Canadian

The Low-Tech Communications of High-Tech Financial Fraudsters

Much case has been made of the use of sophisticated anonymity tools by financial fraudsters that hack financial institutions and steal personal and financial information. Our past research has shown that these technologies were used to protect the fraudsters’ privacy and to facilitate their attacks against financial institutions. Our latest interactions and analysis of the …

Improving Cybersecurity Through Private Insurance?

While dealing with interconnected and global risks, the cyber-insurance market is intensely growing. This market is a creature of privacy and data security regulations, and mandatory breach notifications have shaped its business model. Market stakeholders suggest that cyber-insurance provides incentives and resources to insured organizations for improving cybersecurity. This presentation seeks to empirically test this …

Rotten Supplies – Supply Chain Attack Case Studies

We have seen an increase in supply chain attacks in the past few years. Some of these attacks have something in common: they involve a compromised Linux server to distribute malware or act as C&C server. This presentation will use real world case studies: the Transmission BitTorrent client distributing OSX/Keydnap; the M.E. Doc compromise responsible …

Digital Campaign Threats in Canada: Party Responses in an Age of Disinformation

This presentation reported on results from the examination of interference using disinformation through digital platforms. Its methods relied on media monitoring (both traditional media and social media) and interviews with party strategists. The aim was to detail the main instances of disinformation and other digital threats, and to analyze how each of the major parties …

Policy Frameworks for Election Cyber-Security in Canada

Compelling evidence of foreign cyber-interference in the 2016 US Presidential election campaign has prompted a robust policy response in Canada at the federal level. This presentation will review legislative changes, the critical incident contingency plan, and initiatives to promote voters’ resiliency, and offer an early evaluation of their implementation in the 2019 campaign. About the …

On Public Opinion about Technology and Cyber-Security in Elections- Laura Stephenson

About the speaker Laura Stephenson is a Professor of political science at the University of Western Ontario. She co-directs the Consortium on Electoral Democracy (C-Dem). She specializes in the study of political behaviour, both Canadian and comparative. Her research is focused on understanding how institutions and context influence attitudes, electoral preferences and engagement with politics. …

Supporting Cyber Security Standards Development with Security Assurance Cases

The existence of well-defined or documented sets of standards, guidelines, or best practices for developing secure systems is limited. Those that are available often lack focus and specificity, making compliance either too difficult or too easy. As a result, many practitioners are never quite sure what needs to be done to demonstrate that they have …

Elephant in the Ballot Box: The Other Cyber Threats to Canada’s Democratic Process

The Communication Security Establishments’s “Cyber Threats to Canada’s Democratic Process” has been an important and influential series of reports providing the public with an invaluable snapshot of challenges facing our elections in the digital age. But for an agency with a predominately outward view toward foreign intelligence, the reports also noteworthy for the threats they …

Les cinq dimensions de la cyber-résilience

Cette présentation a pour objectif de présenter le concept de cyber-résilience, qui vient compléter celui de cybersécurité, ainsi que les pratiques qui y sont associées. Après avoir défini la cyber-résilience et son utilité face à une géographie des cyber-risques en constant évolution, nous discuterons des cinq dimensions qui caractérisent les organisations cyber-résilientes et des pratiques …