Event Agenda
November 3rd – 4th, 2026 // Montréal, Canada
November 3rd – 4th, 2026 // Montréal, Canada
We are currently working on the 2026 agenda. In the meantime, take a look at the topics and themes discussed as part of the 2025 programme:
| Day 1 – November 4th 2025 Deep-Diving Into The Issues Faced Through Our OT Environments Conference Chair: Martin Laberge, Executive Director / CISO, Énergir 08:50 – 17:25 |
|
![]() |
08:50Opening Address : Martin Laberge, Executive Director / CISO, Énergir |
![]() |
09:00Panel Discussion: Disaster Hits: How Should We Respond to an OT Cyber Attack?
– Moderator: Caroline Turcotte, Section Head of Information Infrastructure (Water Section), Ville de Montréal |
![]() |
09:40Presentation: Solving OT Governance Get a masterclass in ICS/OT cyber governance. Learn how to launch, right-size, and sustain a program, keep momentum alive, and maximize your risk ROI. Walk away with actionable strategies to strengthen security, reduce risk, and deliver business value – whether you lead the program or support it. . – Peter Jackson, Principal Industrial Consultant, Dragos |
![]() |
10:10 Networking Break |
![]() |
10:50 Presentation: Threat Briefing For 2026 - What Risks do We Need to be Aware of Today to Overcome Tomorrow?
– Richard Larose, Cyber Principal, Strategic Advisor on Bill C-8, Cyber Partnership, Canadian Center for Cyber Security |
![]() |
11:20 Presentation: IT/OT Cyber-Resilience Today Join WSP and KPMG for this previously unseen joint conference session, as we share insights on the fundamentals of Cyber-Resilient Business Operations. Discussion will include the evolving technology and threat landscape, prevailing challenges in 2025 and beyond, with a deep-dive on practical implementation of Cyber-Readiness and Incident-Response Program – Chris Johnson, Senior Director, Industrial OT Cybersecurity | Digital Infrastructure, WSP – Alexander Rau, Partner – Cyber Security,, KPMG . |
![]() |
11:50 Case Study: From Reactive to Proactive: A Journey into OT Threat Modeling & Lessons from Hydro Ottawa's Grid Modernization This presentation details Hydro Ottawa’s journey toward a proactive security posture in the face of grid modernization. It introduces a systematic threat modeling process as a strategic approach to address the new challenges of increasingly interconnected Operational Technology (OT) systems. The methodology, which is a blueprint for identifying and mitigating security risks, requires all stakeholders to work on specific OT requirements stemming from the MITRE framework. This unique approach is demonstrated through two real-world use cases showing how a structured process was applied to overcome specific cybersecurity challenges in new OT environments. . – Jojo Maalouf, Director, Cybersecurity and IT Infrastructure, Hydro Ottawa & Abdelrahman Eldosouky, Supervisor, Cybersecurity, Hydro Ottawa . |
![]() |
12:20 Presentation: Network Engineering - Cyber-Informed Engineering at Consequence Boundaries Consequence boundaries are connections between networks with dramatically different worst-case consequences of compromise – eg: the IT/OT interface. Network engineering deterministically prevents cyber attacks pivoting through consequence boundaries. Both are part of the emerging Cyber-Informed Engineering methodology – making modest changes to physical and automation designs to eliminate entire categories of cyber threats. In this presentation, we introduce CIE, consequence boundaries and network engineering, provide examples of the most widely-used network engineering techniques, and explore in which scenarios / designs each technique is most useful. . – Andrew Ginter, VP Industrial Security, Waterfall Security |
![]() |
12:50Lunch hosted by Zscaler |
![]() |
13:50Case Study: An ATT&CK-Driven Approach to Cyber Security Risk Model for Maritime Autonomous Surface Ships (MASS) The rapid automation and digitalisation of transportation operations deliver clear efficiencies but also introduce complex OT cyber security risk. Transport Canada is presenting a case study on Maritime Autonomous Surface Ships (MASS), where incident “frequency” is largely unknown yet a rigorous risk model is required. Transport Canada developed a structured approach that pairs a comprehensive vulnerability inventory with MITRE ATT&CK for both Enterprise and ICS. Vulnerabilities are organized into domain-specific groups and mapped to tactics and techniques to prioritize threats without relying on historical rates. We estimate “severity” using exposure, attacker effort, and the plausibility of ATT&CK chains, augmented by analog OT evidence and scenario-based priors. Key lessons: treat MASS and Remote Operation Center as a system-of-systems; adversary behaviors span IT/OT boundaries; supplier and cloud dependencies shift risk; and the human-in-the-loop remains decisive. Next, we are advancing this work toward a Canadian national standard for MASS cyber security at Transport Canada to enable consistent, evidence-based controls and resilient autonomous maritime operations. . – Matin Foomani, OT Cyber Security Research Engineer, Transport Canada |
![]() |
14:20Presentation: Protecting Industrial Networks With Zero-Trust Controls & Microsegmentation Digital transformation within industrial, critical infrastructure, building automation, and other complex environments is delivering a wide array of benefits, including accelerated productivity, cost savings, improvements in operations, quality of service, and innovation. However, this digital advancement is expanding the enterprise’s attack surface by creating connectivity between previously isolated OT environments and their IT counterparts. This connectivity has far outpaced industrial organisations’ abilities to properly secure their networks–resulting in new attack pathways in extremely valuable and mission-critical CPS environments. This session will hence explore how we can utilise zero trust controls and microsegmentation to protect our networks. . – Christian Moreira, BISO, McKesson . |
![]() |
14:50Case Study: A Manitoba Hydro Case Study for Cyber Security Policies for Critical Infrastructure Companies This session will explore the importance of collaboration, standards and information sharing among stakeholders in the OT security ecosystem. It will delve into a case study of how to deal with issues in the area exploring an example in critical infrastructure. It will explore public-private partnerships, information sharing platforms, and threat intelligence sharing initiatives specific to critical national infrastructure protection. It will discuss how we can establish trust, overcome legal and regulatory challenges, and foster an environment of cooperation among government agencies, industry sectors, and cyber security experts. This will allow attendees to gain insights into effective collaborative approaches and how collective efforts can lead to a stronger OT security posture. . – Dawn Nedohin-Macek, CISO, Manitoba Hydro |
![]() |
15:20Spotlight: The Missing Link As cyber security has, and continues to evolve rapidly, many organisations still focus solely on detection and response. The missing piece to this equation is investigation. Investigation is the key to understanding threats, not just reacting to them. Focusing on detection and response alone can lead teams to inefficient practices: chasing down false positives and lacking the contextual insights required to effectively understand the scale and scope of a security incident. With investigation, security teams can understand where threats have impacted the network to improve response efficacy and more strategically mitigate incidents. Join us for a session where we will unpack how you can leverage data analytics in your investigations for smarter, stronger security. . – Patrick Blais, Cyber Security Principal Netscout . |
![]() |
15:30Networking Break |
![]() |
16:00Roundtables: Choose 1 of the 3 Following Discussions . T1. – Building Comprehensive Cyber Strategies Despite Budgetary Constraints Martin Laberge, Executive Director / CISO, Énergir . T2. – Beyond the Perimeter: A Proactive Path to OT Visibility and Resilience Ellen Boehm, SVP, IoT & AI Identity Innovation, Keyfactor . T3. – Defending the Frontline: Cyber Security Strategies Across IT and OT Networks Stephen Nichols, Country Manager, Canada, Acronis |
![]() |
16:40Panel Discussion: Regulating Canadian OT: Will Compliance with Bill C-8 & Provincial Regulations Equal Security?
– Moderator: Tom Bornais, CISO, NAV CANADA |
![]() |
17:20Closing Remarks: Martin Laberge, Executive Director / CISO, Énergir |
![]() |
17:25Drinks Reception |
| Day 2 – November 5th 2025 Developing Comprehensive Strategies fit for 2026 and Beyond Conference Chair: Martin Laberge, Executive Director / CISO, Énergir 08:50 – 16:55 |
|
![]() |
08:50Opening Address : Martin Laberge, Executive Director / CISO, Énergir |
![]() |
09:00Panel Discussion: Mitigating Risk in OT: How Can We Develop a Business Case That Works?
– Moderator: Osman Saleem, Program Manager – ICS and OT Cyber Security, Greater Toronto Airports Authority |
![]() |
09:40Presentation: Zero Trust Factories - A Modern Architecture for OT According to 2025 Zscaler ThreatLabz research, the manufacturing industry has consistently been the single largest target of ransomware attacks. Despite millions spent on traditional security, cyberattackers are compromising factories at record levels. How? Lateral movement. Join this session and learn:
– Umang Barman, Sr Director of Product Marketing, Zscaler |
![]() |
10:20Networking Break |
![]() |
11:00Case Study: End User Case Study: Building A Framework to Use AI in OT Environments Artificial intelligence (AI) is playing a massive role in contributing to new cyber attacks, proving to be a “huge challenge” moving forward, according to NATO. Nevertheless, rogue actors are utilising AI quicker than we are to protect our cyber security systems. This session will discuss:
– Sebastien Barthelemy, CISO, Kruger & Sébastien Mayer, OT Cybersecurity Advisor, Kruger |
![]() |
11:30Case Study: Surviving the Worst-Case Scenario: How We Built An Effective Disaster Recovery Plan
. |
![]() |
12:00Case Study: A Case Study In Effective Governance Through IT-OT Convergence When building a comprehensive cyber strategy, it is vital to understand that appropriate governance and cultural transformation within your organisation is more important and integral to the success of any technical transformation. This session will hence explore: .
– Osman Saleem, Program Manager – ICS and OT Cyber Security, Greater Toronto Airports Authority |
![]() |
12:30Spotlight: Beyond Passwords and Badges: Biometric Identity for Unified Access Management In an increasingly connected world, organizations must secure both physical and digital environments while ensuring a seamless user experience. Beyond Passwords and Badges: Biometric Identity for Unified Access Management explores how biometric technologies—such as facial recognition and fingerprint—integrated with identity proofing and verification capabilities within a KYC-enabled platform, are redefining digital management. Leveraging SDK orchestration, these solutions unify physical and logical identities under a single, secure framework. This session highlights how biometric-driven identity verification enhances security, reduces fraud, and streamlines onboarding while showcasing real-world applications and the future of identity management in a high-security environment . – Ceres Silva, Solutions Director, IDEMIA |
![]() |
12:40Lunch Hosted by VARS & Dragos |
![]() |
13:40Workshop: An OT Cyber Attack Simulation on a Chemical Plant This session will invite the audience to see a simulated OT Cyber Programme, brought to you by Prashant Prashant from Enbridge. N.B. participants must have their own laptop. . – Prashant Prashant, Senior Cyber Security Advisor, Enbridge & Rajat Kumar Kundu, OT Network & Cyber Security Specialist, Enbridge . |
![]() |
14:40Roundtables: T1. – Ramping up Our OT Security Programmes While Staying Operational – Garret Austin, Senior Director of OT/Security and Digital Applications, Agropur . T2. – Discussing The OT Cyber Attack Simulation Further – Prashant Prashant, Senior Cyber Security Advisor, Enbridge & Rajat Kumar Kundu, OT Network & Cyber Security Specialist, Enbridge . T3. – Putting Our Mental Health First: How Can We Ensure Our Teams Stay Motivated Against an Expanding Threat Landscape? – Bryan Methot, Director of IT, Rebox Corp . |
![]() |
15:20Networking Break |
![]() |
15:50Case Study: How to Propagate The Full Lifecycle of Supply Chain Management .
– Singuyen Vo, CISO, ICAO |
![]() |
16:20Fireside Chat: Facing The Threats of Tomorrow: How Can We Mitigate Risk Today to Defend Tomorrow’s Threats?
– Moderator: Martin Laberge, Executive Director / CISO, Énergir |
![]() |
16:50Closing Remarks: Martin Laberge, Executive Director / CISO, Énergir |
![]() |
16:55End of Conference |