|
|
|
|
|
|
|
@{mv_date_MMM d, yyyy}@ |
|
|
Public Safety Minister Bill Blair confirmed the news Oct. 19 on Twitter.
» Read full article
The tighter measures take effect Monday and will be in place for 28 days.
» Read full article
The Federal Aviation Administration has not developed a training program for cybersecurity, according to government watchdogs.
» Read full article
|
|
|
|
|
|
|
When an employee steals sensitive data from a company it can cause irreparable harm to the reputation and finances of that business. When these events do occur, there is recourse available. In the process of performing a digital forensics examination, it can be determined what data was taken, how was taken and who took it. Data theft can take multiple forms, including stealing data internally from issued company computers and mobile phones or using personal devices to store work product. Data can even be exfiltrated from a company externally after an employee has left the organization by connecting to shared drives and cloud accounts. Whether intellectual property was stolen using complex means, or through a simple exfiltration by emailing sensitive data to personal email accounts or uploading it to personal cloud storage, these methods all leave forensic artifacts on electronic devices that can be utilized as evidence in litigation.
» REGISTER NOW |
|
|
|
Stéphane Veilleux is the 2020 recipient of the prestigious ASIS Canada Ron Minion Award. A long-standing member of the ASIS Montreal chapter, and current chairperson, Stéphane tells Canadian Security what a thrill it was to receive this award, especially during these challenging times.
» Watch video |
|
|
|
This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. It provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program.
The author’s intent is to provide the reader with a practitioner’s guide (a “how-to” book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.
» Shop now |
|
|
|
Interac survey shows Canadians agree the pandemic has emphasized the need for digital IDs, but continue to cite security as a key adoption concern.
» Read full article
|
The EU said all information generated by the apps doesn't allow the identification of users and isn't kept after infections are traced back.
» Read full article
|
42 per cent of Canadians said they had experienced at least one type of cybersecurity incident since the beginning of the pandemic.
» Read full article
| |
|
|
Location: Virtual Summit
Date: Oct. 21, 2020
» More Info
Location: Virtual Summit
Date: Dec. 3, 2020
» More Info
|
|
| |