english

Personal and peer deviance as explanations for online identity fraud victimization

While identity-related offenses always existed, the proliferation of quick forms of online communication has facilitated their expansion. In Canada, the rate of fraud (including identity theft and identity fraud) continued to increase for seven years in a row, with a 12% increase between 2017 and 2018. Incidents of identity fraud and identity theft increased from …

Cyber threat intelligence sharing

Nowadays, Cyber Threat Intelligence (CTI) sharing is considered necessary to survive current and future cyberattacks by working proactively. Organizations may be compelled to have a threat intelligence program and share their information. As such, stakeholders may be held responsible in the future for not sharing known threats that might affect other organizations. The core idea …

The effectiveness of learner-controlled information cybersecurity training

Cybersecurity training allows organizations to raise awareness among employees about information security best practices. Employee training and awareness is a critical and neglected area in cybersecurity. Indeed, about 19% of Canadian businesses provided formal training to develop or upgrade their cybersecurity-related skills, and a little over half (51%) of them shared general cybersecurity practices through …

Cyberstats Challenge: No Industry is safe from Ransomware

Mahreen Naisir, Fahan Mahmood and Vipul Malhortra from the University of Windsor presented their analysis of data from the Statistics Canada Cybercrime Survey at our 2019 Workshop in Ottawa. This was as part of a competition aiming to better align recent evidence and statistics with best practices for business. Participants thoroughly examined the data from …

Employment status and information security policy compliance

More and more companies have been increasing the flexibility of their labor force. However, labor forces with different employee positions within the organization bring different stakes and level of commitment. This is particularly true with temporary employees who have little reason to be committed towards their organization. Complying with the security policies requires time and …

Interrogating Best Practices in Secure Operations and Development

Security operations and secure development are critical requirements that receive significant personnel, resources, training and other kinds of attention. As best practices proliferate, there has been little empirical research as to which are most effective and why. In this talk, I will review recent empirical studies that examine in depth the utility of threat modeling, …