Your Roadshow Breakout Sessions + Speakers!

To learn more about and register for the 2021 Bulletproof Roadshow, visit:

2021 Roadshow Event Page

Session schedule, keynote and plenary announcements coming soon!

Endpoint Management Security: Setting Your Company Up For Success With Microsoft IntuneUntitled design - 2021-01-14T113916.868
Ahmed Abou El Gheet
Cloud Security Expert

In a mobile world, the flexibility of working in a multitude of environments--office, home, remote location, and on site--isn't just a perk. It's becoming a vital way to remain competitive and innovative as a company with a commercial work space. However, allowing your employees to work from anywhere comes with a price.

Maintaining your cyber security while allowing your employees to work remotely can be a challenge, but it can be accomplished with minimal risk if you plan ahead and choose the right options for your business. If you don’t expect someone to infiltrate your network, you won’t be protected when someone tries. Always prepare for the worst-case scenario.

Microsoft Enterprise Mobility + Security (EMS) is an intelligent mobility management and security platform. It helps you to protect and secure your organization and empowers your employees to work in new and flexible ways.

In this session, you'll learn:

  • How to stay secure and productive anywhere, on any device, with Microsoft Intune.
  • How Microsoft Intune lets you manage your workforce's devices and apps.
  • The ins and outs of Microsoft Intune MDM & MAM.
  • How Intune can help you to deploy and manage Microsoft Defender for endpoint.
  • How to successfully deploy Secure Bring-Your-Own-Device (BYOD) programs for your employees.
  • How to use Microsoft Intune to enable Conditional Access.

Modern IT Operations bear little resemblance to what they once did—cybersecurity monitoring and threat response has now become front and center for IT staff who historically dealt with purely IT infrastructure issues. Users now utilize mobile devices and services far outside the safety of the four walls of the business. And IT is involved in every facet and corner of your organization's existence.

Many IT managers are realizing that they cannot—and should not—attempt to manage everything on their own. Outside help is now a necessary reality for a large percentage of companies, even for the most capable teams.

It's OK to ask for help.

This session, geared towards IT leaders, will help you identify areas where you may need help, and how best to rationalize and accept that you cannot do it all on your own, as well as look at the future state of IT operations and how we can expect IT roles to evolve.

In this session, you'll learn:
  •  What the current state of IT Operations looks like
  • When and where to ask for help
  • How to work with an outside vendor
  • What IT Operations roles will look like in the future, and how to stay on top of your career

Future of Managing IT Operations: What it's Going To Take Going ForwardUntitled design - 2021-01-14T114642.129Dave Hickman
Senior Solutions Architect

Technology Project Failure: Exposing The Cause And Unlocking The Cure2021 Roadshow Headshots - Transparent Circles (3)Kassie Gram
VP, Sales
Public Knowledge

Across North America, companies are adopting new technologies in response to outdated infrastructure, security concerns, growth, and regulation changes. Experts expected an upward trend in IT innovations prior to COVID-19, and now there are even more factors driving organizations to find new ways to work and provide products and services. Technology improvements improve organizations’ ability to serve their customers safely, securely, effectively, and efficiently, but with these changes come challenges—both technical and human. Only 15% of people embrace innovation with little resistance or skepticism. When users do not embrace a project, it is more likely to fail. Project failure leads to wasted time and resources, as well as increased frustration and resistance to future changes.

In these unprecedented times, employees are dealing with multiple layers of change. They are expected to adopt and champion new technologies while simultaneously adapting to remote and hybrid work environments, evolving safety guidelines, and workforce reductions—all while potentially coping with profound change on a personal level. Now more than ever, technology changes must be planned and managed with insight, intention, and skill. Organization staff and leadership must focus on providing services and often lack the time and specialized knowledge to manage change effectively.

In this session, you'll learn:
  • How to improve your chances for project success
  • How to predict and monitor the impact and progress of change
  • How to increase your organizational change capacity

Can we keep up with the digital transformation and the cybersecurity posture within our networks? Our digital footprint is expanding and we need to continuously prioritize the importance of why we secure our IT landscapes.

Behind every good security product will lie gaps and challenges from configuration to maintenance. Why are some of these items missed within your IT organization?

Where is the future for modern cybersecurity solutions going? Simple, it lies with automation.

In this session, you'll learn:
  • The economics of a breach
  • Where the most common security blind spots are
  • How automation across the Microsoft Security platform can help you keep up with a rapidly changing IT landscape

Automation Across The ENTIRE Platform: THE Modern Security Must Have!2021 Roadshow Headshots - Transparent Circles (1)Chris Simm
Cloud Security Expert

Reducing Your Risk and Exposure – Controlling who can access your cloud content?
Untitled design - 2021-01-14T114246.762Shaun Hughes
Management Consultant, Information Management & Compliance Lead

No matter where they're working from, employees just want to do their job. That means using the tools provided...and some they just found. Throw in the convenience of personal devices and working from home, and we have a recipe for interesting (and insecure) times.

Traditional security is not enough; information protection is essential as part of a unified security and compliance solution. Critical technology such as identity and access management and threat protection, working in unison with compliance tools, provide you with layered protection for when the worst inevitably happens.

Our session will cover the newest and strongest tech solutions available in classification, labeling, and data loss prevention.

In this session, you'll learn:
  • How to boost security protection with compliance tools
  • How to ensure your sensitive data stays safe when employees use unauthorized third-party apps
  • How to build a layered protection plan to safeguard against gaps, leaks, and more of today's most pressing threats

We all grew up in a best-of-breed world for security product procurement, deployment, and protection. As the threat landscape has evolved, bad actors have become extremely successful in exploiting the blind spots caused by the best-of-breed approach.

Siloed security leads to gaps in coverage, and digital transformation has made traditional perimeter-based network defense obsolete.

What is a ZERO trust strategy, and how can it build on your security investments? In this session, we'll explore how the M365 E5 Security Suite can provide the advantage modern businesses need to not only keep up, but stay ahead of the security game.

In this session you'll learn:
  • How your security product procurement can be simplified
  • How to gain visibility into traditional blind spots caused by best-of-breed approaches to security
  • What zero-trust means and how to implement a zero-trust strategy in your organization

How and Why E5 Security has Changed Security Procurement Forever

2021 Roadshow Headshots - Transparent Circles (12)-1
Chris Stelzer
Technical Specialist, Security & Compliance 
We accelerated our Teams rollout: Are we secure and how can we take back control?
2021 Roadshow Headshots - Transparent Circles (9)
Mike Hatheway
 Technical Architect
2021 Roadshow Headshots - Transparent Circles (10)

Basel Fawal
Cloud Security Expert

Microsoft Teams is the primary application for chat, video conferencing, and collaboration in M365. It’s the key tool for working with internal and external team members for many organizations.

The growth of Teams has exploded in the past year, and many organizations found themselves fast-tracking their rollout due to COVID-19. Some may be left wondering if they are fully secure—and, if not, what they can do about it. In this rush to deploy, customers have also not been afforded the time to properly plan out Teams governance.

In this session, we will point out recommendations to better apply controls to have secure sharing and collaboration in MS Teams.

In this session, you'll learn:
  • Common mistakes that organizations make when they fast-track their MS Teams rollout
  • The top security gaps you should be looking for
  • How to update your secure sharing and collaboration controls in MS Teams
  • How to work securely with colleagues, vendors, contractors, and clients in MS Teams

You’re tech-savvy, but talk about privacy leaves you with questions—even more so now that Canada is set to implement strict new digital privacy laws. You safeguard your data but haven’t thought about customer consent or transparent policies. You know that privacy breaches can devastate companies. You need to protect your customers and your business, but how?

Fortunately, privacy is a natural extension of the security processes you already have. I’ll show you how to spot common privacy risks, how to grow customer trust with privacy practices, and how to integrate privacy into your daily work and decisions. We will also discuss some significant changes to Canadian privacy legislation coming soon and how you can prepare.

In this session you’ll learn:
  • What privacy really means and why it matters to your business
  • How privacy and security intersect
  • How to build privacy into the foundation of your work
  • How Canadian privacy legislation is set to change (soon)
  • How to get compliant ahead of new legislation

The New Digital Charter: How To Avoid Risk, Safeguard Data, And Not Break The Law

2021 Roadshow Headshots - Transparent Circles (2)
Linda Bolton
 Senior Consultant
The Barrington Consulting Group
HR and Legal: Resolving Employee Conduct Issues With Microsoft Compliance Tools2021 Roadshow Headshots - Transparent Circles (11)
Andrew Field 
Microsoft Compliance Expert

This session illustrates an HR and Legal use case for Microsoft Compliance tools to discover and remediate potential employee misconduct.

Microsoft 365 Compliance tools provide you with the opportunity to save time and provide more comprehensive results without the need for advanced technical knowledge.

Our session will touch the areas of Communication Compliance, Insider Risk, Audit and eDiscovery, and Microsoft Information Protection (MIP) tools.

Your employees are your greatest asset. They are the face of your business and, more than ever, they influence your customers. Have you thought about the many ways your employees can inadvertently impact your reputation? Insider dealing, workplace harassment, money laundering, and misuse of social media are all ways your employees can cost you money and harm your reputation. Today’s challenging and fast changing environment – COVID, civil unrest – demands that we leverage these great assets more effectively.

Your greatest asset deserves to be provided with the skills and know-how to minimize their risk to your business. You can accomplish this by providing meaningful learning experiences! You can’t expect your employees to learn what they need by providing learning opportunities that are simply a “check-the-box” endeavor.

Join me to discuss what meaningful learning looks like and the key considerations that we make when putting together a learning program. Should training be formal or informal, or both? Is the learning experience focused on your employee? Is it relevant to them? Does it engage them? Is it a one-time event or an ongoing and strategic program?

In this session, you'll learn:
  • How meaningful learning experiences can help protect your business from internal and external threats
  • Why learning is not a one-size-fits-all activity
  • How to make sure you're investing in the learning system that is the best fit for your employees

Derisking Your Most Valuable Assets - Your Employees

2021 Roadshow Headshots - Transparent Circles-1

Craig Sears
Senior Solutions Architect, Education Services

Virtual CISO: A Smart, Strategic Approach to Upgrading Your Security Posture in 2021

2021 Roadshow Headshots - Transparent Circles (5)
Paul Leger
 Practice Lead, Governance Services
Untitled design - 2021-01-14T112434.455
Wade Dauphinee
Director of Information Security Services, Americas


The board of directors, or a current/potential client, wants to know if you have a complete understanding of the cyber threats and risks to the organization. This is likely due to concerns over what they have recently read in the news. How can you approach this question to give them assurance and, ideally, show them how the security program is helping the organization achieve its desired outcomes? With so many things to consider though, where do you start? You need the help of a senior security leader, but you may not be fortunate enough to have the budget for a full-time resource or not able to find one. What do you do? One option may be the use of a virtual CISO service.

In this session you'll learn:
  • Common cybersecurity challenges that organizations will be facing in 2021
  • How vCISO gives you immediate access to leading cybersecurity experts who can help tackle pressing business challenges
  • How a vCISO service can help you overcome today's barriers to realizing your security strategy in the most efficient way possible
  • Next steps you can take to successfully manage a security program that's right (and right-sized) for your company

Companies are quickly shifting to hybrid cloud environments, where workload placement can be determined on a best-suited basis. That said, this trend has led to a new challenge: integrating, managing, and gaining visibility across newly complex IT infrastructures.

HPE InfoSight—HPE’s global artificial intelligence and machine learning platform—is paving the way for autonomous infrastructure that self-manages, self-heals, and self-optimizes, transforming IT operations from reactive to predictive. Instead of fighting fires and dealing with escalations, problems are prevented before they can impact IT.

HPE GreenLake brings the cloud experience, self-serve, pay-per-use, scale up and down and managed for your by HPE and our partners to your apps and data – at the edge, in colocations, or your data center.

By using a Hybrid Cloud architecture with Microsoft Azure and HPE’s offerings, Bulletproof can create the right mix of Hybrid IT for your organization.

In this session, you'll learn:
  • How Artificial Intelligence and Machine Learning empower Hybrid Cloud
  • HPE Hybrid Cloud options
  • How to leverage the HPE GreenLake consumption model
  • How to enable Native Disaster Recovery with Hybrid IT

In a world of digital transformation, understanding how HPE Hybrid IT can help

2021 Roadshow Headshots - Transparent Circles (8)
Ryan Brown
 CTO, Storage
2021 Roadshow Headshots - Transparent Circles (6)
John Gauthier
Solutions Architect


Call Us