Skip to main content

Agenda

Wed 21 Oct 2026

9:00AM - 4:00PM MT

View event details
8:00AM

Registration & Networking

8:00 AM - 8:50 AM (50 mins)

8:50AM

Welcome from Public Sector Network

8:50 AM - 9:00 AM (10 mins)

9:00AM
Industry Insights

Welcome from the Chair

9:00 AM - 9:10 AM (10 mins)

9:10AM
Keynote

Welcome Address: Al Application Factory and Technical Debt Reduction

9:10 AM - 9:30 AM (20 mins)

9:30AM
Keynote

Quantum Readiness for Government

9:30 AM - 9:50 AM (20 mins)

Quantum computing will break current encryption standards within the next decade, putting government data, identity systems, and critical infrastructure at risk. This session will outline Alberta's quantum readiness plan so you can prioritize cryptographic upgrades, protect sensitive data, and maintain operational resilience before adversaries exploit quantum capabilities.

  • Assess quantum vulnerability across your systems by inventorying cryptographic dependencies in authentication, data storage, and inter-agency communication
  • Adopt quantum-resistant cryptographic standards including post-quantum algorithms approved by NIST and phased migration pathways for legacy systems
  • Protect long-lived data now using crypto-agile architectures that enable rapid algorithm replacement without re-engineering applications
  • Establish cross-agency coordination through shared quantum readiness frameworks, joint threat modeling, and synchronized upgrade timelines
  • Build workforce capability by training security, procurement, and delivery teams to evaluate quantum-safe solutions and mandate quantum-resilient safeguards in new contracts
9:50AM
Industry Insights

Partner Perspctive

9:50 AM - 10:10 AM (20 mins)

10:10AM
Panel discussion

Modernizing Legacy Systems Without Breaking Critical Services

10:10 AM - 10:40 AM (30 mins)

Government agencies are trapped between rising technical debt and the operational risk of modernizing critical systems that cannot fail. This panel will explore how leaders are using AI-powered code translation, incremental migration strategies, and rigorous testing to modernize safely so you can reduce debt, improve security, and free capacity for innovation without service disruption.

  • Prioritize modernization using risk-based assessments that weigh security vulnerabilities, vendor support timelines, and operational criticality
  • Apply AI-assisted code translation with human-in-the-loop validation, automated testing suites, and rollback plans to minimize migration risk
  • Adopt incremental migration strategies including strangler patterns, API-first architectures, and parallel run periods that enable safe, staged cutover
  • Embed cybersecurity by design throughout modernization with zero-trust principles, continuous audits, and quantum-resistant cryptography for long-lived systems
  • Measure and publish outcomes including cost savings, time-to-delivery improvements, and security posture enhancements to build stakeholder confidence
10:40AM

Morning Tea Break

10:40 AM - 11:10 AM (30 mins)

11:10AM
Keynote

Threat Intelligence – Emerging Risks and Coordinated Defense

11:10 AM - 11:30 AM (20 mins)

Cyber adversaries are exploiting AI, supply chains, and cross-border vulnerabilities faster than individual agencies can respond. This session will showcase how coordinated threat intelligence networks enable governments to detect, respond, and recover from attacks in real time so you can protect critical services and maintain public trust under pressure.

  • Advance threat detection by integrating shared intelligence feeds, automated anomaly detection, and AI-assisted pattern recognition across government networks
  • Reduce response time through cross-agency playbooks, pre-approved escalation paths, and joint incident response drills that simulate coordinated attacks
  • Strengthen supply chain security by applying zero-trust principles, continuous vendor risk assessments, and transparent disclosure requirements for third-party software
  • Build interoperable defense systems using open standards for threat data exchange, federated identity, and secure API gateways that enable real-time collaboration
  • Publish transparent incident reporting with sanitized case studies, lessons learned, and measurable improvements that build public confidence and inform future defenses
11:30AM
Industry Insights

Partner Perspective

11:30 AM - 11:50 AM (20 mins)

11:50AM
Keynote panel

AI in Hiring – Detecting Fraud and Building Trust

11:50 AM - 12:20 PM (30 mins)

AI is being used to fabricate resumes, cheat in interviews, and game recruitment systems, undermining hiring integrity and workforce quality. This panel will share practical strategies for detecting AI-assisted fraud, implementing multi-stage verification, and using AI responsibly to identify top talent so you can build a capable, trustworthy workforce without compromising ethical standards.

  • Detect AI-generated resumes and interview responses by training hiring panels to recognize pattern language, inconsistencies, and behavioral red flags
  • Implement multi-stage verification including behavioral interviews, hands-on assessments, and reference checks that validate claims beyond AI-generated content
  • Leverage AI responsibly for talent acquisition using blind screening tools, diversity-aware matching, and bias testing to widen access while protecting fairness
  • Establish transparent disclosure norms requiring candidates to declare AI use in applications and interviews, with clear consequences for misrepresentation
  • Build ethical hiring frameworks that balance AI efficiency gains with human judgment, privacy protections, and contestability for candidates
12:20PM
Keynote

Here We Go Again… (And Again… And Again…)

12:20 PM - 12:40 PM (20 mins)

If cybersecurity feels like Déjà vu… you’re not wrong. We keep having the same conversations, just with different language and louder urgency. This talk isn’t about new ideas or the latest trends. It’s about something more uncomfortable: we already know what to do, and we’re still not doing it. A practical and human look at why that gap exists, and what it takes to finally move past it.

12:40PM

Lunch Break

12:40 PM - 1:40 PM (60 mins)

1:40PM
Roundtables

Interactive Roundtables

1:40 PM - 2:40 PM (60 mins)

  1. AI + Automation: The Engine Driving a Fast, Resilient Public Sector Facilitated by: Tony Olsen Canada Critical Infrastructure Lead, Palo Alto Networks & Heather Black RVP, Public Sector Canada, Palo Alto Networks
  2. Network visibility - Deep packet inspection and the crux of implementation Facilitated by: Conor Anwyll, Account Executive, Darktrace & Jordan Catudal, Account Executive, X10 Technologies
  3. AI Frontier: Harnessing GenAI and Delivering Trustworthy Public Service Delivery Facilitated by: Yiannis Vassiliades, CISO in Residence, Zscaler
  4. What's even real anymore?  Let's discuss how to protect public facing applications from online and AI based threats. Facilitated by: Phillip Solakov, Director, Client Advisory, Optiv
  5. The Emerging Cyber Threats from Quantum Computing Facilitated by: Darryl Wenger, Major Accounts Manager, Fortinet
2:40PM
Keynote

Secure-by-Design AI – Protecting Against Misuse and Weaponization

2:40 PM - 3:00 PM (20 mins)

AI is being weaponized in hiring fraud, social engineering, disinformation campaigns, and automated attacks that outpace traditional defenses. This session will present Alberta's framework for secure-by-design AI—including guardrails, red-teaming, and human-in-the-loop safeguards—so you can harness AI's benefits while protecting your organization and the public from its risks.

  • Operationalize ethical AI governance with mandatory privacy impact assessments, bias testing, and independent red-teaming before production deployment
  • Detect AI-assisted fraud in hiring by training interviewers to recognize AI-generated responses, implement multi-stage verification, and cross-check resume claims with behavioral interviews
  • Implement explainability and transparency requirements including model cards, algorithmic impact disclosures, and contestability pathways for affected individuals
  • Apply human-in-the-loop safeguards for high-stakes decisions including benefits adjudication, enforcement actions, and risk assessments to prevent automated harm
  • Prepare incident response protocols for AI failures including pause-and-review procedures, rollback plans, and transparent public disclosure when safeguards fail
3:00PM
Industry Insights

Partner Perspective

3:00 PM - 3:20 PM (20 mins)

3:20PM
Panel discussion

Securing the Public Sector: Building Cyber Resilience for a Digital Government

3:20 PM - 3:50 PM (30 mins)

As governments modernize services and move more operations online, cybersecurity is no longer just an IT concern — it’s a core element of public trust. From safeguarding citizen data to protecting critical infrastructure, the public sector faces an evolving threat landscape that demands collaboration, agility, and foresight.

This keynote explores how leading government organizations are strengthening resilience, modernizing systems, and fostering a culture of security-first innovation. Learn how to align policy, technology, and people to protect public value in an increasingly digital world.

  • Understand emerging cyber threats and what they mean for government operations.
  • Explore strategies for building resilience into digital transformation initiatives.
  • Learn how to strengthen security culture across teams and departments.
  • See how data protection and transparency drive citizen trust and confidence.
  • Discover actionable steps for cross-sector collaboration to safeguard digital government ecosystems.
3:50PM

Room 109

Closing Remarks

3:50 PM - 4:00 PM (10 mins)

4:00PM

Networking Drinks Reception

4:00 PM - 5:00 PM (60 mins)

Questions?

See our FAQs or get in touch

Ready to register?

Registration is free for government

Ready to sponsor?

Limited packages available