general survey located in the middle of your program. Please drop off your survey at the registration desk before you leave.

Is there free Wi-Fi onsite?

Free Wi-Fi will be provided throughout the Forum in conference areas.

What can I expect when I attend an IANS event?

When attending an IANS Information Security Forum, you will have the opportunity to take part in technical and strategic Roundtable sessions that discuss the latest issues and trends found in the market. These Roundtable discussions are led by IANS Faculty who are also long-time information security practitioners. You will also have the chance to network with industry peers and learn about the newest technologies and services during any one of our Technology Spotlight sessions.

What is the best way to stay updated before and during the Forum?

For all updates please download the IANS Mobile App or follow us on Twitter.

Where do I pick up my badge and registration material?

Your badge and registration materials will be available to pick-up at the registration desk. Registration starts at 7:30am.

Will there be opportunities to network with peers and sponsors?

There will be chances to network with your peers during the lunches, breaks and the networking reception at the end of day one.

Sponsorship Questions

Are there still sponsorship opportunities?

Please contact Eric Bartczak at sponsorships@iansresearch.com for more information.

Will there be opportunities to network with peers and sponsors?

IANS offers a Silver, Gold and Platinum level sponsorship. Please visit the Event Sponsors Page for more information.

Registration Questions

Can I earn continuing education credits for attending the forum?

Attendees may earn up to 16 credits through our partnership with (ISC)2. Attendees must check in at registration each morning to receive their 8 credits for Day 1 and Day 2. Attendees will receive a Certificate of Completion one week after the forum concludes for any other certification needs. If you have provided IANS with your CISSP # during the registration process then we will automatically submit to (ISC)2.

What is the registration fee?

The Forum is complimentary and open to active Information Security Professionals from private and public sector corporations and organizations.

What time does the Forum begin and end?

The Forum officially begins on Day 1 at 7:30am and ends on Day 2 at 4:40pm.

What's the registration deadline?
You can register for and IANS event up to the day of the event.

General Information

Cancellations

IANS requests that cancellations please be submitted two weeks prior to a Forum. Reserved seats are limited.

Hotel Cancellations

If you have booked a hotel room with IANS during the registration process or you have reached out to an IANS team member regarding booking a room, please note our venues have a cancellation policy of 48 hours. If you do not cancel your reservation through your online registration or in writing to IANS, you will be charged for the night(s) in which you have failed to cancel.

Terms and Conditions

This Forum is produced by IANS, which reserves the right, in its sole discretion, to limit or deny access to the Forum to any entity or individual. Attendance to the Forum is complimentary and open to active information security professionals from private and public-sector corporations and organizations.

Individuals from information security solution providers (software, hardware, and consulting companies) are not eligible to attend unless affiliated with a sponsoring organization.

IANS reserves the right to share attendee contact information with event sponsors and other attendees. IANS will provide on-site opt-out forms that enable you to remove your contact information from being shared as described herein. No contact information will be shared prior to the event.

Photography, Audio & Video Recording

IANS Forums are held in a public venue; therefore, IANS does not prohibit participants, sponsors, or other companies from photographing or taking videos. IANS reserves the right to use images taken at IANS Forums with your photograph and/or likeness in marketing materials.

IANS Code of Conducts

IANS is committed to providing a harassment-free conference experience for all attendees, sponsors, speakers and staff regardless of gender, sexual orientation, disability, physical appearance, national origin, ethnicity, political affliction or religion.

IANS expects all participants to behave in a professional manner. IANS will not condone any form of sexual language and imagery, verbal threats or demands, offensive comments, intimidation, stalking, sustained disruption of session or events, inappropriate physical contract, and unwelcomed sexual attention.

If any form of written, social media, verbal, or physical harassment is reported, participant will be asked to stop and expected to comply immediately. Offender will be subject to expulsion from the conference.

If you are being harassed or notice someone being harassed, please contact the event staff. In the event of an emergency situation, please contact local authorities immediately.

We expect participants to follow these rules at all event venues and event-related social activities.

Housing & Travel Questions

How can I book a hotel room?

All hotel requests must be made through the registration site.

How can I cancel my hotel reservation?

Most of our hotel venues have a 72 hour cancellation policy. You must cancel by contacting one of the IANS team members or through the online registration. If you fail to do so you will be charged for the night(s) in which you have failed to cancel.

Is parking provided?

IANS does not cover any parking.

What hotel accommodations are available during the Forum?

IANS provides a room block for forum events. There will be a limited number of rooms available at the discounted rate.

Will I receive a hotel confirmation number?

You will receive a hotel confirmation number 2 weeks prior to the Forum.

Attendee Contact

ians@iansresearch.com

Who Should Attend?

IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

Check out IANS other upcoming events