Post-Quantum Cybersecurity Technologies Conference

Post-Quantum Cybersecurity Technologies Conference

By Cyber Tech & Risk

Date and time

Thursday, November 9, 2017 · 6 - 9:30pm EST

Location

University of Toronto - Bahen Centre for Information Technology, Auditorium 1190

40 St. George Street Toronto, ON M5S 2E4 Canada

Refund Policy

No Refunds

Description

About the Conference

The Post-Quantum Cybersecurity Technologies Conference is hosted by the University of Toronto Impact Centre. It brings industry leaders, security experts, academic researchers, technology entrepreneurs, and campus talents together to discuss how latest technologies such as Quantum Computing, Post-Quantum Cryptography, Artificial Intelligence are working with Cybersecurity. It is a perfect occasion for you to understand the industry trend, learn from the gurus, and discover the next business opportunity.

This high-demand event provides keynote speech, panel discussion, and start-up pitch.


Agenda

  • Registration and Food

  • Welcome and Opening Remarks

  • Keynote Speech

  • Panel Discussion - The Next-Generation Cybersecurity Technologies (Quantum Computing, Post-Quantum Cryptography, Quantum Key Distribution Using Satellites, IBM Watson for Cyber Security, Artificial Intelligence and Machine Learning)

  • Networking Break

  • Cybersecurity Startup Pitch (4 companies)

  • Closing Remarks

  • Networking


Keynote Speaker

  • Prof. Hoi-Kwong Lo

    Prof. Hoi-Kwong Lo holds Canada Research Chair in Quantum Information at the University of Toronto.

    Prof. Lo had also been a Nominator for Nobel Prize in Physics, Kyoto Prize Basic Sciences, a Referee for Kilam Fellowship, Steacie Fellowship, NSERC Herzberg Medal and Editor, Member, Organizer of some of the most influential journals, committees and conferences.

    He was among the first to demonstrate the impossibility of a whole class of quantum cryptographic protocols including quantum bit commitment, thus correcting an erroneous long-held belief in the field. In a paper in "Science" he and H. F. Chau provided a proof of security of quantum key distribution, thus solving a long-standing problem.

Conference Speakers

  • Rohan Ramesh
    Senior Product Marketing Manager, IBM Watson for Cyber Security and Cognitive Security Initiative

  • Prof. Jintai Ding
    Professor at University of Cincinnati, Preeminent authority in the Post-Quantum Cryptography

  • Matt McGuire
    AML/CTF Advisor at the AML Shop, Internationally recognized expert in anti-money laundering (AML) and counter-terrorist financing (CTF)

  • Cordell Grant
    Co-founder and COO at QEYnet Inc., Quantum Key Distribution Using Satellites

  • Bryan Li
    Founder & CEO at QKnight, Quantum-Resist Public Key Cryptosystem

  • Mick Bhinder
    Founder & CEO at IamI Authentications Inc., Crowdsources and Intelligent Authentication

  • Dmitry Raidman
    Co-Founder at Cybeats, Enterprise IoT Security

  • James C. Shen
    Managing Partner, Pioneer Ventures


Sponsors

  • NSERC (www.nserc-crsng.gc.ca)
    Natural Sciences and Engineering Research Council of Canada

  • Montgomery Benz (www.mbsecure.ca)
    Montgomery Benz is a premier recruitment firm focusing on the specialized fields of Information Systems Security.


Food/Drink

Complimentary food and drink will be provided at the conference.


Keywords

Cybersecurity, Cyber Security, Quantum Computing, Post-Quantum Cryptography, Quantum Key Distribution, Artificial Intelligence, Machine Learning, IBM Watson, AML, IAM, Startup



Refund policy: Tickets are non-refundable.

Disclaimer: By signing up for the Post-Quantum Cybersecurity Technologies Conference, you agree that the organizers may record or photograph the event, (including you, your likeness, voice and any guest you bring), and use it publicly or privately in any form of media, including for commercial purposes. By attending, you consent to the recording and photographing and grant the organizers an unrestricted, perpetual, non-exclusive and sublicensable license, to take, use, display, perform, distribute or exploit for any lawful and commercial purpose any recordings or photographs.

Organized by

Sales Ended