Montreal Cybersecurity Conference

Thursday, June 13, 2024

Plaza Centre-Ville

Parking/Directions

Hybrid

Join Us in Montreal for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Plaza Centre-Ville

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Weaponizing DNS to Defend the Enterprise

Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but also provides an incredible opportunity to prevent and detect threats. Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.

Establishing DNS as an enterprise control point is not only a recommended best practice by government entities around the world, but also provides an incredible opportunity to prevent and detect threats. Tying together DNS centric threat intelligence and contextual data from existing systems can accelerate investigations and automate remedial activities.

Bio

Colby Hoefer

Cybersecurity Specialist Infoblox

Sponsored by

Presentation

9:30 am

Securing our digital identities: Harnessing Identity security for maximum defense

Summary: -A quick glance at the Identity ecosystem and Identity threat landscape. -Hybrid identity challenges. -Identity lifecycle management in “Zero Trust” approach. -5 rules to implement a seamless IAM architecture in the environment.
Summary:
-A quick glance at the Identity ecosystem and Identity threat landscape.
-Hybrid identity challenges.
-Identity lifecycle management in “Zero Trust” approach.
-5 rules to implement a seamless IAM architecture in the environment.
Bio

Bharathwajan Swaminathan

Senior Technical Consultant ManageEngine

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
10:30 am

Implementing Telemetry-guided Threat Modeling Strategies

Bio

Jappreet Bath

Security Evangelist Extrahop

Sponsored by

Presentation

11:00 am

Defending the Network: A live showdown with DDoS attack

Join our session as we will be demonstrating the raw power of large-scale DDoS attacks unleashed on a network in real-time. Brace yourselves as we delve into the depths of cyber warfare and witness firsthand the havoc that these attacks can wreak on unsuspecting targets. Together we can secure the read more…

Join our session as we will be demonstrating the raw power of large-scale DDoS attacks unleashed on a network in real-time. Brace yourselves as we delve into the depths of cyber warfare and witness firsthand the havoc that these attacks can wreak on unsuspecting targets.

Together we can secure the day, one byte at a time!

Bio

Manny Liwanag

Principal Security Engineer Imperva, a Thales company

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
11:45 am

Lunch

Keynote

12:00 pm

Plunging into Cyber: What leaping from a perfectly good airplane taught me about cyber security.

Bio

Jack Brooks

Head of Hackbusters and vCISO BOXX Insurance Inc.
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

Container Security 101

Bio

Sean Rickerd

Product Manager Red Hat

Sponsored by

Presentation

2:00 pm

Navigating Data Privacy in the Digital Age: Understanding and Complying with Law 25 // Bill 64

In today’s digital world, protecting data privacy is crucial. This session explores Law 25, a key legislative measure to improve data privacy protections. We’ll start with why data privacy matters and introduce Law 25, explaining its importance. We’ll then cover the main points of Law 25 and how it affects read more…

In today’s digital world, protecting data privacy is crucial. This session explores Law 25, a key legislative measure to improve data privacy protections. We’ll start with why data privacy matters and introduce Law 25, explaining its importance. We’ll then cover the main points of Law 25 and how it affects data collection, storage, and sharing. Attendees will learn about compliance requirements for organizations, including penalties for non-compliance and the role of regulatory authorities. We’ll also discuss best practices for compliance and maintaining consumer trust, using real-world case studies to highlight the importance of strong data privacy measures.

Bio

James Mignacca

CEO Cavelo

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
2:45 pm

Increasing scrutiny over client-side protection - PCI compliance and more | Surveillance accrue de la protection côté client – Conformité PCI et bien plus encore

Dans le paysage numérique d’aujourd’hui, la sécurité des applications côté client est devenue une préoccupation critique pour les organisations du monde entier. Avec l’augmentation des cybermenaces sophistiquées ciblant les appareils des utilisateurs et les données sensibles qu’ils manipulent, garantir une sécurité robuste côté client n’est plus une option, c’est impératif. read more…
Dans le paysage numérique d’aujourd’hui, la sécurité des applications côté client est devenue une préoccupation critique pour les organisations du monde entier. Avec l’augmentation des cybermenaces sophistiquées ciblant les appareils des utilisateurs et les données sensibles qu’ils manipulent, garantir une sécurité robuste côté client n’est plus une option, c’est impératif. La dernière version de la norme de sécurité des données de l’industrie des cartes de paiement, PCI DSS 4.0, met ce problème au premier plan en introduisant des exigences et des lignes directrices améliorées visant à renforcer la sécurité des données des détenteurs de cartes à chaque étape du processus de transaction.

Cette présentation explorera le portrait des menaces qui rend nécessaire une attention accrue à la sécurité côté client. Nous examinerons comment les attaquants exploitent les vulnérabilités dans les navigateurs, les applications mobiles et autres environnements côté client pour compromettre des informations sensibles. La discussion mettra en lumière des exemples concrets de la manière d’améliorer votre posture de sécurité côté client pour cette nouvelle norme.

Bio

Steve Houle

Field Solutions Engineer Cloudflare

Sponsored by

Presentation

3:15 pm

Choisir son modèle d’opérations de sécurité : SIEM vs MDR de produit vs MSP/MSSP

Nous allons explorer les différents modèles d’opérations de sécurité disponibles de nos jours et en regarder les avantages et les inconvénients

Nous allons explorer les différents modèles d’opérations de sécurité disponibles de nos jours et en regarder les avantages et les inconvénients

Bio

Martin Paré

Prévente technique Arctic Wolf

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Pat Benoit

Global Chief Information Security Officer Brink’s Inc
Bio

Catherine Dupont-Gagnon

Chargée de cours - Prévention de la cybercriminalité Polytechnique Montréal
Bio

MJF Rupom

Vice President & Head of Americas, Cyber Risk Intelligence BNP Paribas Canada
Bio

Gregory Carpenter

Chief Security Officer KnowledgeBridge International
5:00 pm

Closing Remarks