This event is now complete
Tue 02 Dec 2025
View event detailsCarson AB
Registration & Networking
8:10 AM - 9:10 AM (60 mins)
Carson C
Welcome from the Public Sector Network
9:10 AM - 9:20 AM (10 mins)
Carson C
Welcome from the Chair
9:20 AM - 9:40 AM (20 mins)
Carson C
Trust in the AI era: The Regulator’s Perspective
9:40 AM - 10:00 AM (20 mins)
Public trust is essential to the effective implementation of public sector AI solutions, yet trust in institutions is declining. BC’s Information and Privacy Commissioner Michael Harvey will discuss what’s driving this trust crisis, why it matters for AI adoption, including in cybersecurity, and how a rights-first approach can enhance innovation. Commissioner Harvey will share insights on embedding privacy by design principles at the start of programs to build public trust.
Carson C
Shifting the Narrative on Cybersecurity
10:00 AM - 10:20 AM (20 mins)
Carson C
Cyber Optimism: Embracing the Benefits of AI and Overcoming Fear
10:20 AM - 11:00 AM (40 mins)
AI is reshaping cybersecurity—but public trust and responsible use must evolve alongside it. This panel will explore how governments can adopt AI to enhance resilience, while addressing concerns around privacy, transparency, and over-reliance on automation.
This session will show how you can apply new approaches on how to use AI for smarter security while fostering optimism, trust, and balance.
- Leverage AI to enhance cyber resilience and threat detection
- Address public concerns around data privacy and ethical use
- Build trust and confidence in AI through transparency and accountability
- Balance automation with human oversight in critical security operations
Carson AB
Refreshment Break
11:00 AM - 11:50 AM (50 mins)
Carson C
Beyond the Firewall: The Human Element of Cyber Resilience in the Age of AI
11:50 AM - 12:10 PM (20 mins)
Technology alone doesn’t create resilience — people, culture, and leadership do. This keynote reframes cybersecurity from a compliance task to a confidence capability. Walter shares how public-sector leaders can build cyber-ready cultures that safely harness AI and automation: clarifying accountability, sharpening decision-making under pressure, and turning frontline behaviors into measurable resilience. Attendees leave with a short, practical playbook they can apply immediately.
Carson C
From Design to Defense: The Path from Data Protection by Design to Defense Innovation
12:10 PM - 12:30 PM (20 mins)
Carson C
Differential Privacy Meets Real-World Data
12:30 PM - 12:50 PM (20 mins)
Carson AB
Networking Lunch
12:50 PM - 2:00 PM (70 mins)
Carson C
Interactive Roundtable Sessions
2:00 PM - 3:00 PM (60 mins)
Roundtable 1: Enhancing Public Services and Workforce Empowerment through AI Assistants. Facilitated by: Nicholas Lee, CEO, Fujitsu Intelligence
Roundtable 2: The Autonomous Adversary: Agentic AI's Next-Gen Breach Blueprint . Facilitated by McGillivray, Manager, Solutions Consulting, and Paul Condon, Named Account Manager, Palo Alto Networks
Roundtable 3: Closing the Gap: Practical Strategies for Smarter Vulnerability Management in Response to Modern Threats. Facilitated by Robb Anderson, Director, Cyber Strategy & Transformation, Deloitte
Roundtable 4: APIs, Apps & Attack Surfaces: Defending the Modern Delivery Layer. Facilitated by: Max Cizauskas, Sr. Security Advisor at Optiv and Glen Willms, Sr. Security Engineer at F5
Carson C
The World has Changed – Your Security Awareness Program should too
3:00 PM - 3:20 PM (20 mins)
Traditional Security Awareness training programs, including phishing, need to change. Phishing click rates are meaningless without context and followup, and the main point of your training should be to educate your workforce so that they support and champion things that improve the org's overall cybersecurity. Help them understand why long, unique and complex passwords are required. Teach them the value of Prod and Dev/Test environments. Explain what MFA is, and how it protects us. Oh, and yes, let's get them to recognise phishing emails, but also report them, and what to do if they realise they've fallen for one, without the shame and blame.
Carson C
Scaling Innovation: The Vulnerability of our Legacy Applications and Systems
3:20 PM - 4:00 PM (40 mins)
Legacy applications pose a growing threat to security and transformation efforts. This panel will unpack the risks, explore modernization strategies, and share how to integrate new technologies without compromising resilience or scale.
This session will show how you can apply new approaches on how to secure, modernize, and integrate legacy systems to support long-term innovation.
- Identify critical vulnerabilities in aging applications and infrastructure
- Evaluate methods for modernizing or replacing legacy technologies
- Integrate new solutions without weakening system security or stability
- Balance transformation speed with risk management in complex environments
Carson C
Closing Remarks
4:00 PM - 4:10 PM (10 mins)
Carson AB
Networking Reception
4:10 PM - 5:10 PM (60 mins)