Event Agenda

June 2nd – 3rd, 2026 // Calgary, Canada

Fortifying Canada’s Critical Infrastructure Against Cyber-Physical Threats

Register Now
Day 1 // June 2nd 2026
08:00 – 05:35
Conference Chair : Martin Laberge, Exec. Director Cyber Security, CISO, Energir
08:00Registration & Coffee
08:50Chairman’s Opening Address : Martin Laberge, Exec. Director Cyber Security, CISO, Energir
09:00Panel Discussion: Cutting Through the Noise: Are We Overcomplicating OT Security?

This session will ask:
.

  • What should be the essentials of any OT Security Strategy?
  • How can we overcome challenges brought through a shifting threat landscape? And what are these threats?
  • Are new technologies and innovations such as AI and Cloud Computing overcomplicating OT Security? Or should we be trying to use them through our strategies?
  • How should we effectively govern our OT systems to ensure we are not overcomplicating security?
  • How can we ensure we are getting the basics of OT Security right?

Moderator: Anton Kouznetsov, Director, Technology, Risk & Cyber Security, Edmonton International Airport
Goran Novkovic, Director of Industrial Cyber Security, Toronto Transit Commission (TTC)
Dr. Kayode Alawonde, ISC2 Saskatchewan Chapter President, ISC2 Saskatchewan
Ramzi Naouali, Senior Manager of Infrastructure and Cyber Security, Hôpital Montfort
Gustavo Arias, Field CTO, Americas, Trellix
– Senior Expert, Illumio
.

09:40Presentation: Cyber Threat Briefing - What Are The Top Risks To Our Critical Infrastructure in 2026?

.

  • What the current threat landscape looks like facing operators of critical infrastructure across Canada
  • The risks faced to our OT security due to geopolitical instability, AI, supply chain insecurity and other challenges
  • How we can best ensure our assets are protected from dangers brought against our operations due to the biggest risks of today
  • How we can develop a geostrategic strategy that ensures security, and how the government can help

Richard Larose, Cyber Principal, Strategic Advisor on Bill C-8, Cyber Partnership, Canadian Centre for Cyber Security
.

10:10Presentation: Tackling The Evolving Threat Landscape - Forecasts For 2027 and Beyond

.

  • How attackers will continue to use AI and how defenders can benefit from it
  • The evolving threat landscape from across the globe
  • The impact of ransomware and multifaceted extortion
  • Maturing security operations in the cloud & The growing threat of infostealer malware
  • The importance of preparing for post-quantum cryptography
  • Insights specifically for Canada

Senior Expert, ZScaler 
.

10:50Break & Networking
TRACK A
Building OT Cyber Resilience Through Effective Risk Management
Chair: Martin Laberge, Exec. Director Cyber Security, CISO, Energir
11:30Case Study: Navigating the Storm: How We Utilised Crisis Simulations for OT Cyber Security Resilience

.

  • How we utilised realistic cyber-physical attack scenarios affecting industrial control systems from initial compromise to operational disruption
  • Where we practiced executive, engineering, and SOC responses to time-critical OT incidents, balancing safety, availability, and cyber security
  • How we tested communication and escalation paths between OT, IT, safety, legal, and management teams during a live crisis
  • Where utilising a crisis simulation allowed us to Identify gaps in detection, response, and recovery to mitigate risk

Martin Laberge, Executive Director & CISO, Énergir
.

12:00Presentation: Securing OT, IoT and IIoT Devices Through Effective Risk Management

In this session we explore safe methods for discovering, classifying, and assessing IoT, OT, and IIoT devices without disrupting operations. Learn how advanced techniques combine scanning, monitoring, and machine learning to identify devices, assess vulnerabilities, and prioritise risks. We’ll provide real-world examples to showcase how organisations can enhance security and resilience while meeting compliance needs.
.
Chris Taylor,  Account Executive, XONA Systems
.
12:10Presentation: Assessing Risk in OT: Lessons from the Real World

.

  • Practical lessons from conducting OT risk assessments in industrial environments
  • Insights from hands-on experience across differing critical infrastructure sectors
  • Key successes and common pitfalls in OT risk management
  • Actionable takeaways to improve risk assessment processes, identify vulnerabilities, and strengthen security posture

Senior Expert, Darktrace
.

TRACK B
Developing All Encompassing Strategies For OT Defence
Chair: Trent Johannesson, CISO, Phoenix Energy Services
11:30Presentation: OT Security: From Reactive to Proactive - Where to Start

.

  • How to bring all the elements of Cyber Security together to support OT Resiliency?
  • Creating the holistic approach to OT security to meet the current and future needs of an Organization
  • What are they and how do they all fit together

Trent Johannesson, CISO, Phoenix Energy Services & Stacey Dawson, Senior Cyber Security, Advisor, Confidential
.

12:00Presentation: Eliminating Remote Access Risk in OT

Critical infrastructure organizations are under increasing pressure to secure remote access across distributed OT environments while threat actors continue targeting internet-facing industrial systems. Traditional approaches like VPNs and unmanaged remote desktop tools create excessive access, limited visibility, and increased third-party risk.
This session explores how organizations can modernize remote access without disrupting operations or replacing existing infrastructure. Attendees will learn practical strategies for moving from network-based trust to identity-based access, securing legacy OT systems, improving third-party access control, and increasing visibility through centralized governance and session monitoring.
.
Amit Sharma, Associate Director Solution Architect, Xage Security
.
12:10Presentation: Strengthening Industrial Cyber Defence for OT Environments Through Utilising Threat Intelligence

.

  • How to operationalise threat intelligence to protect OT assets
  • Detecting malicious activity in industrial protocols and lateral movement between IT and OT
  • Leveraging proactive threat hunting to minimise downtime and strengthen resilience
  • Practical strategies to safeguard production environments against evolving cyberattacks

Senior Expert, Rockwell Automation
.

Lunch
12:40Lunch Hosted by ZScaler
TRACK A
Engineering Cyber Strategies Through Building Holistic Security Architectures
Chair: Martin Laberge, Exec. Director Cyber Security, CISO, Energir
01:40Presentation: How Should OT Security Differ From IT?

Worst credible consequences mean OT security programs must be materially stronger than IT programs, but the most frequent differences between OT and IT programs – difficulty patching, encrypting, etc. – make OT programs weaker. This despite a 50 year old theory showing us how to prevent cyber sabotage attacks. In this presentation we connect theory to modern practice: SEC-OT, the new CIE mitigations database, and the latest UK NCSC OT connectivity guidance. And we look at common misconceptions that weaken OT security
.
Andrew Ginter, VP Industrial Security, Waterfall Security Solutions
.
02:10Case Study: Where The Details Bite: A Look Under the Hood of Modern Power Systems

Modern turnkey power systems have evolved into fully integrated electrical solutions combining OT controls, intelligent devices, embedded services, and interconnected supply‑chain components. This high level of integration accelerates deployment but also expands the cyber‑attack surface, making security a foundational requirement from procurement to commissioning. Inspired by IEC 62443, our team developed an end‑to‑end cybersecurity framework that accompanies each phase of a turnkey power system project. This presentation highlights how a continuous and practical approach—spanning requirements, testing, transfer, andcommissioning—strengthens the cybersecurity posture of turnkey electrical systems while reducing risk and uncertainty for operators and suppliers alike.
.
Eric Trottier, Senior Cybersecurity Advisor, Hydro Québec
.
02:40Presentation: Building Secure OT & IoT Environments - How You Can Future-Proof Your Industrial Networks

As OT/IoT systems become more connected, securing Industrial Networks requires more than traditional defences. Join this session to learn about the best practices for protecting critical infrastructure through Zero Trust architecture (agentless secure access, and strong identity management), why Quantum-Safe (QS) encryption is essential for future-proofing long-lifecycle industrial assets and finally how to align with standards like IEC 62443 and Bill C-8.
.
Jamie Southerland, Southeast and Central Channel Engineering, Thales

.
TRACK B
Strengthening Our OT Cyber Resilience: From Asset Visibility to Zero Trust
Chair: Trent Johannesson, CISO, Phoenix Energy Services
01:40Presentation: Optimising IT/OT Convergence Through Asset Lifecycle Management

.

  • How to overcome IT/OT integration challenges, including data flow, security, and operational visibility
  • Where you can leverage structured asset lifecycle processes – from deployment to decommissioning – to reduce vulnerabilities and enforce patching
  • Best practices for maintenance, upgrades, and monitoring that maximise performance and strengthen long-term cyber resilience

.
Jason Grierson, Senior Systems Engineer, Veeam Software
.

02:10Case Study: How We Moved Beyond OT Asset Visibility to Full-Spectrum Vulnerability Management

.

  • How we identified and prioritised vulnerabilities across complex OT environments to build an effective roadmap for OT vulnerability management
  • How moving from static asset inventories to dynamic, real-time visibility helped us
  • Where we integrated IT and OT perspectives to create a unified risk picture
  • How we can overcome challenges with our legacy systems, vendor patching, and resource constraints and where we can utilise automation and threat intelligence to strengthen our OT vulnerability management

Ravneet Singh, Cyber Security Director, FYidoctors
.

02:40Presentation: Extending Zero Trust to Factories and OT

In today’s hyperconnected operations, threats can easily move laterally from IT systems or third-party devices to critical factory assets like machines, controllers, and sensors. Traditional approaches to segmentation often increase complexity and costs, while vendor remote access exposes factories to third-party risks. This session will explore how we can utilise zero trust in OT environments and hence build a comprehensive architecture that ensures we stay secure and discuss how these tools can be utilised in environments where zero trust may be impossible.
.
Senior Expert, Netscout 
.

Chairman: Martin Laberge, Exec. Director Cyber Security, CISO, Energir
03:10Presentation: Hack the Unexpected: The Cyber Security Quiz Challenge

Are you ready to uncover mind-blowing attack scenarios that blur the lines between reality and fiction? This isn’t just any session – it’s a chance to explore intriguing cyber security tales, test your knowledge and win cool prizes! Expect an engaging experience filled with unexpected twists, interactive fun and practical takeaways – all wrapped up in a light format that’s a refreshing break from the typical conference grind.
.
Senior Expert
.
03:40 Break & Networking
04:10Roundtables: Pick a Table and Let’s Discuss!

T1: Developing Cloud-Based Strategies for OT Environments
Senior Expert, Claroty
.
T2: Utilising Zero-Trust Through Our OT Security Architectures
Eric Floyd, Director of Technology Partner Sales and Industrial Business Development, Keysight Technologies
.
T3: Building A Comprehensive IT/OT Architecture – Tips and Techniques
Sean Deuby, Principal Technologist, Semperis
.
T4: Overcoming the Challenges Surrounding Securing Remote Access in OT
Senior Expert, Acronis
.
T5: Discussing The Biggest Cyber Threats We Face Today – And How We Can Overcome Them
Matthew Hyson, Technical Director, HPE Aruba NetworkingT6: Discussion of Cybersecurity in the Age of Agentic AI for Critical Infrastructure
Dustin Anders, VP of Solution Consultants, Radiant Logic
.
04:50Panel Discussion: How Can We Best Cultivate a Security Culture That Lasts?

.

  • How can we best build human-centric cyber strategies that build security throughout our organisations? What does effective cyber training look like for our OT Teams?
  • How do we ensure that this “culture” of security encompasses everyone through our businesses? How can we build a culture that allows us to build the CISOs of tomorrow?
  • What can we do to ensure that awareness training is effective? And doesn’t it create a culture of fear in reporting potential cyber incidents?
  • How can we best convince our board to be “champions of security” to ensure security throughout our organisations?

Moderator: Osman Saleem, Program Manager – ICS and OT Cyber Security, Greater Toronto Airports Authority
Panelist: Anton Kouznetsov, Director, Technology, Risk & Cyber Security, Edmonton International Airport
Panelist: Paul Figura, Chief Architect, Indigo Consulting Canada
Panelist: Ravneet Singh, Cyber Security Director, FYidoctors
– Senior Expert, ZScaler
.

05:30Chairman’s Closing Remarks: Martin Laberge, Exec. Director Cyber Security, CISO, Energir
05:35Drinks Reception

Join the Line-Up

Submit a Proposal

Register Now

Choose Your Pass

Request a Sponsor Pack

Access Here