Video Presentation

Cybersecurity: An Electoral Cycle Approach

The security of elections is a key issue for the defence communities around the globe. Recent examples make the urgency of this issue clear: the 2017 Presidential elections in Kenya were declared invalid amidst allegations of problems with the electoral commission’s databases and computers; Estonia’s widely respected identity card system, which is used for i-voting …

Voter Data and the Impact of Privacy Legislation Gaps on Cybersecurity of Elections

In Canada, there are both legislative gaps and ambiguity around the privacy obligations of political parties with respect to voter data. Despite the highly sensitive nature of political preferences, political parties have been largely exempt from formal obligations to protect personal information. Privacy legislation requires that entities adhere to fair information principles, which require notice …

Questioning the “Loneliness” of Lone-Wolves: A Social Network Analysis of Lone-Wolf Terrorists

Dr. David Hofmann Presented at the 2018 Atlantic Security Conference In this presentation, Dr. Hofmann will discuss his recently completed funded research (TSAS / Public Safety Canada) into the three different types of social networks formed by lone-wolves during the 24 months prior to the commission of their first act of terrorist violence. Dr. Hofmann …

Software Defined Networking and Network Security

Presented by Dr. Israat Haque at the 2018 Atlantic Security Conference Software Defined Network (SDN) is a new approach of designing networks. In SDN architecture network control function is decoupled from hardware like routers and switches. This decoupled control function is executed in a logically centralized controller with a global network view. Furthermore, SDN brings …

Know your Enemy: Malware Authorship Attribution

Presented by Natalia Stakhanova at the Atlantic Security Conference 2018 Since the first computer virus hit the DARPA network in the early 1970s, the security community interest revolved around ways to expose identities of malware writers. Knowledge of the adversary’s identity promised additional leverage to security experts in their ongoing battle against perpetrators. At the …

Machine Learning – The panacea for cybersecurity threats? Thoughts from the industry

Presented at the SERENE-RISC Workshop, 2017 October by Nabil Seddigh, President, Solana Networks Machine Learning an Artificial Intelligence is often presented as the cure all for cybersecurity issues. Nabil Seddigh provides some perspective on the development of this new technology and the place it will likely occupy in the security landscape.   Run Time < …

Anonymous and the Politics of Leaking

Presented at the SERENE-RISC Workshop 2017, April. In this talk Dr. Gabriella Coleman will provide a history of Anonymous’ crucial role in establishing a novel style of hacking-for-leaking: public disclosure hacks. In contrast to traditional whistle-blowing—instigated by insiders who possess intimate awareness of wrongdoing and access to documents that can prove it—a public disclosure hack …

Cryptocurrencies in Canada: Legal status and public policy considerations

Presented at the SERENE-RISC Workshop 2017, April. Bitcoin (BTC) has often been referred to as “nerd money”. However, since the first BTC transaction in 2009, the decentralized cryptocurrency has become more popular and is becoming widely available with more users and merchants adopting the cryptocurrency every day. This presentation will provide a high-level taxonomy of …