Personality Trait Recognition in Online Social Networks for Cybersecurity

Presented by Pavan Kumar as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation Recent advances in natural language processing and deep learning methods have facilitated security researchers and government agencies to analyze large-scale text data emerging on social networking platforms such as Twitter, by …

Un cadre de communication post incidents de cybersécurité d’entreprise efficace

Les incidents de cybersécurité peuvent amener diverses conséquences importantes sur une compagnie victime. Ces conséquences peuvent ensuite engendrer d’autres effets néfastes, comme nuire à la réputation de l’entreprise et ainsi causer la perte de clients ou de partenaires d’affaires. La hausse grandissante de cas répertorié de cyber incidents amène les experts à vouloir agir en …

A framework for effective corporate communication after cybersecurity incidents

Cybersecurity incidents can have various significant consequences on an organization or a company. These consequences can then lead to other adverse effects, such as damaging the company’s reputation and causing the loss of customers or business partners. The growing increase in reported cases of cyber incidents leads experts to want to act ahead by prioritizing …

Decentralized Finance: Landscape and Future Directions

Presented by Jeremy Clark as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation Somewhat quietly, entrepreneurs have been reinventing financial services on the public blockchain Ethereum. Services include CAD and USD-backed currency, exchanges and margin trading, securities and derivatives, and credit and lending. Going …

Applying marketing principles to assess cybersecurity education training and awareness programs

Cybersecurity Management and prevention programs’ success and relevance depend primarily on improving employees’ security behaviours within an organization. Indeed, several existing programs make sure to apply those concepts, so employees have the proper tools and knowledge to intervene in a cybersecurity compromise situation within their organizations. Existing programs like education, training, and security awareness programs …

Appliquer des principes de marketing pour évaluer les programmes de formation et de sensibilisation à la cybersécurité

La réussite et la pertinence des programmes de gestion et/ou de prévention de la cybersécurité dépendent principalement de l’amélioration des comportements de sécurité des employés au sein d’une organisation. En effet, plusieurs programmes existent afin de former les employés et les outiller à bien intervenir en situation de compromission de la cybersécurité de leurs organisations …

Quantum Cryptography for Securing the Internet-of-Drones

Presented by Hussein Abulkassim as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation The long-term success of emerging technologies such as the internet-of-things (IoT) highly depends on their ability to secure data and communications for a long time. Internet-of-drones (IoDs), as one of the …

Les visages du radicalisme : différencier les radicaux violents et les non violents

Les groupes radicaux et les individus radicalisés sont souvent confondus comme étant tous violents et à risque de commettre des actes de terrorisme. Les radicaux sont définis comme étant des individus qui soutiennent ou justifient le terrorisme, et parfois, ils expriment le désir de s’engager dans des actes radicaux de violence. Cependant, très peu d’études …

Faces of radicalism: Differentiating between violent and non-violent radicals

Radical groups and radicalized individuals are often confused as being all violent and at risk of committing acts of terrorism. Radicals are defined as individuals who support or justify terrorism, and sometimes they express a desire to engage in radical acts of violence. However, very few studies have focused on what differentiates violent radicals, who …

Protecting Against Identity Theft: Victims’ Perspectives

Presented by Dylan Reynolds as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation Rates of identity theft continue to increase in Canada, costing individual victims substantial amounts of money, time, and emotional stress. Drawing on ongoing interviews with victims of identity theft in Southern …