Time | Session Title |
7:30 AM - 8:00 AM | Registration and Networking Check-in, collect materials, visit solution providers, and network with peers. |
8:00 AM | Power Breakfast |
8:30 AM | Welcome Address by the Master of Ceremony |
8:45 AM - 9:15 AM | Keynote Address
Speaker: Dr. Sami Khoury Topic: Navigating Cyber Risks in Times of Uncertainty
|
9:30 AM - 10:30 AM | Panel Discussion I
Topic: Regulatory Compliance Challenges
|
10:30 AM - 11:00 AM | Networking Break Refreshments and networking opportunity |
11:00 AM - 11:45 PM | Workshop - Cyber Governance and Risk Oversight for Executives
· How Business Leaders Can Take Ownership of Cybersecurity Under NIS 2 and Bill C-26 · Understand board-level accountability under NIS 2 and C-26 · Build an internal governance structure for cybersecurity decision-making · Learn how to identify and manage cyber risk as part of enterprise risk management · Practical steps to demonstrate “due diligence” and “due care” to regulators
|
11:00 AM - 11:45 PM | Workshop - Emerging AI – Driven Supply Chain Threats
Understanding how AI threats have surged dramatically since late 2022 Explore vulnerabilities AI tool is affecting supply chain Developing AI security policies in procurement and vendor selection |
12:30 PM - 1:45 PM | Lunch & Learn Topic: The Role of Canadian Firms in Securing Global Supply Chains Informal networking opportunities |
2:00 PM - 2:50 PM | Workshops - Supply Chain Vulnerabilities Disruptions in critical business operations, such as the supply chain, are a primary focus for 45% of cybersecurity leaders, highlighting the need for robust supply chain security measures. |
2:00 PM - 2:50 PM | Workshops - Cybersecurity Insurance Coverage Decline
Despite heightened concerns, there has been a decline in companies purchasing cyber insurance, with cost being a prohibitive factor for many. Understanding the cyber insurance market and coverage gaps |
3:00 PM - 3:50 PM | Workshops - Legal Liability & Crisis Communications
Subtitle: What Every CEO and CISO Should Know Before a Breach Happens
Legal exposures for directors and officers under NIS 2 and C-26 Managing reputational damage and stakeholder communications Creating a breach communication strategy aligned with compliance needs
Topic: Advanced Techniques for Supply Chain Risk Assessment and Management |
3:00 PM - 3:50 PM | Workshops - Creating a Cyber-Resilient Supply Chain Strategy
Developing and testing Business Continuity & Incident Response Plans Embedding security in procurement and vendor selection Using third-party security ratings and audits Creating playbooks for ransomware and regulatory breach notifications
|
4:00 PM - 6:00 PM | Business Social Snacks & Drinks, networking, and vendor visitation. |
5:00 PM | Closing Remarks and Future Outlook Summarizing key takeaways, future steps, and collaboration opportunities |
6:00 PM | Conference Adjourns |