The Future of IT

CIO Think Tank

April 12, 2023 - Toronto, Canada
April 12, 2023

Agenda

All times Eastern Time

9:30 AM-10:15 AM

Welcome & Registration


10:15 AM-11:00 AM

Morning Networking


11:00 AM-11:05 AM

Opening Remarks


11:05 AM-11:50 AM
Panel

Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


11:55 AM-12:10 PM
Disruptor

The Modern Enterprise Dilemma: How to Move Beyond the Network Perimeter to Secure Dynamic Work Environments.

Together, Cloud Leaders CrowdStrike, Netskope, and Okta, provide integrations that extend their value to customers to protect endpoint devices, provide unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps, as well as extend identity-based governance and compliance.

In partnership with:

12:15 PM-1:15 PM

Lunch & Networking


1:15 PM-2:00 PM
Panel

The Power of Three: Best-of-Breed Protection and Security for the Modern Enterprise

Together, CrowdStrike, Netskope, and Okta represent three best-of-breed solutions that form the core pillars of a modern, comprehensive security architecture. The Engineering Leaders of each organization will be part of a panel discussion to share the evolving Canadian threat landscape and how it has become unequivocally critical to adopt the right long-term security strategies for a remote-first workforce.

In partnership with:

2:05 PM-2:40 PM
Fireside Chat

Cloud Computing & Cloud Vulnerabilities

Cloud computing has become a cornerstone of modern business operations providing the enterprise with agility and scalability needed to thrive in the digital age. CIOs must evaluate the risks and benefits of cloud computing as its adoption continues to grow. While cloud solutions offer benefits like cost savings and flexibility, they also pose data security risks. CIOs & CISO’s must assess the enterprise and integrate cloud solutions effectively. By managing these risks and benefits, the CIO & CISO can fully leverage cloud technology for their organization's success.


2:40 PM-3:00 PM

Networking Break


3:00 PM-3:15 PM
Disruptor

Software Liability and a Path Forward

CISOs are facing an increasingly complex, dangerous, and difficult digital landscape. Software supply chain attacks have increased an average of 742% each year since 2019. The average cost of a data breach is an astounding $4.35 million–besides the potential shareholder lawsuits, loss of customers, and damage to brand reputation. Earlier this month, The White House released a new cybersecurity strategy that calls for greater cybersecurity liability and holding software providers responsible for insecure products released to consumers. Meaning, it’s now an organizational imperative at the highest level to get serious about securing your software supply chain and stop malicious open-source codes before their download.

In partnership with:

3:20 PM-4:05 PM
Panel

Third-Party Exposure

In today's interconnected business world, companies rely on vendors and suppliers for various services, which can pose significant cybersecurity risks. Third-party exposure is a major concern, as companies can be held liable for any data breaches or security incidents that occur due to the actions of their third-party providers. In 2023, this risk is expected to increase as companies continue to outsource work to third-party providers. This makes it more critical for companies to have effective security measures in place to properly secure third-party access. Failure to do so can result in data breaches, financial losses, and reputational damage. To mitigate this risk, companies must prioritize implementing comprehensive security measures that include vendor risk assessments, due diligence, contractual requirements, and ongoing monitoring. Additionally, companies must ensure that their third-party providers adhere to cybersecurity best practices and standards. By taking these proactive steps, companies can better protect themselves from the risks associated with third-party exposure in 2023 and beyond.


4:05 PM-4:25 PM

Networking Break


4:25 PM-5:10 PM
Vision Keynote Panel

The Promising Future of Artificial Intelligence (AI): Opportunities and Challenges Ahead

The potential of Artificial Intelligence (AI) is vast, as it is now being utilized across all industries. With the combination of machine learning, AI has made significant improvements in the field of cybersecurity. Automated security systems, natural language processing, face detection, and automatic threat detection are some examples of how AI is revolutionizing cybersecurity. However, AI is also being used to create intelligent malware and attacks, which can bypass the most up-to-date security protocols, making it a double-edged sword. On the positive side, AI-enabled threat detection systems have the ability to predict new attacks and immediately notify administrators in case of a data breach.


5:15 PM-5:30 PM
Disruptor

The Castle at Home

Technology executives are laser-focused on operating and securing the critical aspects of their business. Continuity, compliance, and risk management cannot come at the expense of high performance. When faced with the same responsibility for their family, security and privacy compromises unfortunately get made. They are simply stretched too thin.

Partners, children, and parents are reusing passwords that have already been part of a data breach. Security and privacy settings on Instagram, TikTok, Facebook, Snapchat, Venmo, LinkedIn, and WhatsApp are not met with the same rigor as AWS, Salesforce or DocuSign in the enterprise. MFA adoption is low.

Learn how a proactive consumer Cyber Health company is delivering cybersecurity, privacy, and digital hygiene to all.


5:30 PM-5:35 PM

Closing Remarks & Raffle Giveaway


5:35 PM-6:35 PM

Cocktail Hour


Current Partners