Event Agenda
June 2nd – 3rd, 2026 // Calgary, Canada
Fortifying Canada’s Critical Infrastructure Against Cyber-Physical Threats
June 2nd – 3rd, 2026 // Calgary, Canada
Fortifying Canada’s Critical Infrastructure Against Cyber-Physical Threats
| Day 1 // June 2nd 2026 08:00 – 05:35 Conference Chair : Martin Laberge, Exec. Director Cyber Security, CISO, Energir |
|
![]() |
08:00Registration & Coffee |
![]() |
08:50Chairman’s Opening Address : Martin Laberge, Exec. Director Cyber Security, CISO, Energir |
![]() |
09:00Panel Discussion: Cutting Through the Noise: Are We Overcomplicating OT Security? This session will ask: .
– Moderator: Anton Kouznetsov, Director, Technology, Risk & Cyber Security, Edmonton International Airport |
![]() |
09:40Presentation: Cyber Threat Briefing - What Are The Top Risks To Our Critical Infrastructure in 2026? .
– Richard Larose, Cyber Principal, Strategic Advisor on Bill C-8, Cyber Partnership, Canadian Centre for Cyber Security |
![]() |
10:10Presentation: Tackling The Evolving Threat Landscape - Forecasts For 2027 and Beyond .
– Senior Expert, ZScaler |
![]() |
10:50Break & Networking |
| TRACK A Building OT Cyber Resilience Through Effective Risk Management Chair: Martin Laberge, Exec. Director Cyber Security, CISO, Energir |
|
![]() |
11:30Case Study: Navigating the Storm: How We Utilised Crisis Simulations for OT Cyber Security Resilience .
– Martin Laberge, Executive Director & CISO, Énergir |
![]() |
12:00Presentation: Securing OT, IoT and IIoT Devices Through Effective Risk Management In this session we explore safe methods for discovering, classifying, and assessing IoT, OT, and IIoT devices without disrupting operations. Learn how advanced techniques combine scanning, monitoring, and machine learning to identify devices, assess vulnerabilities, and prioritise risks. We’ll provide real-world examples to showcase how organisations can enhance security and resilience while meeting compliance needs. . – Chris Taylor, Account Executive, XONA Systems . |
![]() |
12:10Presentation: Assessing Risk in OT: Lessons from the Real World .
– Senior Expert, Darktrace |
| TRACK B Developing All Encompassing Strategies For OT Defence Chair: Trent Johannesson, CISO, Phoenix Energy Services |
|
![]() |
11:30Presentation: OT Security: From Reactive to Proactive - Where to Start .
– Trent Johannesson, CISO, Phoenix Energy Services & Stacey Dawson, Senior Cyber Security, Advisor, Confidential |
![]() |
12:00Presentation: Eliminating Remote Access Risk in OT Critical infrastructure organizations are under increasing pressure to secure remote access across distributed OT environments while threat actors continue targeting internet-facing industrial systems. Traditional approaches like VPNs and unmanaged remote desktop tools create excessive access, limited visibility, and increased third-party risk. This session explores how organizations can modernize remote access without disrupting operations or replacing existing infrastructure. Attendees will learn practical strategies for moving from network-based trust to identity-based access, securing legacy OT systems, improving third-party access control, and increasing visibility through centralized governance and session monitoring. . – Amit Sharma, Associate Director Solution Architect, Xage Security . |
![]() |
12:10Presentation: Strengthening Industrial Cyber Defence for OT Environments Through Utilising Threat Intelligence .
– Senior Expert, Rockwell Automation |
| Lunch | |
![]() |
12:40Lunch Hosted by ZScaler |
| TRACK A Engineering Cyber Strategies Through Building Holistic Security Architectures Chair: Martin Laberge, Exec. Director Cyber Security, CISO, Energir |
|
![]() |
01:40Presentation: How Should OT Security Differ From IT? Worst credible consequences mean OT security programs must be materially stronger than IT programs, but the most frequent differences between OT and IT programs – difficulty patching, encrypting, etc. – make OT programs weaker. This despite a 50 year old theory showing us how to prevent cyber sabotage attacks. In this presentation we connect theory to modern practice: SEC-OT, the new CIE mitigations database, and the latest UK NCSC OT connectivity guidance. And we look at common misconceptions that weaken OT security . – Andrew Ginter, VP Industrial Security, Waterfall Security Solutions . |
![]() |
02:10Case Study: Where The Details Bite: A Look Under the Hood of Modern Power Systems Modern turnkey power systems have evolved into fully integrated electrical solutions combining OT controls, intelligent devices, embedded services, and interconnected supply‑chain components. This high level of integration accelerates deployment but also expands the cyber‑attack surface, making security a foundational requirement from procurement to commissioning. Inspired by IEC 62443, our team developed an end‑to‑end cybersecurity framework that accompanies each phase of a turnkey power system project. This presentation highlights how a continuous and practical approach—spanning requirements, testing, transfer, andcommissioning—strengthens the cybersecurity posture of turnkey electrical systems while reducing risk and uncertainty for operators and suppliers alike. . – Eric Trottier, Senior Cybersecurity Advisor, Hydro Québec . |
![]() |
02:40Presentation: Building Secure OT & IoT Environments - How You Can Future-Proof Your Industrial Networks As OT/IoT systems become more connected, securing Industrial Networks requires more than traditional defences. Join this session to learn about the best practices for protecting critical infrastructure through Zero Trust architecture (agentless secure access, and strong identity management), why Quantum-Safe (QS) encryption is essential for future-proofing long-lifecycle industrial assets and finally how to align with standards like IEC 62443 and Bill C-8. . – Jamie Southerland, Southeast and Central Channel Engineering, Thales . |
| TRACK B Strengthening Our OT Cyber Resilience: From Asset Visibility to Zero Trust Chair: Trent Johannesson, CISO, Phoenix Energy Services |
|
![]() |
01:40Presentation: Optimising IT/OT Convergence Through Asset Lifecycle Management .
. |
![]() |
02:10Case Study: How We Moved Beyond OT Asset Visibility to Full-Spectrum Vulnerability Management .
– Ravneet Singh, Cyber Security Director, FYidoctors |
![]() |
02:40Presentation: Extending Zero Trust to Factories and OT In today’s hyperconnected operations, threats can easily move laterally from IT systems or third-party devices to critical factory assets like machines, controllers, and sensors. Traditional approaches to segmentation often increase complexity and costs, while vendor remote access exposes factories to third-party risks. This session will explore how we can utilise zero trust in OT environments and hence build a comprehensive architecture that ensures we stay secure and discuss how these tools can be utilised in environments where zero trust may be impossible. . – Senior Expert, Netscout . |
| – Chairman: Martin Laberge, Exec. Director Cyber Security, CISO, Energir |
|
![]() |
03:10Presentation: Hack the Unexpected: The Cyber Security Quiz Challenge Are you ready to uncover mind-blowing attack scenarios that blur the lines between reality and fiction? This isn’t just any session – it’s a chance to explore intriguing cyber security tales, test your knowledge and win cool prizes! Expect an engaging experience filled with unexpected twists, interactive fun and practical takeaways – all wrapped up in a light format that’s a refreshing break from the typical conference grind. . – Senior Expert . |
![]() |
03:40 Break & Networking |
![]() |
04:10Roundtables: Pick a Table and Let’s Discuss! T1: Developing Cloud-Based Strategies for OT Environments – Senior Expert, Claroty . T2: Utilising Zero-Trust Through Our OT Security Architectures – Eric Floyd, Director of Technology Partner Sales and Industrial Business Development, Keysight Technologies . T3: Building A Comprehensive IT/OT Architecture – Tips and Techniques – Sean Deuby, Principal Technologist, Semperis . T4: Overcoming the Challenges Surrounding Securing Remote Access in OT – Senior Expert, Acronis . T5: Discussing The Biggest Cyber Threats We Face Today – And How We Can Overcome Them – Matthew Hyson, Technical Director, HPE Aruba NetworkingT6: Discussion of Cybersecurity in the Age of Agentic AI for Critical Infrastructure – Dustin Anders, VP of Solution Consultants, Radiant Logic . |
![]() |
04:50Panel Discussion: How Can We Best Cultivate a Security Culture That Lasts? .
– Moderator: Osman Saleem, Program Manager – ICS and OT Cyber Security, Greater Toronto Airports Authority |
![]() |
05:30Chairman’s Closing Remarks: Martin Laberge, Exec. Director Cyber Security, CISO, Energir |
![]() |
05:35Drinks Reception |