Toronto Cybersecurity Conference

Thursday, April 24, 2025

Hyatt Regency Toronto

Parking/Directions

Hybrid

Join Us in Toronto for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

 

 

Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

9:00 am

Gone in 60 Seconds: The Alarming Speed of Cyber Attacks

Learn how even novice cybercriminals can execute devastating attacks in mere minutes. A live demonstration will showcase the rapid pace at which attacks are staged, launched, and executed, highlighting the urgency of proactive defense strategies. You’ll learn about common vulnerabilities exploited by attackers and how poor security practices can accelerate read more…

Learn how even novice cybercriminals can execute devastating attacks in mere minutes. A live demonstration will showcase the rapid pace at which attacks are staged, launched, and executed, highlighting the urgency of proactive defense strategies. You’ll learn about common vulnerabilities exploited by attackers and how poor security practices can accelerate breaches. The discussion will highlight the importance of early detection, strong defenses, and swift incident response to mitigate risks and stay ahead in the ever-evolving threat landscape

Bio

Christopher Fielder

Field CTO Arctic Wolf

Sponsored by

Presentation

9:30 am

Rethinking Cybersecurity for Covert Application Risks

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly read more…

Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security.

Bio

Pranoy De

Principal Solutions Engineer Contrast Security

Sponsored by

10:00 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:30 am

Data Security in a SaaS, Cloud and Gen AI Era: Lessons Learnt and Best Practices for CISOs and Security Practitioners

As SaaS applications like O365, Google workspace, Salesforce, Slack, Atlassian, cloud platforms like AWS, Azure, and Gen AI tools like ChatGPT, Copilot dominate modern workflows, they also introduce complex security challenges for CISOs, security leaders, engineers, and practitioners. These include expanding attack surfaces, misconfigured systems, and sensitive data exposures, all read more…

As SaaS applications like O365, Google workspace, Salesforce, Slack, Atlassian, cloud platforms like AWS, Azure, and Gen AI tools like ChatGPT, Copilot dominate modern workflows, they also introduce complex security challenges for CISOs, security leaders, engineers, and practitioners. These include expanding attack surfaces, misconfigured systems, and sensitive data exposures, all of which demand innovative solutions beyond traditional security tools.

In this session, we’ll dive into:

• Emerging risks in SaaS, cloud, and Gen AI environments, including real-world examples of breaches and misconfigurations.

• Actionable strategies to gain full visibility into sensitive data, enforce compliance, and protect against insider and external threats.

• Case studies highlighting successful approaches to securing sensitive data in Gen AI workflows and SaaS platforms.

• Future trends such as Zero Trust principles and AI-driven security automation that will reshape how we protect organizational data.

Designed for CISOs and security practitioners, this talk offers practical takeaways to enhance your data security posture while balancing productivity and compliance in a SaaS-first, AI-driven era.

Bio

Aatish Mandelecha

Founder and CEO Strac

Sponsored by

Presentation

11:00 am

You're doing everything right, but are you doing the right things?

Organizations often miss the forest for the trees, getting bogged down in projects that, while important and valuable, aren’t the most important and valuable.  This can lead to significant vulnerabilities and eventually incidents/breaches, in spite of the fact that cybersecurity teams are working overtime, being productive, and even making good progress. We’ll read more…

Organizations often miss the forest for the trees, getting bogged down in projects that, while important and valuable, aren’t the most important and valuable.  This can lead to significant vulnerabilities and eventually incidents/breaches, in spite of the fact that cybersecurity teams are working overtime, being productive, and even making good progress.
We’ll share examples of some high-profile and some less known breaches that could have been avoided with better prioritization.  We’ll also offer simple, practical advise on how you and your organization can avoid a similar fate – better utilizing the resources you already have.

Bio

Eric Anderson

Chief Cyber Evangelist Atlantic Data Security

Sponsored by

11:30 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

11:45 am

Lunch

Keynote

12:00 pm

People, Policies, and Perimeters: Navigating the HR-Cybersecurity Nexus in the Age of Insider Risk

Bio

Lina Dabit

Officer in Charge, Cybercrime Investigative Team Toronto RCMP Federal Operations Central Region (Ontario)
1:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:30 pm

The Entropy of AI: Balancing Innovation with Risk in Cybersecurity

AI is transforming cybersecurity—supercharging threat detection, but also creating new risks. This talk explores the “entropy” AI introduces: the growing unpredictability and complexity in digital defenses. We’ll look at how innovation and automation can both protect and endanger, and why striking a balance between progress and precaution is critical in read more…

AI is transforming cybersecurity—supercharging threat detection, but also creating new risks. This talk explores the “entropy” AI introduces: the growing unpredictability and complexity in digital defenses. We’ll look at how innovation and automation can both protect and endanger, and why striking a balance between progress and precaution is critical in today’s evolving threat landscape.

Bio

Gavin Roberts

Chief Technical Officer Topsec Cloud Solutions

Sponsored by

Presentation

2:00 pm

Practical usecases for AI you can use today – From security to compliance frameworks.

DoD ZeroTrust, PCI, HIPAA, DORA – These are all frameworks focused on risk and compliance. Balancing security operations vs practical operational controls is an ongoing challenge for many organizations. We will examine the tech stack to understand why security will never be “done” and ways to ensure guardrails the frameworks read more…

DoD ZeroTrust, PCI, HIPAA, DORA – These are all frameworks focused on risk and compliance. Balancing security operations vs practical operational controls is an ongoing challenge for many organizations. We will examine the tech stack to understand why security will never be “done” and ways to ensure guardrails the frameworks require are in place.  Using your own AI on technology and assets you already have we will look at some practical ways to help reduce operating cost, risk, by examining network telemetry – The bottom end of the tech stack. A wealth of information can be found there.. If you know how to read it. If you don’t you now have AI

Bio

Stephen Goudreault

Cloud Security Evangelist Gigamon

Sponsored by

2:30 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

2:45 pm

Compliance, Cybersecurity, and IT: How an MSP Keeps You Covered

Bio

Cando Wango

National Security Services Solutions Architect Konica Minolta

Sponsored by

Presentation

3:15 pm

Digital Transformation powered by a cloud that connects and protects

Securing modern work across users, devices, applications, networks, and clouds has never been more complicated. In a recent Forrester Consulting study, 39% of IT and security respondents admitted that their organizations have lost control over their digital environments due to complexity challenges. Lost digital control can have consequences on customer read more…

Securing modern work across users, devices, applications, networks, and clouds has never been more complicated. In a recent Forrester Consulting study, 39% of IT and security respondents admitted that their organizations have lost control over their digital environments due to complexity challenges. Lost digital control can have consequences on customer experiences, employee productivity, time to market, risk profile, and more. A new approach is needed to address this critical business challenge and help organizations avoid these pitfalls and restore control. In this presentation, guest speaker, Mayur Mohan Kaura, Senior Solutions Engineer, Cloudflare, will present on the landscape of digital complexity as well as how modern connectivity cloud approach can help manage and secure the chaos 

Bio

Mayur Kaura

Senior Solutions Engineer Cloudflare

Sponsored by

3:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:00 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Matt Richardson

“Head of Intelligence” Canadian OSINT Centre and Anti-Human Trafficking Intelligence Initiative”
Bio

Lina Dabit

Officer in Charge, Cybercrime Investigative Team Toronto RCMP Federal Operations Central Region (Ontario)
Bio

Robert Knoblauch

Chief Information Security Officer Element Fleet Management
Bio

Olivera Zatezalo

CISO & VP, Cyber and IT Security Ontario Power Generation
Bio

Jeff Stark

Chief Information Security Officer Fasken
5:00 pm

Closing Remarks