SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
The
Cyber Security
Readiness
of Canadian Organizations
You’re Invited to our
Exclusive Networking Event
hispanotech.ca
Speakers
Brad Riddell
Director of Security, Scalar Decisions

Panelists
Loren Hicks
Principal, Tracker Networks
Carlos Chalico
Director, Strategic Alliance at NYMITY Inc.
Frank Palmay
Senior Counsel at McMillan LLP - National
Co-Chair Cyber Security and National
Co-chair  Financial Services Regulatory
Event Sponsor:
Venue Sponsor:
Food and Beverage Sponsor:
Carlos Chalico
Director, Strategic Alliance at NYMITY Inc.
Carlos Chalico is an Information Security, IT Risk and
Privacy Professional with almost 20 years of experience.
He recently became the Strategic Alliance Director
of NYMITY Inc. the leading global research company
specializing in accountability, risk, and compliance
solutions for the privacy office. Previously Carlos was
the head of the Toronto office of Ouest Business Solutions
Inc. and worked with Ernst  Young where he served as
an Information Security, IT Risk and Privacy professional.
He is also an instructor for the University of Toronto and
a volunteer advisor for the Canadian Red Cross in issues
related to information security. He holds the following
designations: CISA, CISSP, CISM, CGEIT, ISO27001LA.
Frank Palmay
Senior Counsel at McMillan LLP - National Co-Chair Cyber Security
and National Co-chair  Financial Services Regulatory
In addition to law, Frank Palmay has an electrical
engineering degree (U of T Eng. Sci.-Gold Medal),
and a Biomedical Master’s degree (Univ. of Sussex-
Commonwealth Scholar). In Cyber Security, Frank
is pulling together a multi-disciplinary team to
advise companies on corporate governance, risk
mitigation and transfer and crises response.
for a presentation that will review and
analyze the findings of the 2016 Scalar
Security Study, in which we surveyed
over 650 Canadian IT and IT security
professionals to find out how prepared
they are to deal with attacks, how
cyber attacks have evolved in the last
twelve months, and what strategies,
tactics, and technologies are most
effective in combatting cyber attacks.
You will learn what separates high-
performing security organizations
from their low-performing
counterparts, and steps you can
take to help your company achieve
a stronger cyber security posture.
Brad Riddell
Director of Security, Scalar Decisions
Brad Riddell is the Director of Security for Scalar
Decisions. Scalar is a national IT solution provider with
eight offices across Canada. In 2015, Scalar was deemed
a major player in the IDC MarketScape for Canadian
managed security service providers, and was ranked
the #1 ICT security company on the 2014 and 2015
editions of the Branham 300.
Prior to Scalar, Brad led the Financial Services Security
Sales function at a major Canadian telecommunications
provider. Brad is a Chartered Accountant and has a B.
Comm from University of Toronto.
Loren Hicks
Principal, Tracker Networks
Loren Hicks has spent 40 years working with information
technology, and has been online in one form or
another since the 1970’s. With a B. Comm from McGill,
where he lectured in Management, he has always
focused on using technologies to advance business
goals. He has run significant consulting practices,
and has twice been a CIO. In recent years he has
been developing methods for prudent management
of Cyber Security and other technology risks.Tickets are $25 RSVP online at
http://cybersecurityevent.eventbrite.ca
Thursday, April 14, 2016Date:
6:00 – 9:00 PM (EDT)Time:
McMillan LLP.
Brookfield Place, Suite 4400,
181 Bay Street, Toronto,
Ontario, Canada M5J 2T3
Location:
Join
us

Mais conteúdo relacionado

Mais procurados

Mitigating Cyber Issues in M&A
Mitigating Cyber Issues in M&AMitigating Cyber Issues in M&A
Mitigating Cyber Issues in M&AExpert Webcast
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"OCTF Industry Engagement
 
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesThe Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesDavid Dourgarian
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
 
Gary R. Markham to Speak at 2011 Council on Litigation Management Conference
Gary R. Markham to Speak at 2011 Council on Litigation Management ConferenceGary R. Markham to Speak at 2011 Council on Litigation Management Conference
Gary R. Markham to Speak at 2011 Council on Litigation Management ConferenceLSG
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Kroll
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604ISSA LA
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldKevin Duffey
 
ACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramJaim Harlow
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeKevin Duffey
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityIna Luft
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015Wynyard Group
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 

Mais procurados (20)

Mitigating Cyber Issues in M&A
Mitigating Cyber Issues in M&AMitigating Cyber Issues in M&A
Mitigating Cyber Issues in M&A
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"
 
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesThe Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Gary R. Markham to Speak at 2011 Council on Litigation Management Conference
Gary R. Markham to Speak at 2011 Council on Litigation Management ConferenceGary R. Markham to Speak at 2011 Council on Litigation Management Conference
Gary R. Markham to Speak at 2011 Council on Litigation Management Conference
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's world
 
ACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_Program
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 

Destaque

What are the differences in positioning and branding with a small business?
What are the differences in positioning and branding with a small business?What are the differences in positioning and branding with a small business?
What are the differences in positioning and branding with a small business?Sameer Mathur
 
What would you do with 10% Productivity Improvement?
What would you do with 10% Productivity Improvement?What would you do with 10% Productivity Improvement?
What would you do with 10% Productivity Improvement?Troy Bitter
 
6DCP Presentation_12.19.2015
6DCP Presentation_12.19.20156DCP Presentation_12.19.2015
6DCP Presentation_12.19.2015Eddie Cohen
 
The hidden factory by JULIAN KALAC
The hidden factory by JULIAN KALACThe hidden factory by JULIAN KALAC
The hidden factory by JULIAN KALACJulian Kalac P.Eng
 
Síntesis de proteínas. La traducción. Narración ilustrada obtenida de Virtua...
Síntesis de proteínas. La traducción. Narración ilustrada obtenida de  Virtua...Síntesis de proteínas. La traducción. Narración ilustrada obtenida de  Virtua...
Síntesis de proteínas. La traducción. Narración ilustrada obtenida de Virtua...Hogar
 
Software quality - no more bugs!
Software quality - no more bugs!Software quality - no more bugs!
Software quality - no more bugs!Arnon Axelrod
 
Exocitosis. Power point para primero y tercero medio, Biología.
Exocitosis. Power point para primero y tercero medio, Biología.Exocitosis. Power point para primero y tercero medio, Biología.
Exocitosis. Power point para primero y tercero medio, Biología.Hogar
 

Destaque (14)

What are the differences in positioning and branding with a small business?
What are the differences in positioning and branding with a small business?What are the differences in positioning and branding with a small business?
What are the differences in positioning and branding with a small business?
 
What would you do with 10% Productivity Improvement?
What would you do with 10% Productivity Improvement?What would you do with 10% Productivity Improvement?
What would you do with 10% Productivity Improvement?
 
The philippines
The philippinesThe philippines
The philippines
 
EAC logic tree
EAC logic treeEAC logic tree
EAC logic tree
 
Revista2013
Revista2013Revista2013
Revista2013
 
6DCP Presentation_12.19.2015
6DCP Presentation_12.19.20156DCP Presentation_12.19.2015
6DCP Presentation_12.19.2015
 
The hidden factory by JULIAN KALAC
The hidden factory by JULIAN KALACThe hidden factory by JULIAN KALAC
The hidden factory by JULIAN KALAC
 
Repaso de sustantivos 2
Repaso de sustantivos 2Repaso de sustantivos 2
Repaso de sustantivos 2
 
Síntesis de proteínas. La traducción. Narración ilustrada obtenida de Virtua...
Síntesis de proteínas. La traducción. Narración ilustrada obtenida de  Virtua...Síntesis de proteínas. La traducción. Narración ilustrada obtenida de  Virtua...
Síntesis de proteínas. La traducción. Narración ilustrada obtenida de Virtua...
 
Mohammad saleh salehian cv-2017
Mohammad saleh salehian cv-2017Mohammad saleh salehian cv-2017
Mohammad saleh salehian cv-2017
 
Componentes ppr esquelética
Componentes ppr esqueléticaComponentes ppr esquelética
Componentes ppr esquelética
 
Software quality - no more bugs!
Software quality - no more bugs!Software quality - no more bugs!
Software quality - no more bugs!
 
Exocitosis. Power point para primero y tercero medio, Biología.
Exocitosis. Power point para primero y tercero medio, Biología.Exocitosis. Power point para primero y tercero medio, Biología.
Exocitosis. Power point para primero y tercero medio, Biología.
 
Siraat Outsourcing (Pvt.)limited.
Siraat Outsourcing (Pvt.)limited.Siraat Outsourcing (Pvt.)limited.
Siraat Outsourcing (Pvt.)limited.
 

Semelhante a HispanoTech Event - The Cyber Security Readiness of Canadian Organizations

Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815Richard Emrich
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfSymptai Consulting Limited
 
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdfMost Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdfInsightsSuccess4
 
ID Watchdog Investor Presentation
ID Watchdog Investor PresentationID Watchdog Investor Presentation
ID Watchdog Investor PresentationIDWatchdog
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Global Tech M&A Monthly: Mid-Year Report - July 2013
Global Tech M&A Monthly: Mid-Year Report - July 2013Global Tech M&A Monthly: Mid-Year Report - July 2013
Global Tech M&A Monthly: Mid-Year Report - July 2013Corum Group
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
BOLD Business Security
BOLD Business SecurityBOLD Business Security
BOLD Business SecurityBOLD Business
 
CyberMaryland Job Fair Job Seeker Handbook October 20, 2016, Baltimore, Maryland
CyberMaryland Job Fair Job Seeker Handbook October 20, 2016, Baltimore, MarylandCyberMaryland Job Fair Job Seeker Handbook October 20, 2016, Baltimore, Maryland
CyberMaryland Job Fair Job Seeker Handbook October 20, 2016, Baltimore, MarylandClearedJobs.Net
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowqmatheson
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013Corum Group
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
2014 Tech M&A Monthly - Myths, Misconceptions, & MisinformationCorum Group
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfCIO Look Magazine
 

Semelhante a HispanoTech Event - The Cyber Security Readiness of Canadian Organizations (20)

Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdfMost Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
 
ID Watchdog Investor Presentation
ID Watchdog Investor PresentationID Watchdog Investor Presentation
ID Watchdog Investor Presentation
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Ciso NYC
Ciso NYCCiso NYC
Ciso NYC
 
Market Spotlight: Cyber Security
Market Spotlight: Cyber SecurityMarket Spotlight: Cyber Security
Market Spotlight: Cyber Security
 
Global Tech M&A Monthly: Mid-Year Report - July 2013
Global Tech M&A Monthly: Mid-Year Report - July 2013Global Tech M&A Monthly: Mid-Year Report - July 2013
Global Tech M&A Monthly: Mid-Year Report - July 2013
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
BOLD Business Security
BOLD Business SecurityBOLD Business Security
BOLD Business Security
 
CyberMaryland Job Fair Job Seeker Handbook October 20, 2016, Baltimore, Maryland
CyberMaryland Job Fair Job Seeker Handbook October 20, 2016, Baltimore, MarylandCyberMaryland Job Fair Job Seeker Handbook October 20, 2016, Baltimore, Maryland
CyberMaryland Job Fair Job Seeker Handbook October 20, 2016, Baltimore, Maryland
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
Tech M&A Monthly: Megadebt and Hypervaluations - June 2013
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdf
 

HispanoTech Event - The Cyber Security Readiness of Canadian Organizations

  • 1. The Cyber Security Readiness of Canadian Organizations You’re Invited to our Exclusive Networking Event hispanotech.ca Speakers Brad Riddell Director of Security, Scalar Decisions Panelists Loren Hicks Principal, Tracker Networks Carlos Chalico Director, Strategic Alliance at NYMITY Inc. Frank Palmay Senior Counsel at McMillan LLP - National Co-Chair Cyber Security and National Co-chair  Financial Services Regulatory Event Sponsor: Venue Sponsor: Food and Beverage Sponsor:
  • 2. Carlos Chalico Director, Strategic Alliance at NYMITY Inc. Carlos Chalico is an Information Security, IT Risk and Privacy Professional with almost 20 years of experience. He recently became the Strategic Alliance Director of NYMITY Inc. the leading global research company specializing in accountability, risk, and compliance solutions for the privacy office. Previously Carlos was the head of the Toronto office of Ouest Business Solutions Inc. and worked with Ernst Young where he served as an Information Security, IT Risk and Privacy professional. He is also an instructor for the University of Toronto and a volunteer advisor for the Canadian Red Cross in issues related to information security. He holds the following designations: CISA, CISSP, CISM, CGEIT, ISO27001LA. Frank Palmay Senior Counsel at McMillan LLP - National Co-Chair Cyber Security and National Co-chair  Financial Services Regulatory In addition to law, Frank Palmay has an electrical engineering degree (U of T Eng. Sci.-Gold Medal), and a Biomedical Master’s degree (Univ. of Sussex- Commonwealth Scholar). In Cyber Security, Frank is pulling together a multi-disciplinary team to advise companies on corporate governance, risk mitigation and transfer and crises response. for a presentation that will review and analyze the findings of the 2016 Scalar Security Study, in which we surveyed over 650 Canadian IT and IT security professionals to find out how prepared they are to deal with attacks, how cyber attacks have evolved in the last twelve months, and what strategies, tactics, and technologies are most effective in combatting cyber attacks. You will learn what separates high- performing security organizations from their low-performing counterparts, and steps you can take to help your company achieve a stronger cyber security posture. Brad Riddell Director of Security, Scalar Decisions Brad Riddell is the Director of Security for Scalar Decisions. Scalar is a national IT solution provider with eight offices across Canada. In 2015, Scalar was deemed a major player in the IDC MarketScape for Canadian managed security service providers, and was ranked the #1 ICT security company on the 2014 and 2015 editions of the Branham 300. Prior to Scalar, Brad led the Financial Services Security Sales function at a major Canadian telecommunications provider. Brad is a Chartered Accountant and has a B. Comm from University of Toronto. Loren Hicks Principal, Tracker Networks Loren Hicks has spent 40 years working with information technology, and has been online in one form or another since the 1970’s. With a B. Comm from McGill, where he lectured in Management, he has always focused on using technologies to advance business goals. He has run significant consulting practices, and has twice been a CIO. In recent years he has been developing methods for prudent management of Cyber Security and other technology risks.Tickets are $25 RSVP online at http://cybersecurityevent.eventbrite.ca Thursday, April 14, 2016Date: 6:00 – 9:00 PM (EDT)Time: McMillan LLP. Brookfield Place, Suite 4400, 181 Bay Street, Toronto, Ontario, Canada M5J 2T3 Location: Join us