Toronto Cybersecurity Conference

Thursday, April 23, 2026

Hyatt Regency Toronto

PARKING/DIRECTIONS

Hybrid

370 King Street West, Toronto, ON M5V 1J9, Canada

Join Us in Toronto for the Futurecon Cybersecurity Event!

Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.

Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!

Join us live for breakfast, lunch, and a wrap up cocktail happy hour!

Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Partner

“Cybersecurity is no longer just an IT problem”

Photo of a panel discussion.

FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).

Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.

You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.

Photo of people mingling at a conference.

Have questions? Check out the FAQ.

Agenda

Times are subject to change

8:00 am

Opening Introductions | Check In | Networking

Presentation

8:45 am

AI in Cybersecurity: Friend, Foe, or Both?

AI has evolved from a research concept into a transformative force reshaping how businesses operate and defend against cyberthreats. Its rapid growth brings powerful benefits — automating routine tasks, improving efficiency, and enabling faster, more accurate threat detection. But AI is a double-edged sword. While security teams use it to read more…
AI has evolved from a research concept into a transformative force reshaping how businesses operate and defend against cyberthreats. Its rapid growth brings powerful benefits — automating routine tasks, improving efficiency, and enabling faster, more accurate threat detection. But AI is a double-edged sword. While security teams use it to predict and stop attacks, cybercriminals exploit it to craft sophisticated phishing campaigns, deepfakes, and adaptive malware.
This session explores AI’s evolution, its rapid rise in business environments, and its expanding role in today’s cybersecurity arms race. You’ll walk away with practical insights and clear steps to help your organization use AI securely, responsibly, and effectively.
Bio

Rippy Sekhon

Senior Solutions Engineer Sophos

Sponsored by

Presentation

9:15 am

2026 Threat Report

Bio

Carlo Spalvieri

Senior Systems Engineer Arctic Wolf

Sponsored by

Presentation

9:45 am

The Siege You Can’t See: Why APIs Are the Internet’s Biggest Vulnerability

APIs power every click, swipe, and login. That silent, lightning-fast conversation between services is under siege, and most security leaders can’t even see the battlefield. Attackers have industrialized API attacks, yet visibility into API activity and risk remains dangerously low. This session pulls back the curtain on the API threat read more…

APIs power every click, swipe, and login. That silent, lightning-fast conversation between services is under siege, and most security leaders can’t even see the battlefield. Attackers have industrialized API attacks, yet visibility into API activity and risk remains dangerously low.

This session pulls back the curtain on the API threat landscape. You’ll see the data, understand why traditional security tools often fail to identify API risks, and learn how to discover, inventory, and protect your API ecosystem. But APIs don’t just move requests, they move sensitive data. We’ll explore how organizations can better protect PII, payment information, intellectual property, and other critical data flowing through APIs.

We will also examine real-world examples of API vulnerabilities and data exposure, including an exposed GraphQL endpoint leaking customer records and a misconfigured REST API handing out administrative credentials. You’ll learn how to identify potential data leakage and security gaps before attackers exploit them. Don’t defend blind. Come see the siege, then learn how to stop it.

Bio

Manny Liwanag

Principal Security Engineer Imperva, a Thales company

Sponsored by

10:15 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

10:45 am

The Path to AI Nirvana is Through Unified Identity

As organizations race to deploy AI agents, training pipelines, and autonomous workflows, a critical foundation is playing catch-up: identity. Without a unified, cryptographically backed identity framework—one that extends seamlessly across humans, AI agents, CI/CD pipelines, and arbitrary workloads—every layer of the AI lifecycle is exposed to unauditable, ungovernable risk. This read more…

As organizations race to deploy AI agents, training pipelines, and autonomous workflows, a critical foundation is playing catch-up: identity. Without a unified, cryptographically backed identity framework—one that extends seamlessly across humans, AI agents, CI/CD pipelines, and arbitrary workloads—every layer of the AI lifecycle is exposed to unauditable, ungovernable risk.

This talk argues that cryptographic identity is not merely a security best practice but the essential building block for trustworthy AI. From model training environments where data provenance and access control determine integrity, to production systems where autonomous agents act on behalf of users and organizations, the ability to authenticate, authorize, and audit every actor in the chain is what separates experimentation from enterprise-grade AI. We will explore how a unified identity plane eliminates the fragmented, secret-laden approaches dominating today’s infrastructure and why organizations that solve identity first will unlock AI’s full potential: securely, at scale, and with confidence.

Bio

Boris Kurktchiev

Field CTO Teleport

Sponsored by

Presentation

11:15 am

Prediction Is Not Protection

Application security has become a forecasting exercise. We rely on CVEs, scanners, and severity scores to predict what might go wrong. But in an AI-driven world, where code ships faster and attacks move faster, prediction is no longer enough. Forecasts don’t tell you what’s being exploited. They don’t tell you read more…

Application security has become a forecasting exercise.

We rely on CVEs, scanners, and severity scores to predict what might go wrong. But in an AI-driven world, where code ships faster and attacks move faster, prediction is no longer enough.

Forecasts don’t tell you what’s being exploited. They don’t tell you what’s reachable. And they don’t tell you what’s under attack right now.

This talk shows why forecast-only security breaks down in the machine-speed-era, and what replaces it.

You’ll see how runtime visibility changes application security from a guessing game into an operational discipline – revealing real attack paths, reducing noise, and enabling teams to detect and stop attacks in production.

Bio

David Millar

Cyber-Security Leader Contrast Security

Sponsored by

11:45 am

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

12:00 pm

Lunch

Keynote

12:15 pm

Cybersecurity as a Boardroom Conversation: What Leaders Get Wrong

Bio

Kalyan Chakravarthy

Chief Information Officer Electrical Safety Authority
1:15 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

1:45 pm

AI-generated code: Maximize gains, minimize risks

AI coding assistants promise massive productivity gains, but recent academic research shows they also introduce instability, security weaknesses, and developer overconfidence. In this talk, I present data from large-scale studies demonstrating how AI-generated code affects delivery performance, vulnerability rates, and developer decision-making. I then outline a practical, end-to-end approach for read more…

AI coding assistants promise massive productivity gains, but recent academic research shows they also introduce instability, security weaknesses, and developer overconfidence. In this talk, I present data from large-scale studies demonstrating how AI-generated code affects delivery performance, vulnerability rates, and developer decision-making. I then outline a practical, end-to-end approach for reducing AI-induced risk while preserving the benefits of AI-assisted development.

Bio

Jerome Robert

CEO & Co Founder Symbiotic Security

Sponsored by

Presentation

2:15 pm

The AI Identity Crisis: Protecting the 2026 Perimeter

The traditional security perimeter has dissolved into a series of invisible conversations. As organizations move to autonomous AI workflows, we have entered the era of the “Agentic Web” where AI doesn’t just answer questions, it reads our emails, browses our web pages, and calls our APIs. From “unintended leaks” where read more…

The traditional security perimeter has dissolved into a series of invisible conversations. As organizations move to autonomous AI workflows, we have entered the era of the “Agentic Web” where AI doesn’t just answer questions, it reads our emails, browses our web pages, and calls our APIs.

From “unintended leaks” where well-meaning employees accidentally feed corporate strategy into personal AI tools, to “Indirect Prompt Injection” where an AI agent is hijacked by a malicious email it was simply trying to summarize, the attack surface is now probabilistic, not just deterministic. We will explore how to regain control using a unified architecture of Zero Trust and AI Gateways that verifies the identity of the user, audits the intent of the machine, and redacts sensitive data in real-time before it ever leaves your control.

Bio

Vaishnavi Iyengar

Solutions Engineer Cloudflare

Sponsored by

2:45 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Presentation

3:00 pm

Cybersecurity Stacks Don't Fail - Accountability Gaps Do

Bio

Mark Fischer

Principal Solutions Architect IT Weapons

Sponsored by

Presentation

3:30 pm

Evolution of the Security Organization in the Era of AI - AI Maturity Model for Cybersecurity.

Bio

Rob Cvetkovsk

Manager, Solution Engineers Darktrace

Sponsored by

4:00 pm

Sponsor Networking Time

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!

Panel Discussion

4:15 pm

"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"

Bio

Maryam Asgariazad

Information Security and Risk Officer, Canadian Division Manulife
Bio

Nicholas Muy

Chief Security Officer Scrut Automation
Bio

Jack Brooks

Head of Hackbusters and vCISO BOXX Insurance Inc.
Bio

Kalyan Chakravarthy

Chief Information Officer Electrical Safety Authority
5:15 pm

Closing Remarks