Manager, Sales Engineering, Canada,
CrowdStrike
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, May 15, 2025
8:00AM - 6:00PM EST
Marriott Downtown at CF Toronto Eaton Centre
Grand Ballroom
525 Bay Street
Toronto, ON, M5G 2L2
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
FREE Admission
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 2nd Annual Toronto Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Technology Selection, Use, Integration & Orchestration
Key Topics:
• Evaluating and selecting security technologies that align with organizational goals.
• Best practices for integrating new tools into existing security infrastructures.
• Orchestrating technology solutions to maximize their effectiveness and return on investment.
Why It Matters:
Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 EST
9:00-9:30 EST
Mr Weekes will be discussing in a deep dive on how organizations are approaching cyber as a risk, and how risk transfer solutions such as cyber insurance can help to mitigate the financial impact of cyber-attacks and privacy breaches for organizations of all sizes, across all sectors. Join us for this most important opening presentation from one of the industry’s top subject matter experts.
9:30-10:05 EST
In today’s borderless digital landscape, traditional perimeter defenses are no longer enough — and misplaced trust has become a hidden vulnerability. In this engaging 25-minute session, we’ll unpack why Zero Trust is the essential foundation for modern, resilient cybersecurity strategies.
You’ll get a clear, jargon-free breakdown of Zero Trust principles, hear real-world success stories and learn practical steps any organization — no matter the size — can take to kickstart their Zero Trust journey without getting overwhelmed.
Blending storytelling, hands-on advice, and a few light-hearted analogies, this session will leave you with a firm grasp of how Zero Trust transforms security from a “trust-by-default” mindset to a “verify-everything” approach — safeguarding your most critical assets against an unpredictable threat landscape.
Because when it comes to cybersecurity, trust falls should stay at summer camp — not inside your network.
10:05-10:35 EST
Come explore with Brandon Smith, Senior Product Manager at KnowBe4, how artificial intelligence is transforming the phishing threat landscape. Rather than simply enhancing attack capabilities, AI is making sophisticated phishing techniques more accessible to a broader range of threat actors. Drawing from real-world threat intelligence and documented attack patterns, we’ll analyze how AI is transforming the phishing ecosystem – not by making attacks better, but by making sophisticated attacks more accessible.
10:35-11:05 EST
11:05-11:45 EST
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:45-12:05 EST
12:05-12:20 EST
12:20-12:40 EST
In today’s rapidly evolving digital landscape, organizations are struggling with diverse methods of interaction with employees, customers, and partners through a multitude of technologies. This complexity often leads to a lack of control over Identity and Access Management (IAM), leaving organizations vulnerable to security threats and compliance issues. The cost of ignoring the risk can haunt you for years; however, you cannot correct what you don’t know, so the first steps are assessing whether your organization is positioned for a successful implementation, migration, or fix and validating that the organization is focused on the right path and issue they are looking to mitigate. Join us as we demonstrate a proven, 3-stage IAM Strategic Assessment model that is NIST compliance driven, answering the “what, where, when, why, and how” surrounding both Workforce Identity & Access Management and Customer Identity & Access Management (CIAM) programs, projects, and operations.
12:40-1:40 EST
1:40-2:20 EST
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Francois Guay
Founder
Canadian Cybersecurity Network
MODERATOR
Manny Liwanag
Principal Security Engineer
Thales
Michael Daganhardt
Solutions Architect
ReversingLabs
Shaun Donaldson
Director of Product Marketing- Cloud
Bitdefender
Kacey Maher
Senior Solutions Engineer
SailPoint
Amit Sharma
Sr. Cybersecurity Consultant | Network & Cloud Security Specialist
Xage
Rishi Magapu
Sales Engineer
Fastly
Carlos Akhilele
Manager, Sales Engineering, Canada
CrowdStrike
2:20-2:40 EST
What is Fus About? Artificial Intelligence is revolutionizing the world at an unprecedented pace—reshaping industries, redefining possibilities, and occasionally, delivering laugh-out-loud failures. But how safe is this brave new world of AI? And what does it mean for businesses, individuals, and society at large? We’ll explore the evolution and proliferation of APIs, the unsung heroes powering mobile apps, supply chain optimization, and the Internet of Things, and the role they play in the future of the internet. Billions of bots silently execute tasks, but at what cost? We’ll dive into the hidden, obvious, and subtle expenses of this automation boom, from operational efficiencies to unforeseen vulnerabilities. And just when you thought DDoS attacks were a thing of the past, we’ll debunk the myth: DDoS isn’t dead—it’s evolving. We’ll discuss why volume still reigns supreme, the rise of sophisticated Layer 7 attacks, and how to stay ahead in this ever-changing landscape. Finally, we’ll look to the future, guided by three principles: Futurize, Unite, Simplify. Join us for an engaging, insightful, and occasionally humorous journey through the cutting-edge technologies shaping tomorrow’s world.
2:40-3:00 EST
Francois Guay, Founder of the Canadian Cybersecurity Network, invites us to imagine a future where Canada is truly united against digital threats. In The Last Digital Spike, he challenges political divisions and fragmented efforts, revealing how a bold, unified cybersecurity strategy could save billions and secure Canada’s digital frontier. “Just as our nation once dreamed in steel to unite our land, we must now dream in code to protect it’s future”.
3:00-3:20 EST
3:20-3:50 EST
3:50-4:10 EST
4:10-4:30 EST
4:30-5:00 EST
5:00-6:00 EST
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |