Join fellow information security professionals at ITAC’s quarterly Cyber Forum. This quarter’s meeting will focus broadly on the them of “Securing Communications.”
Date: Friday, September 29, 2017
Time: 9:30 am – Noon
Location: Downtown Ottawa (or via webinar)
|1. Welcome and Introductions
|David Messer, ITAC
|2. Changing Security Defense Strategies in a Borderless World
Cisco Security Solutions
|3. Cyber and IT Security at Shared Services Canada
Assistant Deputy Minister,
Cyber and IT Security,
Shared Services Canada
|4. Cyber Hacking Has Never Been Easier:
Even Your Grandmother can Hack Your Email
President and Co-Founder
|5. Additional Updates
Security experts are becoming increasingly concerned about the accelerating pace of change—and yes, sophistication—in the global cyber threat landscape. Malicious actors are taking advantage of that ever-expanding attack surface. The breadth and depth of recent ransomware attacks alone demonstrate how adept adversaries are at exploiting security gaps and vulnerabilities across devices and networks for maximum impact.
Lack of visibility into dynamic IT environments, the risks presented by “shadow IT,” the constant barrage of security alerts, and the complexity of the IT security environment are just some reasons resource-strapped security teams struggle to stay on top of today’s evasive and increasingly potent cyber threats.
In this session, you will learn approaches, technologies and complementary services that are available to help improve threat visibility and detection challenges in a borderless world.
The presentation will be focused on providing an overview of Shared Services Canada’s role in Cyber and IT security to protect Government of Canada systems and data. This will include how we work with other partners/stakeholders, developments to date and future planned activities. The presentation will be followed by a Q & A.
“Cyber Hacking Has Never Been Easier: Even Your Grandmother Can Hack Your Email.” – Sem Ponnambalam, President and Co-founder of XAHIVE
This presentation will cover:
- The threat landscape of online communications.
- Hacking as a service.
- Automated hacking tools and A.I. controlled by cyber criminals.
- Cybersecurity regulation touching communication.
- What is the future of online communication?