Six Steps to Take Before Running a Red Team Exercise

About the Author: Jason Thompson (CISSP, CISA, CRISC) – Senior Director, Offensive Security, ISA Cybersecurity Jason is a highly experienced and passionate Information Technology (IT) professional with over 20 years of experience in the field, 18 of those years in focused on IT security. Jason has proven skills in security assessments, risk management, security advisory, […]

AI: Fact, Fiction or Function

Currently, one of the biggest discussion points regarding artificial intelligence (AI) revolves around the basic understanding of what AI really can and can’t do. Opinions on AI run the gamut from claiming that AI is incapable of doing things that it clearly can, to ascribing capabilities to it that are beyond current technology. Here, we […]

The Eight Essential Steps in Building your AI Data Governance Strategy

As Artificial Intelligence (AI) becomes a key aspect of how most organizations operate, Canadian companies need to pay close attention to how AI and data management work together. While appropriate governance is essential, it may be hard for organizations to see how to get started on a cohesive plan. As experts in the field of […]

Cyber Risk Calculators are Broken: Here’s Why

The metaphor of a “broken risk assessment calculator” in cybersecurity is an apt one, as it highlights several key deficiencies in the current approach to cybersecurity risk assessment in Canada and abroad. In this article, we analyze some of the limitations of the current approaches, and explore ways you can get a more realistic handle on […]

Securing the Human Threat Surface: 5 Proactive Cyber Strategies for Canadian Business

More than ever, cyber criminals are focusing on the human attack surface for financial gain. Protecting the organization by educating employees on risks and threats has become a critical concern for organizations across Canada, especially in key sectors like healthcare, finance, energy, and critical infrastructure. Cyber criminals are increasingly targeting employees and executives as the […]

Education Under Cyber Attack

education under cyber attack

Six FAQs about what’s happening, why, and what we can do about it 1. Why are schools under cyber attack? There are several factors involved. First off, educational institutions have a wealth of sensitive data. Consider that schools hold health information, financial information, academic performance records, personal student and faculty records, and more. Further, note […]

Determining How to Allocate Your Cybersecurity Budget

Protecting What Matters: Determining How to Allocate Your Cybersecurity Budget How to spend your next cyber dollar is a question you’ve asked yourself, and has likely been asked by your leadership team. The answer to that question should actually be straightforward: if it isn’t, then you should be reflecting on your entire cyber maturity program – not just deciding on which purchase order to […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.