Cyber threat intelligence sharing

Nowadays, Cyber Threat Intelligence (CTI) sharing is considered necessary to survive current and future cyberattacks by working proactively. Organizations may be compelled to have a threat intelligence program and share their information. As such, stakeholders may be held responsible in the future for not sharing known threats that might affect other organizations. The core idea …

Partage de renseignements sur les menaces cybernétiques

De nos jours, le partage de renseignements sur les cybermenaces est considéré comme nécessaire pour survivre aux cyberattaques actuelles et futures en travaillant de manière proactive. Les organisations peuvent se voir contraindre d’avoir un programme de renseignement sur les menaces et de partager leurs informations. À ce titre, les parties prenantes pourraient être tenues responsables …

L’efficacité de la formation en cybersécurité de l’information contrôlée par l’apprenant

La formation en cybersécurité permet aux organisations de sensibiliser leurs employés aux meilleures pratiques en matière de sécurité de l’information. La formation et la sensibilisation des employés est un domaine critique et négligé de la cybersécurité. En effet, environ 19% des entreprises canadiennes ont fourni une formation officielle pour développer ou améliorer leurs compétences liées …

The effectiveness of learner-controlled information cybersecurity training

Cybersecurity training allows organizations to raise awareness among employees about information security best practices. Employee training and awareness is a critical and neglected area in cybersecurity. Indeed, about 19% of Canadian businesses provided formal training to develop or upgrade their cybersecurity-related skills, and a little over half (51%) of them shared general cybersecurity practices through …

Cyberstats Challenge: No Industry is safe from Ransomware

Mahreen Naisir, Fahan Mahmood and Vipul Malhortra from the University of Windsor presented their analysis of data from the Statistics Canada Cybercrime Survey at our 2019 Workshop in Ottawa. This was as part of a competition aiming to better align recent evidence and statistics with best practices for business. Participants thoroughly examined the data from …

Statut d’emploi et conformité aux politiques de sécurité de l’information

De plus en plus d’entreprises élargissent la flexibilité de leur main-d’œuvre. Cependant, les différents types de poste au sein des organisations soulèvent des enjeux et un niveau d’engagement différents. Cela est particulièrement vrai pour les employés temporaires qui ont peu de raisons de s’engager envers leur organisation. Le respect des politiques en matière de sécurité …

Employment status and information security policy compliance

More and more companies have been increasing the flexibility of their labor force. However, labor forces with different employee positions within the organization bring different stakes and level of commitment. This is particularly true with temporary employees who have little reason to be committed towards their organization. Complying with the security policies requires time and …

Interrogating Best Practices in Secure Operations and Development

Security operations and secure development are critical requirements that receive significant personnel, resources, training and other kinds of attention. As best practices proliferate, there has been little empirical research as to which are most effective and why. In this talk, I will review recent empirical studies that examine in depth the utility of threat modeling, …