Canadian

Montréhack avec Olivier Bilodeau | Montréhack with Olivier Bilodeau

(English version will follow) PROFIL DE COMMUNAUTÉ Cette semaine, nous avons eu le plaisir de nous entretenir avec Olivier Bilodeau co-fondateur de Montréhack. Il y a bientôt 6 ans, vous avez fondé Montréhack, un groupe de professionnels de la sécurité et d’étudiants qui se rencontrent une fois par mois pour partager leurs compétences dans un …

Cybersecurity & the Role of National Vulnerability Disclosure Policies

When governments discover or purchase zero day vulnerabilities, they are faced with a difficult decision: should they disclose the vulnerability, allowing the vendor to patch the vulnerability before it can be exploited, and thereby promote the security of the public or consumer information implicated? Or, should they keep the vulnerability under wraps and use it …

Active Cyber Defence: Why We Should Hack back at the Cyberattackers

Corporations and Citizens, as victims of cybercrime, have been conducting revenge attacks, hackbacks, and strikebacks on cyberattackers. Patrick will present his Doctor of Social Sciences research findings which examine active cyber defence as a viable public policy. He will present evidence which supports this policy development and also how to model Active Cyber Defence decision …

Results from the Canadian Survey of Cyber Security and Cybercrime

With fast moving innovations in technology, cyber security threats and incidents continue to grow in number and sophistication. The need to measure, analyze, and better understand these incidents is imperative for businesses, policymakers, and other stakeholders to effectively manage the risks of cyber threats, vulnerabilities and incidents. This is recognized not only in Canada but …

Election Cybersecurity and the Role of Political Parties

Political parties are an essential part of electoral democracy. They have also been identified by the intelligence community and academic researchers as a weak point in the cybersecurity of many democracies. The hacking of the Democratic National Committee’s emails is one prominent example of how ineffective cybersecurity by a political party can have far-reaching implications. …

Change management in cybersecurity avec Stéphanie Amram | Gestion du changement en cybersécurité with Stéphanie Amram

(English version will follow) PROFIL DE COMMUNAUTÉ Le réseau SERENE-RISC désire partager avec ses membres des profils de personnes oeuvrant dans le domaine de la cybersécurité. Le Réseau se veut être un lieu d’échange d’information sur la cybersécurité à la fois ouvert, impartial et inclusif. À travers ces profils, SERENE-RISC offre cette opportunité d’échange afin …

Exploring User Behavior and Cybersecurity Knowledge in Online Shopping | Comportements et connaissances des utilisateurs lors de magasinage en ligne

(French below) Every year more and more people are doing their Christmas shopping online. Online Christmas shopping can come as blessing, as you can beat the queues in stores and get it all delivered to your door without leaving your house. However there are risks associated with online shopping. Cybersecurity challenges are continually evolving and …

Voter Data and the Impact of Privacy Legislation Gaps on Cybersecurity of Elections

In Canada, there are both legislative gaps and ambiguity around the privacy obligations of political parties with respect to voter data. Despite the highly sensitive nature of political preferences, political parties have been largely exempt from formal obligations to protect personal information. Privacy legislation requires that entities adhere to fair information principles, which require notice …

Detection of Information Systems Misuse in Big Data

The workplace is a radically different environment since Information Systems (IS) became one of the strongest enablers for its processes. But IS can be misused. Security issues in IS are becoming more prevalent than ever before. In addition to the significant damage of these acts, the stakeholders deemed accountable for these events have faced severe …

A language Model for Compromised User Analysis

Accounts of social network users can be compromised in a number of ways. When malware infects a user account, that account can be used to spread spam and malware as well as to gather personal information. Current online systems employ authentication mechanism to verify user’s identities and determine their corresponding authorities. Once authenticated, users are …