Toronto Cybersecurity Conference
Thursday, April 23, 2026
Hybrid
370 King Street West, Toronto, ON M5V 1J9, Canada
Join Us in Toronto for the Futurecon Cybersecurity Event!
Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.
Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!
Join us live for breakfast, lunch, and a wrap up cocktail happy hour!
![]()
![]()
Keynote Speaker
“Cybersecurity as a Boardroom Conversation: What Leaders Get Wrong”
Kalyan Chakravarthy
Chief Information Officer Electrical Safety Authority
I’m a business and technology leader who thrives on turning big ideas into real results. Over the last 20+ years, I’ve worked across private, public, and non-profit sectors—leading teams, transforming organizations, and delivering strategies that stick.
Today, as VP, eSAFE & CIO at the Electrical Safety Authority, I’m focused on driving digital modernization, aligning technology with business priorities, and building high-performing teams that deliver. I believe leadership is about setting a clear vision, empowering people to succeed, and creating a culture where innovation and accountability go hand in hand.
My journey has taken me through leadership roles at GE, IBM, the Toronto International Film Festival, and the Region of Durham, tackling challenges from customer experience redesign to enterprise transformation.
Outside of my executive role, I serve on the Board of Directors at Durham College as Chair of the Nominating Committee, helping shape governance and leadership for the future.
CISO/Industry Leader Panel
"Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Shaunna Jackson
Head of Cybersecurity The University Pension Plan
Maryam Asgariazad
Information Security and Risk Officer, Canadian Division Manulife
Clementine Aubry-Blanchard
Vice President, Data Management and Innovation Environics Research
Nicholas Muy
Chief Security Officer Scrut Automation
Sponsors
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partner
“Cybersecurity is no longer just an IT problem”
FutureCon Events brings high-level Cyber Security Training to C-suite executives and CISOs (chief information security officers).
Join us for a day with multiple illuminating presentations and a panel discussion featuring C-level executives who have effectively mitigated the risk of Cyber Attacks, demo the newest technology, and discover the cutting-edge security approaches to prepare you for the future of the Cyber World.
You will gain the latest knowledge you need to enable applications while keeping your computing environment secure from even the most advanced Cyber Threats. Interact with the world’s security leaders and your peers to gather details on other pressing topics of interest to the information security community.
Have questions? Check out the FAQ.
Agenda
Times are subject to change
Opening Introductions | Check In | Networking
Presentation
AI in Cybersecurity: Friend, Foe, or Both?
Sponsored by
Identifying Threats in your Workplace
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
What is Cloud Security
Presentation
Prediction Is Not Protection
Application security has become a forecasting exercise.
We rely on CVEs, scanners, and severity scores to predict what might go wrong. But in an AI-driven world, where code ships faster and attacks move faster, prediction is no longer enough.
Forecasts don’t tell you what’s being exploited. They don’t tell you what’s reachable. And they don’t tell you what’s under attack right now.
This talk shows why forecast-only security breaks down in the machine-speed-era, and what replaces it.
You’ll see how runtime visibility changes application security from a guessing game into an operational discipline – revealing real attack paths, reducing noise, and enabling teams to detect and stop attacks in production.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Lunch
Keynote
Cybersecurity as a Boardroom Conversation: What Leaders Get Wrong
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Presentation
AI-generated code: Maximize gains, minimize risks
AI coding assistants promise massive productivity gains, but recent academic research shows they also introduce instability, security weaknesses, and developer overconfidence. In this talk, I present data from large-scale studies demonstrating how AI-generated code affects delivery performance, vulnerability rates, and developer decision-making. I then outline a practical, end-to-end approach for reducing AI-induced risk while preserving the benefits of AI-assisted development.
Sponsored by
Presentation
The Path to AI Nirvana is Through Unified Identity
As organizations race to deploy AI agents, training pipelines, and autonomous workflows, a critical foundation is playing catch-up: identity. Without a unified, cryptographically backed identity framework—one that extends seamlessly across humans, AI agents, CI/CD pipelines, and arbitrary workloads—every layer of the AI lifecycle is exposed to unauditable, ungovernable risk.
This talk argues that cryptographic identity is not merely a security best practice but the essential building block for trustworthy AI. From model training environments where data provenance and access control determine integrity, to production systems where autonomous agents act on behalf of users and organizations, the ability to authenticate, authorize, and audit every actor in the chain is what separates experimentation from enterprise-grade AI. We will explore how a unified identity plane eliminates the fragmented, secret-laden approaches dominating today’s infrastructure and why organizations that solve identity first will unlock AI’s full potential: securely, at scale, and with confidence.
Sponsored by
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!
Communicating Risk
Security Blindspots
Sponsor Networking Time
Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies!