Speakers

Keynote Speakers

Brad Doctor

Brad Doctor

Head - Security Engineering and Architecture at VMware

Innovative thought leader and information security professional with over 20 years of experience and over 20 patents in various technology domains. As the head of security engineering, architecture and offensive security at VMware, Mr. Doctor has been at the forefront of cloud security architecture and engineering for over 10 years, and has led design and engineering efforts for several commercially successful security products and services.

Session: Zero Trust Enables…Business Value?

Dr. Dorit Dor

Dr. Dorit Dor

Vice President, Products for Check Point Software Technologies

Dr. Dorit Dor serves as Vice President, Products for Check Point Software Technologies. She manages all product definition and development functions for both the enterprise and consumer divisions of the Company. Dr. Dor’s core responsibilities include leading the company’s product management, research and development and quality assurance initiatives from concept to delivery. She has been instrumental to the organization’s growth and managed many successful product releases. She has been published in several influential scientific journals for her research on graph decomposition, median selection and geometric pattern matching in d-dimensional space.

Session: Ransomware, Nation State and Supply Chain Attacks

Marc Rogers

Marc Rogers

VP of Cybersecurity at Okta

Marc Rogers is VP of Cybersecurity at Okta. With a career that spans more than twenty years, he has been hacking since the ’80s and is now a white-hat hacker renowned for hacking things like Apple’s TouchID and the Tesla Model S. Prior to Okta, Mr. Rogers served as the Head of Security for Cloudflare and spent a decade managing security for the UK operator, Vodafone. He’s been a CISO in South Korea and has also co-founded a disruptive Bay Area startup. In his role as technical advisor on “Mr. Robot,” he helped create hacks for the show. He’s also an organizer and the Head of Security for the world’s largest hacking conference: DEF CON. Most recently Mr. Rogers helped found the CTI League, a multinational cybersecurity initiative combining industry professionals, government agencies, and law enforcement from 80 different countries.

Session: Focusing On The Sophistication Of Recent Attacks Only Gives Us Half The Picture

Moti Sagey

Moti Sagey

Chief Evangelist, VP Strategic Marketing for Check Point Software Technologies

Moti Sagey is the VP of Strategic Marketing & Intelligence at Check Point Software. Moti is responsible for strategically transforming intelligence and information into a compelling and resonating story, enabling Check Point to provide its customers with disruptive technologies that are one step ahead of threats and competitors. With more than 20 years’ experience in the area of information security, Moti has seen tremendous evolution in the threat landscape and in how companies can manage the risk it presents to their business. Moti has helped organizations, large and small and across the public and private sector, to understand risk posture and put in place strategies and the right architecture to manage it. He is widely acknowledged as an industry thought leader and experienced practitioner, capable of translating technology challenges into actionable business solutions and is a renowned public speaker at international cyber security conferences. Prior to joining Check Point in 2012, Moti was a Senior Consultant & Sales Engineer at Fortinet and Chief Technology Officer at NetVision Business, a provider of security, business continuity, and infrastructure platforms and solutions. He has designed the most secure network architectures in financial, federal & critical infrastructure companies.

Session: Ransomware, Nation State and Supply Chain Attacks

Moshe Toledano

Moshe Toledano

CISO and Director of Cyber Security at Hydro Québec

Mr. Moshe Toledano was named CISO and Director of Cyber Security at Hydro Québec in April 2020. In this role, he leads the company’s cybersecurity activities. He has more than 20 years of cybersecurity experience in various companies, including more than 13 years with Deloitte. Prior to joining Hydro-Québec, Mr. Toledano was Director of Cyber Security at Domtar where he supported IT management by deploying security incident management processes while improving the company’s security operations. Mr. Toledano holds a Master of Business Management (MBA) and a BA in Applied Social Sciences from Concordia University. In 2005, he completed a certificate in professional information and security system at ISC2.

Session: Never Waste a Crisis

Speakers

Mark Allen

Mark Allen

Systems Engineer - Palo Alto Networks

Mark Allen has spent the last 15 years as a network and security architect helping organizations achieve their cybersecurity goals. For the last 6 years Mark has worked at Palo Alto Networks focusing on Government and public sector organizations.

Session: SOAR Beyond the SOC

Jake Alosco

Jake Alosco

Senior Director of Channel Sales at Immersive Labs

Jake Alosco is Senior Director of Channel Sales at Immersive Labs, working closely with partners to help business leaders drive Cyber Workforce Optimization within their organization. Prior to Immersive Labs, Jake held various channel specific roles for Contrast Security, Avecto, and Veracode.

Session: Security Doesn’t Live on Paper — An Interactive Crisis Simulation

Jonathan Andresen

Jonathan Andresen

Senior Director, Marketing & Products at Bitglass

Jonathan Andresen is Senior Director, Marketing & Products Asia-Pacific at Bitglass. Mr. Andresen joined Bitglass in April 2020 and has been working in the enterprise IT and telecommunications sector since 1996, relocating to Asia in 2003. Prior to joining Bitglass, Mr. Andresen held various product, marketing, and strategy management positions in Asia-Pacific at McAfee, MobileIron, Blue Coat Systems (now Symantec) and Nortel Networks. Mr. Andresen’s career includes earlier positions with Teleglobe, MetroPhotonics and Canada’s Department of Foreign Affairs. Mr. Andresen holds a Master’s Degree in International Management from Canada’s Carleton University and an undergraduate degree from Queen’s University.

Session: Rise of Secure Access Service Edge (SASE)

Eric Bednash

Eric Bednash

Co-founder and CEO RackTop Systems

Eric Bednash is a founder and Chief Executive Officer of RackTop Systems, an innovative data security company leading the Cyberstorage market with a best-in-class platform which fuses into a single product large scale unstructured data storage and the ability to detect and stop ransomware and insider threats in real-time.

A passion-driven entrepreneur and innovator, Bednash brings to his position more than 20 years of experience in the cybersecurity sector, where he designed specialized data security products for the U.S. Intelligence Community, Department of Defense, and commercial enterprises.

Bednash co-founded RackTop in 2010 to lead a transformative approach to cyberstorage protection that arms companies with simplified solutions to the most complex data protection challenges. RackTop’s technology has been leveraged by numerous organizations spanning a wide variety of global industries – notably in government, media/advertising and entertainment, financial services, healthcare, and higher education.

From 2001 to 2010, Bednash served as co-founder and Chief Technology Officer of a mid-sized Federal systems integrator, focused on developing mission data systems for the Department of Defense and other U.S. government agencies. He started his professional career specializing in data center systems for Time-Warner Corporation and spent the better part of the dot-com boom in Washington, D.C., where he consulted businesses on the new and expanding internet era.

Bednash attended Rochester Institute of Technology, Penn State University and Stevenson University, completing both undergraduate and graduate coursework in Business and Technology Management.

Session: Cyberstorage: Stopping Ransomware at the Heart of the Enterprise

Ron Bennatan

Ron Bennatan

SVP & GM, Data Security Imperva

Ron joined Imperva through the acquisition of jSonar where he served as CTO and co-founder. He has been a “data security guy” for 25 years and has worked at companies such as J.P. Morgan, Merrill Lynch, Intel, IBM and AT&T Bell Labs. He was co-founder and CTO at Guardium which was acquired by IBM where he later served as a Distinguished Engineer and the CTO for Data Security and Governance. He has a Ph.D. in Computer Science and has authored 11 technical books. Previous Speaking Experience: Ron has spoken at the Nashville Cybersecurity Summit; Brightalk Virtual fireside chat: The state of data security; and CyberSummit USA.

Session: Improving Data Lake Security

Nicolas Bergevin

Nicolas Bergevin

Senior Account Executive at Armis

Nicolas has been working in the field of information technology since 1997 and information security since 2002. As a sales manager, sales representative, trainer, and experienced counselor, he has demonstrated expertise in the development of solutions for information security governance and compliance programs. He has a great ability to build and manage cross-functional teams to achieve business objectives. He acquired the knowledge of developing information security strategies always with a view on improving productivity and profitability for his customers. Founding member and manager of Callio Technologies in 2002, Nicolas pioneered the adoption of the ISO-17799 standard (BS-7799) in Québec. In 2006, Nicolas joined the Bell Canada’s team as a security specialist; this position allowed him, by leveraging his deep understanding of the information security market reality, to evaluate a multitude of technologies and services to help customers meet their security needs, obligations, and risk mitigation objectives with innovative solutions in line with their budgets. In April 2014, he joined Check Point Software Technologies as a Strategic Account Manager in Toronto. Nicolas is currently working as a Regional Sales Manager at Armis since March 2020. In 2020, Nicolas developed a personal interest in Blockchain technology by completing multiple certificates from the University of Buffalo, Duke University and University of California (Irvine).

Session: What role does cryptocurrency play in the spread and evolution of ransomware attacks?

Jon Brown

Jon Brown

Network Segmentation Sales at Forescout Technologies Inc.

Jon has over 20 years of experience in network technologies including as a Product Manager, Systems Engineer, Cyber Security Specialist and Network Segmentation Overlay across diverse business segments and geographic regions.

Session: A Proven Non-disruptive Network Segmentation Solution: Achieving a Mature Cybersecurity Model

Jeff Carpenter

Jeff Carpenter

Product Marketing Leader - IAM, IoT & Directory Services

Jeff is passionate about securing identities of all types – human and machine. He is a seasoned professional with broad experience in access control, cryptography, biometrics, virtualization, cloud, mobile and network security. Having spent much of his career in cyber security and identity, he has worked for leading companies in this space including RSA and HID Global. He finds his true calling bringing new and innovative solutions to market that ultimately enable us to interact and do more online. Jeff holds both CISSP and CCSP certifications.

Session: IoT as the New Identity: 6 Game Changing Principles for Proper Control and Transformation of Your Things Environment

Maurice Côté

Maurice Côté

VP Business Solutions at Devolutions

Maurice brings more than 15 years of IT experience to the Devolutions team. For 12 years he served as an avionics technician and instructor in the Canadian Army. He has also worked as a system/network/database IT administrator, solution architect, a team manager, and he has successfully completed several projects for world renowned organizations in the medical industry and in the online marketing field. As Devolutions’ Business Architect, Maurice leads and manages our development team on every project. His world class team management experience elevates our development structure to the next level.

Session: How To Achieve Better Endpoint Management with the Proper Remote Connection Tool

Doron Davidson

Doron Davidson

VP Global Services, LogPoint

Doron has over 20 years of experience in IT security and telecommunications, leading him to coin the term “full scope incident”. Before starting SecBI, he held operational and P&L responsibilities for RSA’s EMEA professional security services practices. In this role, Doron worked with some of the world’s largest security teams and helped them to establish the systems and business processes at the heart of their incident response operations. He previously held product management and technical positions at Cyota, Beyond Security, Schema, and Amdocs. Doron led SecBI’s business development, and marketing. Doron has recently joined LogPoint as VP Global Services. Doron is a big believer in Stephen Covey’s seven habits and lectures on motivation. He is a CISSP and holds an MBA and a BSc in Computer Science. Fun fact: In his spare time, Doron is a home brew master, producing beer with precision and innovative flavors.

Session: How to increase SOC efficiency with automatic incident detection and response

Laurent Desaulniers

Laurent Desaulniers

Director Pentesting Services at GoSecure

Laurent Desaulniers the director of Pentesting services at GoSecure. He has over 15 years of experience in offensive security and attack simulation. In addition to his experience in intrusion, Mr. Desaulniers had the opportunity to teach at ÉTS, HEC and the École polytechnique de Montréal. Laurent has been a speaker around the world, presenting at several conferences such as RSA, Red Team Summit, NorthSec, NCFTA, CQSI, Hackfest and many others. In his hobbies, Mr. Desaulniers is interested in crochet techniques, magic and pickpocketing.

Session: Gouvernance d’un programme de tests de sécurité en entreprise

Vicky Desjardins

Vicky Desjardins

PhD student, School of Criminology at the University of Montreal

Vicky Desjardins is a Ph.D student at the School of Criminology at the University of Montreal. Vicky focuses in her thesis on the coevolution of cyberattacks and countermeasures. Her thesis project includes using game theory principales to analyze the coevolution of mains cyberattacks and countermeasure employed. She is also working on identifying patterns of collusions in public contracts and previously worked on identifying offline strategies of contact sex solicitors. Her research interests lay in risk assessment and cybersecurity.

Session: Finding the weakness: introduction of leakware as ransomware’s adaptation to countermeasures

Maria-Jose Erquiaga

Maria-Jose Erquiaga

Researcher at the Stratosphere laboratory at the CVUT

Maria Jose Erquiaga is a malware researcher from Argentina. Previously, she worked as a researcher at the Stratosphere laboratory at the CVUT, in Prague, Czech Republic and as a team leader of the Aposemat project, a joint project between the Stratosphere laboratory and Avast. Maria’s work has been focused on executing and analysing malware. Maria joined the Cognitive Intelligence team of Cisco Systems as a junior threat researcher in April 2021. Maria has spoken at CACIC, ArgenCon, SIGCOMM, BotConf, WACCO, NotPink, Defcon, BlackHat and Ekoparty.

Session: The Mass Effect: How Opportunistic Workers Drift into Cybercrime

Andrew Faber

Andrew Faber

Director of IT Risk and Security Governance at Greater Toronto Airports Authority

Andrew Faber is the Director, IT Security Risk Management at the Greater Toronto Airports Authority (GTAA), operator of Toronto Pearson International, Canada’s largest airport. Andrew is responsible for the GTAA’s information security services organization and oversees the team that not only develops the organization’s information security strategy and roadmap, but also manages delivery of that strategy through IT Security governance and awareness training. A key element of Andrew’s role consists of ensuring that an appropriate cyber security incident response plan is both in place and well aligned with the airport’s overall incident response plan. Throughout his career, Andrew has successfully developed and delivered information security roadmaps for a number of organizations across multiple industries, including financial services, health care, retail and telecommunications. Andrew holds both a CISSP certification from ISC2 and an ABCP certification from the Disaster Recovery Institute in Canada. Prior to joining the GTAA, Andrew was the Director of Information Security for Aimia (Aeroplan) responsible for the company’s Canadian business units. Andrew has also specialized in the Payment Card Industry Compliance program as a certified auditor.

Session: Taking our head out of the sand – Challenges of Operational Technology Security at an Airport

Sebastian Garcia

Sebastian Garcia

Network malware researcher and Assistant Professor

Sebastian Garcia is a network malware researcher and Assistant Professor that has extensive experience in machine learning applied to network traffic. He created the Stratosphere IPS project, a machine learning-based, free software IPS to protect the civil society. He likes to analyze network patterns and attacks with machine learning. As a researcher in the AIC group of Czech Technical University in Prague, he believes that free software and machine learning tools can help better protect users from abuse of their digital rights. He has been teaching in several countries and Universities and working on penetration testing for both corporations and governments. He was lucky enough to speak at Ekoparty, DeepSec, Hacktivity, Botconf, Hacklu, InBot, SecuritySessions, ECAI, CitizenLab, ArgenCon, Free Software Foundation Europe, VirusBulletin, BSides Vienna, HITB Singapore, CACIC, etc. As a co-founder of the MatesLab hackspace he is a free software advocate that worked on honeypots, malware detection, distributed scanning (dnmap) keystroke dynamics, Bluetooth analysis, privacy protection, intruder detection, robotics, microphone detection with SDR (Salamandra) and biohacking.

Session: The Mass Effect: How Opportunistic Workers Drift into Cybercrime

Sattwik Gavli

Sattwik Gavli

Director of Cloud Products, Tufin

Sattwik is the Director of Cloud Products at Tufin. Prior to working at Tufin, Sattwik helped enterprises with their digital transformation journey into the cloud while working for companies like Oracle, Ribbon Communications, and most recently for a cloud-native security startup, Privafy Inc. At Tufin, Gavli continues to work with Fortune 1000 companies to accelerate their adoption of security policy management in cloud.

Session: 3 Essentials for Automating Security Across Hybrid Cloud

Quentin Guiguet

Quentin Guiguet

Cyber Security Consultant – Linkbynet – Part of Accenture

Quentin is a cybersecurity consultant at Linkbynet and has specialized in identity, access and resource management issues in recent years. Based on his experiences in various contexts and sectors, he has a strong expertise on the technical, functional and organizational issues that arise from the implementation of IAM services in a Zero Trust-oriented approach.

Session: Zero Trust : quelles démarches pour bien commencer?

Éric G. Hébert

Éric G. Hébert

Vice President, CISO Québecor Média inc.

CISO and Vice-President of Quebecor, which includes Videotron, Quebecor Media and TVA, among others, Éric Hébert has extensive experience in team leadership, cybersecurity program management, risk management and governance. Wherever it goes, it strives to instill cultural change that is conducive to information security and to mitigate divergent views. His pragmatic approach is appreciated by the CEOs, Directors and other VPs he works with. In a career of more than 25 years, he is most often found as a CISO, trusted advisor or lecturer. He maintains a regular presence in the information security community and regularly shares his experiences and opinions during conferences and interviews.

Session: What role does cryptocurrency play in the spread and evolution of ransomware attacks?

Chris Hills

Chris Hills

Deputy CTO & CISO, BeyondTrust

Christopher Hills has 15+ years’ experience as a Senior Security and Architecture Engineer operating in highly sensitive environments. Chris started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Senior Solutions Architect consulting on PAM implementations and reports to the Office of the CTO/CISO as an acting Deputy.

Session: Meeting the Challenges of a Multicloud World – Privileged Access & Identities

Sam Kumarsamy

Sam Kumarsamy

Senior Director and Head of Product Marketing

Sam Kumarsamy brings more than 20 years of experience in marketing, sales and business development at MobileIron, Gigamon, Infoblox, Blue Coat, Check Point, Cisco, Citrix, E&Y as well as successful VC-funded security and networking startups. Currently, he is the Senior Director/Head of Product Marketing at Remediant responsible for GTM strategy and marketing of their privileged access management (PAM) solution. He has defined, launched, promoted and sold several disruptive products, services and solutions globally, both directly to customers as well as through channels. Sam has a bachelor’s degree in engineering from India and an MBA from the W.P. Carey School of Business at Arizona State University.

Session: Deconstructing Your Privileged Attack Surface

Aamir Lakhani

Aamir Lakhani

Senior Security Strategist at Fortinet

Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the US Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Under the pseudonym Dr. Chaos, Aamir also operates the popular security social media blog at DrChaos.com. In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as “a blogger, InfoSec specialist, superhero…and all-around good guy.”

Session: Zero, Dark and Dirty – Zero Trust like you’ve never seen it before

Sebastien Lapointe

Sebastien Lapointe

Business information security officer, Desjardins group

Sébastien Lapointe recently joined the Desjardins Group in a new role as the business information security officer (BISO) of IT. A financial cooperative that manages $229 billion requires uncompromising security and in his role one Sebastien’s main responsibility is to implement the security operating model for the IT business sector. Prior to that, he was working for the Société de transport de Montréal (STM) as the Chief Architecture and Information Security Officer where he leads a multidisciplinary team of experts specialized in IT and OT technology. Sebastien has over 20 years of experience in the field of information security and risk management. His career started in the public sector working for the government of Canada as an IT security analyst. Strong from this experience he tackled the consulting business working with big IT firms and financial institutions. His work was mainly focused on building IT security architecture and IT security threat and risk assessments. He also co-founded CyberAction Canada a non-profit organization seeking to provide research and awareness on the secure usage of information and communication technology to protect the dignity and the personal integrity of children on the Internet. He holds multiple security certifications and a Specialized Graduate Diploma in IT governance, audit and security from Sherbrooke University.

Session: What role does cryptocurrency play in the spread and evolution of ransomware attacks?

Randy Martin

Randy Martin

Director of Vulnerability Management at Gosecure

Builder of the GoSecure VMaaS solution since day one in 2014 and a veteran with over 18 years of various technology domains.  As the head of the team and service at GoSecure Mr. Martin has seen and implemented vulnerability management in all types of industry such as Manufacturing, Pharmaceuticals, Banking, Real estate, Energy, Mining, Retail and much more.

Session: Vulnerability Management – Lessons Learned & Wisdom Earned

Chloé Messdaghi

Chloé Messdaghi

Award-winning changemaker & Cofounder of We Open Tech

Chloé Messdaghi is an award-winning changemaker who is innovating tech and information security sectors to meet today and tomorrow demands. For over 10 years, she has accelerated startups through solutions that empower organizations and people to stand out from the security & tech crowd. She is an international keynote speaker at major security and tech conferences and events, and serves as a trusted source for national and sector reporters and editors, such as Forbes and Business Insider. Additionally, she is one of the Business Insider’s 50 Power Players of Cybersecurity, a SC Magazine honoree, Cybersecurity Advocate of the Year, and Cybersecurity Women of the Year by Cybersecurity Excellence Awards. Outside of her work, she is the co-founder of Hacking is NOT a Crime and We Open Tech. She holds a Master of Science from The University of Edinburgh, and a BA in International Relations from University of California, Davis, as well as executive education certificates from Wharton and Cornell.

Session: Burnout : The Threat to Security Teams

Shamla Naidoo

Shamla Naidoo

CISO, Head of Cloud Strategy at Netskope

Shamla Naidoo brings a rare mix of global business experience, technical knowledge and legal expertise to her numerous roles. She is currently the head of Cloud Strategy and Innovation at Netskope. She is also an independent director at multiple public and private companies. She was recently a Managing Partner at IBM where she advised CEOs, board directors, and executives on how to ensure digital transformation, innovation and strategic risk management co-exist while creating business value. Prior to that Shamla was IBM’s Global Chief Information Security Officer (CISO), where she was accountable for the protection of the worlds largest Intellectual Property portfolio and IBMs global technology estate. After 25 years as an engineer and technologist, Shamla acquired a Jurisdoctor degree and is licensed to practice law. She teaches multiple courses in Information Technology, Security and Privacy law at the University of Illinois at Chicago (UIC) Law and she coaches a number of Security and Technology executives.

Session: How businesses should think about their cybersecurity investments?

David Ott

David Ott

Senior Staff Researcher and Academic Program Director within VMware Research

David Ott is a Senior Staff Researcher and Academic Program Director within VMware Research. VMware’s Academic Program is the external research arm of VMware, bringing together top academic researchers and company technical leaders to better understand disruptive technology trends and to explore new areas of innovation. Ott works on a range of topics at the intersection of security and systems and is a Ph.D. graduate in computer science from UNC Chapel Hill. He has spoken at the International Cryptographic Module Conference; Northeastern University Khoury College of Computer Science Speaker Series; Florida Institute for Cybersecurity Research; the National Institute of Standards and Technology (NIST) virtual workshop on Considerations in Migrating to Post-Quantum Cryptographic Algorithms and RSA Conference.

Session: Preparing Your Organization for a Post-quantum World

Masarah Paquet-Clouston

Masarah Paquet-Clouston

Security Researcher at GoSecure

Masarah Paquet-Clouston is a PhD candidate in criminology, a security researcher at GoSecure and a collaborator of the Stratosphere IPS project. She is also part of the outreach committee for the NorthSec organization. With her background in economics, criminology, and now cybersecurity, she specializes in the study of online economic crime. She presented at various international conferences including Black Hat USA, DEFCON, RSA, CERT-EU, Sector, NorthSec, and Virus Bulletin.

Session: The Mass Effect: How Opportunistic Workers Drift into Cybercrime

Serge-Olivier Paquette

Serge-Olivier Paquette

Senior manager of data science at Secureworks

Serge-Olivier Paquette is the senior manager of data science at Secureworks. His research focuses on the ability to infer, through machine learning, the context of security events from incomplete information. He also serves as President for Northsec, a non-profit organization that hosts a series of world-class technical cyber security events, held annually in Montreal.

Session: The Mass Effect: How Opportunistic Workers Drift into Cybercrime

Antoine Paris

Antoine Paris

Cyber Security Team Leader and Consultant, Linkbynet – Part of Accenture

Antoine is a cybersecurity consultant and team leader at Linkbynet. In recent years, he has specialized in strategic support, in particular the strategy for implementing a Zero Trust model at a company level. Through his experiences in large and complex contexts, he has expertise in the functional, organizational and change management aspects necessary for the success of such a transformation.

Session: Zero Trust : quelles démarches pour bien commencer?

Olga Polishchuk

Olga Polishchuk

Sr. Director, Analytics & Investigations, ZeroFox

Olga Polishchuk is a security and intelligence professional with over a decade of experience in executive security, open source intelligence, threat & risk assessments, and a wide array of physical and information security investigations. Olga serves as the Senior Director in the Threat Analysis and Investigations Unit at ZeroFox, focusing on tactical investigations, threat assessments, and strategic intelligence. In her current position, she acutely focuses on expanding organizations’ understanding of the potential and emerging threats and aids in real-time operational and strategic decisions.

Session: Executive Exposure: The Not-So-Secret Backdoor into your Organization

Aparna Rayasam

Aparna Rayasam

Senior Vice President and General Manager, Application Security, Akamai Technologies

Aparna Rayasam, Senior Vice President and General Manager, Application Security, is responsible for Akamai’s Application Security business within the Security Technology Group. She is responsible for leading product management, business development, engineering, research, data science, and operations for Akamai’s Application Security portfolio. Previously, she served as Vice President, Web Security Engineering, where she was responsible for all research and development of Akamai’s web security portfolio. In her career at Akamai, she has held several engineering and product leadership roles and was responsible for the development and launch of several Akamai products, including Akamai’s award-winning web application firewall, Kona Site Defender, Client Reputation, and Bot Manager. Prior to joining Akamai in 2006, she held several engineering leadership roles at Oracle and Adobe. Rayasam holds a Bachelor of Engineering degree in Information Science from Bangalore University, India. She has also participated in several executive education programs at MIT’s Sloan School of Management and is a board member of several nonprofit organizations in the Boston metropolitan area.

Session: Malicious Masquerade: Preventing Account Takeover Attacks

Scott Register

Scott Register

Vice President, Security Solutions, Keysight Technologies

Scott Register has more than 15 years of experience leading product management and go-to-market activities for global technology companies. In his current role, he is tasked with bringing new security solutions to market across Keysight’s broad solution portfolio. Prior his current role, Scott was vice president of product management leading the development of new Ixia products in the areas of Security, Virtualization and Cloud. Earlier, Scott spearheaded the company’s visibility product line. Prior to Ixia, he led product management at BreakingPoint Systems where he was responsible for the industry’s highest rated network performance, security, and resiliency testing equipment, before the company was acquired by Ixia.

Session: Change Your Perspective: View Your Network Like a Hacker

Guillaume Ross

Guillaume Ross

Head of Security at Finaptic

Guillaume has been working in IT and security for way too long by now. Having built security programs for companies of all sizes, worked in vendor organizations on the security and product management side and through years of consulting, he likes to keep it fresh by alternating between working internally, securing companies, and working for companies in the security industry. As the Head of Security for a brand new Fintech startup, he is currently learning a lot about managing security in an agile environment where security is an extremely high priority. Guillaume is a frequent conference speaker, alternating between technical/blue-team topics as well as security management topics. Guillaume is also a Pluralsight trainer, producing cyber security training around topics such as network security monitoring, SOC operations, osquery, cloud security and more.

Session: Security from day 1: Lessons, tools and tips from the land of the greenfield

Mathieu Saulnier

Mathieu Saulnier

Core Mentor for Defcon's Blue Team Village

Mathieu Saulnier is a “Security Enthusiast” and a Core Mentor for Defcon’s Blue Team Village. He is currently “Sr Manager Incident Response” at Syntax where focuses on Incident Response, Threat Hunting and Adversary Detection. In the last 2 decades, he worked for one of the largest carrier in Canada as Sr Security Architect and held numerous positions as a consultant within several of Quebec’s largest institutions. Since 2020 he took his mentoring engagement to the next level by joining the Blue Team Village Mentor Program. He loves to give talks and has had the honor to do so at Derbycon, SANS DFIR Summit, Defcon’s BTV, NorthSec, GrayHat, GoSec and some BSides.

Session: IR Playbooks – A New Open Source Resource

Lewis Shields

Lewis Shields

Cyber Threat Analyst, ZeroFox

Lewis joined ZeroFox in 2020 and is based out of London, England. He previously worked for Deloitte and the UK Civil Service, producing strategic analysis for the highest levels of the UK Government and serving as a subject matter expert in the Defence and Security space.

Session: Executive Exposure: The Not-So-Secret Backdoor into your Organization

Ajay K. Sood

Ajay K. Sood

Country Manager - Canada, Rapid7

With over 20 years of real-life, in-the-trenches business experience in the IT security space, Ajay is a seasoned veteran when it comes to introducing disruptive security technology to the Canadian market. He currently serves as the Canadian Country Manager at Rapid7, where he is empowering clients to defend themselves from the pervasive threats to traditional and cloud infrastructures with best in class solutions and services. A seasoned leader, speaker and author, Ajay has enabled his clients to stay ahead of the curve in architecting and operating their cyber security defences. You can find him on LinkedIn and Twitter at @akssecure.

Ajay K. Sood has been published and quoted by numerous news sources (CTV, Global News, Financial Post, Reuters, The Hill Times, POLITICO, IT World Canada, etc.) Ajay has spoken and panelled at SecTOR and has sat on panels for Thompson Reuters and others, and is the Editor of Canadian Cybersecurity 2018 and 2020.

Session: Cybersecurity – Trends, Evolution, and Paradoxes

Traian Toma

Traian Toma

Master’s student, School of Criminology at the University of Montreal

Traian Toma is a master’s candidate in criminology at the at the University of Montreal. During his schooling, he developed a keen interest in studying the link between classical criminological theories and cybercrime/cybersecurity issues. Today, the majority of his projects attempt to combine theoretical innovation in criminology with social utility for cybersecurity practitioners. Based on ideas typically reserved for cognitive sciences, he was able to propose several avenues of intervention to prevent, detect and respond to the compromise of identities within Desjardins Group.

Session: Mieux vaut prévenir ET guérir : l’impact d’une posture de cyber-résilience sur la réaction du public à la suite d’un vol de données chez les entreprises

Yohan Trépanier Montpetit

Yohan Trépanier Montpetit

Chief Product Officer, Flare systems

For over 10 years, Yohan has led technical teams to reach ambitious goals on innovative projects. From building autonomous robotic vehicles to creating immersive, real-word guest experiences, he has led software teams on projects worldwide, from New York to Abu Dhabi. As Cofounder and Chief Product Officer at Flare Systems, he brings a broad technological background to develop innovative Cyber Threat Intelligence and Digital Risk Protection solutions to solve real-world business challenges.

Session: Continuous Reconnaissance Approaches to Reduce External Risk

Charity Wright

Charity Wright

Cyber Threat Intelligence, Recorded Future

Come to the dark side! Charity Wright, a former NSA analyst and current Cyber Threat Intelligence Expert at Recorded Future will take you on a tour of the dark web, busting myths and explaining how you can collect and analyze pertinent intelligence from the dark web to neutralize threats at the earliest stages of the cyber kill chain. This session will take you on a guided tour of some of the hottest underground markets and forums where cybercriminals plan their attacks. See the most popular use cases for intelligence to protect your companies and learn how to implement dark web cyber threat intelligence into your current security program.

Session: Come to the Dark Side

 Jeffrey Wu

Jeffrey Wu

Enterprise Sales Engineer, Immersive Labs

Jeffrey Wu serves as an Enterprise Sales Engineer for Immersive Labs, helping organizations to optimize their cyber workforces to meet ever-evolving threats. Prior to Immersive Labs, Jeffrey held Engineering roles at VMware, Carbon Black, and United Electronic Industries. Jeffrey graduated from Tufts University with a BS in Electrical Engineering.

Session: Security Doesn’t Live on Paper — An Interactive Crisis Simulation