CYBER THURSDAY | TORONTO – October 17, 2024

SPEAKERS

VINAY BIRADAR – Associate Director, Security Advisory, Frost & Sullivan

THE NEXT FRONTIER OF OT SECURITY

In today’s interconnected world, the security of operational technology (OT) infrastructure is paramount. As we rely increasingly on digital systems to manage critical infrastructure, the interconnectedness of OT & IT networks has never been more pronounced. This talk delves into the current state and challenges of securing critical infrastructure, explores strategies to address these challenges effectively, and draws insights from Frost & Sullivan’s research on critical infrastructure industries.

DAVID SAMPSON – Founder, Perdition Security

GENERATIVE AI AND APPLICATION SECURITY

In the rapidly evolving landscape of cybersecurity, the advent of generative artificial intelligence (AI) marks a significant shift in how we approach application security. This speech, titled ‘Navigating the Future: Generative AI in Application Security,’ aims to demystify the complex world of generative AI and explore its profound implications for cybersecurity strategies. Generative AI, distinct in its ability to create new data and patterns based on extensive training sets, offers unparalleled opportunities for enhancing security measures. Yet, it also introduces novel vulnerabilities and attack vectors that must be addressed with sophisticated, informed strategies.

Drawing upon my extensive experience in cybersecurity and business leadership across Perdition Security Inc., S&T Holdings Inc., and Globys Inc., I will delve into the dual role of generative AI as both a potent tool for security enhancement and a potential threat. The presentation will cover the historical evolution of AI in cybersecurity, highlighting recent advancements and their practical applications in strengthening application security frameworks. Through real-world examples and case studies from my businesses, attendees will gain insights into the challenges and opportunities presented by AI-powered threats and the best practices for integrating generative AI into their security strategies.

Moreover, the discussion will extend to ethical considerations and the imperative of maintaining user privacy in the age of AI-driven security solutions. As we anticipate future trends and developments in generative AI, the speech will outline the responsibilities of businesses and security professionals in fostering a secure, ethical digital environment. Emphasizing collaboration and continuous learning, I will share my vision for making cybersecurity accessible to SMBs and non-profits, ensuring that organizations of all sizes can navigate the complexities of an AI-enhanced security landscape.

This presentation is designed to equip attendees with a comprehensive understanding of generative AI’s impact on application security, fostering a proactive, informed approach to cybersecurity in an era of rapid technological change. By exploring the convergence of generative AI and cybersecurity, we can collectively work towards a future where digital innovations and security measures evolve in tandem, safeguarding our digital world against emerging threats

NELOY BANDYOPADHYAY – Principal Security Architect, Bank of Canada

GRC & CYBER RISK AUTOMATION (PART OF SECURITY AUTOMATION & ORCHESTRATION – HIGHLIGHTING CYBER RISK)

How GRC Framework and a GRC tool can help an organization to automate the operational risk management process and build an integrated governance, risk and compliance framework.

Nishant Chougule

NISHANT CHOUGULE – Senior Security Engineer, Meltwater News Canada Inc

WHAT IT TAKES TO GET READY FOR THE ZERO DAY BATTLE IN APPLICATION SECURITY?

The topic is all about how an application security program helps prepare for the Zero day that affects the organization intensely when affected.

Utkarsh Choudhary

UTKARSH CHOUDHARY – Senior Manager – IT Security, Deloitte

CLOUD-NATIVE SECURITY

  • Cloud adoption is rapidly increasing across industries
  • Public cloud platforms (AWS, Azure, GCP) offer powerful capabilities but introduce new security challenges
  • Securing cloud infrastructure requires a unique approach compared to traditional on-premises security
  • We’ll explore key concepts, best practices, and tools for securing major public cloud platforms
  • Emphasis on practical, actionable strategies for cloud security professional

This talk explores the critical aspects of public cloud security across major platforms: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Drawing from the industry leading publications, we’ll delve into the unique challenges and opportunities presented by cloud environments. The presentation will cover essential security concepts, best practices, and tools for effectively securing cloud infrastructure, applications, and data. We’ll emphasize practical strategies that security professionals can implement to enhance their organization’s cloud security posture.

Denny Prvu

DENNY PRVU – Director of Architecture: Innovation & Technology: Generative AI & Immersive Tech, RBC

DEEPFAKES AND DIGITAL TWINS: THE GOOD, THE BAD AND THE NOT SO UGLY

Overview of Deepfakes, what they are, and who they impact. How Machine learning and AI has evolved to use generative AI to impact all industries and what we can do to deal with emerging threat actors and threat vectors.

Shruti Mukherjee

SHRUTI MUKHERJEE – Director of GRC, GlobalVision

SAFEGUARDING DATA IN THE AGE OF AI

Artificial Intelligence has revolutionized various industries by enabling new capabilities and efficiencies. From healthcare to finance to life sciences, AI is transforming how organizations operate and make decisions today. However, with the expansion of AI comes the heightened risk of wrongful data usage, data breaches, and several other privacy concerns. Data security and privacy have always been important, but the stakes are even higher with AI because these technologies often rely on large datasets, including sensitive and personal information. As AI systems become more integrated into business processes, it is and will collect, store, and analyze vast amounts of data. This data can include but is not limited to personal information, financial and health records, and other sensitive information. If this data is not adequately protected, it can lead to severe consequences such as identity theft, financial loss, and damage to an organization’s reputation, the risk is high. Therefore, ensuring data security and privacy is crucial in the age of AI.

Elgun Bak

ELGUN BAK – CISO | Cybersecurity Architect, Permanent Full-timeITSIGN SOLUTIONS • Permanent Full-time

ZERO TRUST SECURITY FRAMEWORK

  • Introduction to zero trust
  • Core principles of zero trust
  • Implementing Zero Trust
  • Benefits of zero trust
  • Challenges and considerations
  • Future of zero trust