Toronto Cybersecurity Conference
Thursday, April 24, 2025
Hybrid
























Join Us in Toronto for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
Keynote Speaker
“People, Policies, and Perimeters: Navigating the HR-Cybersecurity Nexus in the Age of Insider Risk”
Lina Dabit
Officer in Charge, Cybercrime Investigative Team Toronto RCMP Federal Operations Central Region (Ontario)
Lina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent thirteen years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while working solo in the Gulf Islands.
After transferring to Ontario in 2008, she focused on organized crime and national security, and as an Investigative Interviewing Subject Matter Expert, she went on to establish the RCMP interview team in Ontario.
She was commissioned to Inspector in 2017 and became the commander of the Air Marshal Toronto Field Unit. In 2021, she was selected to lead the Cybercrime Investigative Team in Ontario. She is currently working to establish an innovative operational Cyber hub focused on collaboration between federal, international and private sector partnerships.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Matt Richardson
“Head of Intelligence” Canadian OSINT Centre and Anti-Human Trafficking Intelligence Initiative”
Lina Dabit
Officer in Charge, Cybercrime Investigative Team Toronto RCMP Federal Operations Central Region (Ontario)
Robert Knoblauch
Chief Information Security Officer Element Fleet Management
Olivera Zatezalo
CISO & VP, Cyber and IT Security Ontario Power Generation
Jeff Stark
Chief Information Security Officer Fasken


Sponsors
Gold Sponsors








Silver Sponsors











Partner







“Cybersecurity is no longer just an IT problem”

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
Gone in 60 Seconds: The Alarming Speed of Cyber Attacks
Learn how even novice cybercriminals can execute devastating attacks in mere minutes. A live demonstration will showcase the rapid pace at which attacks are staged, launched, and executed, highlighting the urgency of proactive defense strategies. You’ll learn about common vulnerabilities exploited by attackers and how poor security practices can accelerate breaches. The discussion will highlight the importance of early detection, strong defenses, and swift incident response to mitigate risks and stay ahead in the ever-evolving threat landscape
Sponsored by

Presentation
Rethinking Cybersecurity for Covert Application Risks
Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Data Security in a SaaS, Cloud and Gen AI Era: Lessons Learnt and Best Practices for CISOs and Security Practitioners
As SaaS applications like O365, Google workspace, Salesforce, Slack, Atlassian, cloud platforms like AWS, Azure, and Gen AI tools like ChatGPT, Copilot dominate modern workflows, they also introduce complex security challenges for CISOs, security leaders, engineers, and practitioners. These include expanding attack surfaces, misconfigured systems, and sensitive data exposures, all of which demand innovative solutions beyond traditional security tools.
In this session, we’ll dive into:
• Emerging risks in SaaS, cloud, and Gen AI environments, including real-world examples of breaches and misconfigurations.
• Actionable strategies to gain full visibility into sensitive data, enforce compliance, and protect against insider and external threats.
• Case studies highlighting successful approaches to securing sensitive data in Gen AI workflows and SaaS platforms.
• Future trends such as Zero Trust principles and AI-driven security automation that will reshape how we protect organizational data.
Designed for CISOs and security practitioners, this talk offers practical takeaways to enhance your data security posture while balancing productivity and compliance in a SaaS-first, AI-driven era.
Sponsored by

Presentation
You're doing everything right, but are you doing the right things?
Organizations often miss the forest for the trees, getting bogged down in projects that, while important and valuable, aren’t the most important and valuable. This can lead to significant vulnerabilities and eventually incidents/breaches, in spite of the fact that cybersecurity teams are working overtime, being productive, and even making good progress.
We’ll share examples of some high-profile and some less known breaches that could have been avoided with better prioritization. We’ll also offer simple, practical advise on how you and your organization can avoid a similar fate – better utilizing the resources you already have.
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
People, Policies, and Perimeters: Navigating the HR-Cybersecurity Nexus in the Age of Insider Risk
Lina Dabit
Officer in Charge, Cybercrime Investigative Team Toronto RCMP Federal Operations Central Region (Ontario)
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
The Entropy of AI: Balancing Innovation with Risk in Cybersecurity
AI is transforming cybersecurity—supercharging threat detection, but also creating new risks. This talk explores the “entropy” AI introduces: the growing unpredictability and complexity in digital defenses. We’ll look at how innovation and automation can both protect and endanger, and why striking a balance between progress and precaution is critical in today’s evolving threat landscape.
Sponsored by

Presentation
Practical usecases for AI you can use today – From security to compliance frameworks.
DoD ZeroTrust, PCI, HIPAA, DORA – These are all frameworks focused on risk and compliance. Balancing security operations vs practical operational controls is an ongoing challenge for many organizations. We will examine the tech stack to understand why security will never be “done” and ways to ensure guardrails the frameworks require are in place. Using your own AI on technology and assets you already have we will look at some practical ways to help reduce operating cost, risk, by examining network telemetry – The bottom end of the tech stack. A wealth of information can be found there.. If you know how to read it. If you don’t you now have AI
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
Compliance, Cybersecurity, and IT: How an MSP Keeps You Covered
Sponsored by

Presentation
Digital Transformation powered by a cloud that connects and protects
Securing modern work across users, devices, applications, networks, and clouds has never been more complicated. In a recent Forrester Consulting study, 39% of IT and security respondents admitted that their organizations have lost control over their digital environments due to complexity challenges. Lost digital control can have consequences on customer experiences, employee productivity, time to market, risk profile, and more. A new approach is needed to address this critical business challenge and help organizations avoid these pitfalls and restore control. In this presentation, guest speaker, Mayur Mohan Kaura, Senior Solutions Engineer, Cloudflare, will present on the landscape of digital complexity as well as how modern connectivity cloud approach can help manage and secure the chaos
Sponsored by

Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!