SC Congress Toronto Announces Packed Speaker Agenda; Tackles Security from the Inside and Out

Share Article

Canada’s largest cybersecurity conference addresses the latest in cybercrime attack methods, insider attacks, social engineering, securing the Internet of Things, and more

News Image
Our goal with SC Congress Toronto is to bring together Canada’s top cybersecurity experts to offer practical solutions to combat the evolving threat landscape.

SC Congress Toronto 2015, the most prestigious event in Canada for cybersecurity professionals, has announced its sixth annual conference and expo will be taking place at the Metro Convention Centre, June 10-11, 2015. The event, produced by SC Magazine, brings together North America’s top cybersecurity luminaries to discuss the latest trends, threats and best practices that security professionals need to win the arms race against cybercriminals.

“Daily breach headlines are a constant reminder that cyber attacks are coming from both the disgruntled employee on the inside and malicious external hackers on the outside," said Illena Armstrong, VP, editorial, SC Magazine. “These incidents coupled with new technology trends like the Internet of Things (IoT) emphasize the importance of ongoing collaboration and education. Our goal with SC Congress Toronto is to bring together Canada’s top cybersecurity experts to offer practical solutions to combat the evolving threat landscape and send delegates home with the knowledge and skills needed to better secure their organizations.”

This year’s conference offers in-depth discussions and technical breakout sessions to help private and public sector security professionals thwart cybercriminals, combat insider attacks and threats from social engineering and ransomware, establish effective incident response plans, and better prepare security leadership to minimize risk across their organizations.

Keynote Sessions at SC Congress Toronto 2015 Include:

Don’t take the bait! Defending your resources against phishing and other social engineering attacks
It only takes one of your employees to potentially compromise your entire company. Are you sure the friendly voice on the phone needs immediate action? Michele Fincher, chief influencing agent at Social-Engineer, Inc., provides insights into the dark waters of social engineering. Learn how to recognize and combat the major forms of insidious human-based attacks, including vishing, onsite impersonation, and the fastest-growing vector, the dreaded deep sea phish!

Michele Fincher, chief influencing agent, Social-Engineer, Inc. & co-author of Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails.

Incident response
With the growing number of VERY public breaches, the old saying “It’s not if you get hit, but when,” is more relevant than ever. A detailed and well-rehearsed incident response plan for both cybersecurity purposes and communications purposes is more critical than ever before. This panel will discuss those matters and provide best practices for incident response plans.

John Proctor, vice president, global cyber security, CGI; Phil Lambert, director information security, Granite Services

SC Congress Toronto 2015 will also feature detailed technical and educational breakout sessions – where subject matter experts across industries will address the most critical IT security questions and challenges in North America today. These expert led sessions and panels will follow three tracks: Emerging Threats/Management, Technical, and Editor’s Choice, and will include topics such as:

Protecting customer information: When threats come from the inside – Gain logical and physical control guidance for keeping your customer's personal information safe.

Security in IoT: Hackers, attack anatomy & security trends – See how lessons learned from recent breaches can provide a framework to help protect against modern attackers and the evolving Internet of Things (IoT) industry.

A Day in the life of a CISO: From budget to the board, the breach to the job search – Learn how to thrive as a CISO in a cyber world full of fear, uncertainty and doubt.

Leveraging control-based risk management frameworks to address growing threats to personal health information – Learn how control-based information security and privacy risk management frameworks can simplify the cybersecurity process in healthcare and satisfy due care and due diligence requirements.

Additional must-attend sessions include:

  •     Ransomware: How concerned should you be?
  •     Threat intelligence: What do you need to know?
  •     Cyber insurance revisited
  •     Strong SCADA security: How do we get there?
  •     Public Wi-Fi and your organization’s network: Like oil and water
  •     Supply chain security: Let's try this one more time
  •     Why are so many vendors and organizations still using SSL?

To register for SC Congress Toronto, view the agenda and see a full list of speakers, media partners and sponsors, please visit:

About SC Magazine
SC Magazine provides IT security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders and the best, most extensive collection of product reviews in the business. By offering a consolidated view of IT security through independent product tests and well-researched editorial content that provides the contextual backdrop for how these IT security tools will address larger demands put on businesses today, SC Magazine enables IT security pros to make the right security decisions for their companies. Besides the monthly print magazine, special Spotlight editions, e-books, newsletters and daily website, the brand’s portfolio includes the SC Congress series (New York, Chicago, Toronto, London), SC Awards, SC Marketscope and an outstanding series of online events.

Friend us on Facebook:
Follow us on Twitter:
Join us on LinkedIn:

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Matt Stubbs