Agenda

AGENDA IN PROGRESS - presentations may change; visit here often for latest updates.

PRE-CONFERENCE by invitation only
Leadership Dinner and Social
Wednesday, January 21, 2026

(more information to come)

CONFERENCE registration fee
10th ANNUAL PRIVACY & SECURITY CONFERENCE
Thursday, January 22, 2026

7:45 am Registration and breakfast
8:45 – 9:00 Opening Remarks  (Grand Hall)
9:00 – 9:10 Elder’s Blessing and Territorial Acknowledgement (Grand Hall)
9:10 – 9:25 President Welcome (Grand Hall)
9:25 – 10:10 Keynote – Micheal Harvey (Grand Hall)
10:10 – 10:40 Keynote – Hugh Burley (Grand Hall)
10:40 – 11:20 Gold Sponsor 1 (Grand Hall)
11:20 – 11:40 Break & Transition...<come visit the Sponsor Hall!>
11:45-12:20 BREAKOUT SESSION 1
∴ SCION: A Resilient Internet Architecture for the Insecure World of IoT/OT
presented by Dr. Sina Keshvadi (Assistant Professor, Department of Software Engineering, TRU)
Audience: Network Engineers, Security Professionals, and Researchers
Summit Room

The proliferation of IoT devices has exposed deep-rooted vulnerabilities in our current Internet infrastructure. Foundational protocols like BGP, designed for a different era, lack the security guarantees necessary to protect the critical systems they now support. This presentation introduces SCION (Scalability, Control, and Isolation on Next-Generation Networks), a zero-state next-generation Internet architecture built to provide robust security and reliability. In this talk, we will explore how SCION’s path-aware networking fundamentally redefines the Internet’s security model. Unlike today’s hop-by-hop routing, SCION enables end-to-end path control, allowing applications and networks to choose their own data paths. We will demonstrate how this architecture offers built-in immunity to routing attacks like BGP hijacking, strong defenses against DDoS attacks through multi-pathing and hidden paths, and support for verifiable geofencing to ensure data sovereignty and regulatory compliance.
⊆ Securing the Unseen: Cybersecurity in IoT and OT Ecosystems ⊆ Zero Trust and Beyond: Redefining Security for IoT and OT Networks
∴ 
presented by (sponsor)
Audience: 
Terrace Room

∴ 
presented by (privacy)
Audience: 
Alpine Room

∴ 
presented by (sponsor)
Audience: 
TRUSU Lecture Hall

(Grand Hall - lunch setup)
12:30-1:10 LUNCH (Grand Hall)
1:15-1:55 Gold Sponsor 2 (Grand Hall)
2:05-2:40 BREAKOUT SESSION 2
∴ Securing IT/OT Convergence
presented by Sunny Jassal (Chief Security Information Officer, BCIT)
Audience: CISOs, Senior Security Leaders, IT & OT Practioners
Summit Room

Our institutions operate much like mini-municipalities - well-versed in IT (Information Technology) but often lacking visibility into OT (Operational Technology). Cybersecurity is no longer an IT-only challenge; CISOs are increasingly tasked with securing the entire digital landscape, from corporate networks to industrial control systems - essentially, all things connected to the internet. As IT and OT environments become more interconnected, they significantly expand the attack surface for cyber threats targeting critical infrastructure. Traditional perimeter-based security models can no longer provide the necessary protection against sophisticated, targeted attacks. This session will explore the unique risks associated with IT/OT convergence, introduce a Zero Trust security approach tailored for industrial environments, and provide actionable strategies to safeguard converged networks without compromising operational efficiency.
⊆ Securing the Unseen: Cybersecurity in IoT and OT Ecosystems ⊆ Supply Chain Security: Protecting IoT and OT from End to End ⊆ Regulatory Compliance and Legal Considerations for IoT & OT 
⊆ Cyber Resilience in Critical Infrastructure: Protecting Energy, Healthcare, and Manufacturing ⊆ Zero Trust and Beyond: Redefining Security for IoT and OT Networks ⊆ The Human Factor: Training and Awareness in IoT and OT Security ⊆ Emerging Threats and Innovations in IoT and OT Security ⊆ From Toasters to Turbines: The Expanding Reach of IoT/OT

 ∴ 
presented by (privacy)
Audience: 
Terrace Room

∴ 
presented by (sponsor)
Audience: 
Alpine Room

∴ 
presented by (sponsor)
Audience: 
TRUSU Lecture Hall

∴ 
presented by (privacy/security)
Audience: 
Grand Hall
 
2:50 – 3:25 BREAKOUT SESSION 3
 ∴ 
presented by (security)
Audience: 
Summit Room

∴  
presented by (security)
Audience: 
Terrace Room

∴ 
presented by (privacy)
Audience: 
Alpine Room

∴ 
presented by (sponsor)
Audience: 
TRUSU Lecture Hall

∴ 
presented by (privacy/security)
Audience: 
Grand Hall
3:35 – 4:10 BREAKOUT SESSION 4

 ∴ 
presented by (sponsor)
Audience: 
Summit Room

 ∴ 
presented by (sponsor)
Audience: 
Terrace Room

∴ 
presented by (security)
Audience: 
Alpine Room

∴ 
presented by (privacy)
Audience: 
TRUSU Lecture Hall

∴ 
presented by (privacy/security)
Audience: 
Grand Hall
4:20-5:00 Closing Keynote (Grand Hall) - privacy
5:00 Closing Remarks (Grand Hall)

POST-CONFERENCE
DEMONSTRATIONS & WORKSHOPS
Friday, January 23, 2026  

(*)   All attendees wishing to attend must purchase a workshop pass
(**) No pass needed for post-secondary students - free admission

∴ Stack Attack! DIY Buffer Overflow
pass required(*) free for students(**)

presented by John Cuzzola (Director of Information Security, TRU)
Mountain Room,
9:30 am - 12:00 pm
Audience: all welcome but highly technical presentation. Those familiar with C programming, and assembly language would benefit the most and/or enrolled in a computer science, software engineering, or related engineering academic program.

Ready to get your geek on? Buffer overflows—one of the most notorious bugs in programming—have been undermining system security for decades. Even with modern hardware and software defenses, they still persist, especially across IoT. In this session, we’ll unpack the anatomy of a buffer overflow step by step: what it is, how to find it, and—best of all—how to craft an exploit to take control of a vulnerable system.
⊆ The Human Factor: Training and Awareness in IoT and OT Security ⊆ Demonstrations and Workshops: Hacking IoT and OT in Action


 ∴ Hacking Everyday IoT with Flipper Zero
pass required(*)
presented by James Duff (BCNET Cybersecurity Analyst)
Mountain Room,
1:00 - 3:30 pm
Audience: everyone

This session demonstrates real-world attacks against common IoT devices found in education environments using the Flipper Zero. From smart lighting and door access systems to cameras and more, attendees will see how these devices can be scanned, jammed, cloned, or otherwise exploited. The session includes a live scoring-based audience challenge, a video walkthrough of staged attacks, and hands-on access to tools. Mitigation strategies and monitoring tips will also be discussed.
⊆ Zero Trust and Beyond: Redefining Security for IoT and OT Networks ⊆ The Human Factor: Training and Awareness in IoT and OT Security ⊆ Demonstrations and Workshops: Hacking IoT and OT in Action