CYBERSECURITY
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b272452f2ac86e793f3f367f14edfdf9.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/a83081a66c421a072cfbe36352435d11.jpeg)
Protecting Canada from Cyber Threats Means Protecting SMBs
The threats we face in cyberspace are rapidly evolving. In a world where our economy and essential services are increasingly online, cybersecurity is critical to ensuring the viability, continuity, and growth of Canada’s economy.
In this interview, Ulrike Bahr-Gedalia, Senior Director of Digital Economy, Technology & Innovation and Cyber. Right. Now. (CRN) campaign policy lead at the Canadian Chamber of Commerce interviews Marjorie Dickman, BlackBerry’s Chief Government Affairs and Public Policy Officer.
Dickman discusses how BlackBerry, a partner and co-chair of the CRN campaign, can help secure Canada’s digital future by protecting Canada’s small- and medium-sized businesses (SMBs). Small businesses comprise 98 per cent of Canadian businesses — highlighting the importance of protecting them from cyber threats.
ULRIKE BAHR-GEDALIA: What’s needed to strengthen Canada’s resilience to cyberattacks? Which sectors do you see as most vulnerable?
MARJORIE DICKMAN: The Government of Canada has made important strides to protect critical infrastructure from cyber threats over the past year. The ongoing review of the National Cyber Security Strategy and the introduction of the Critical Cyber Systems Protection Act (Bill C-26) will help protect Canada’s critical infrastructure from cyberattacks, particularly in key sectors like banking, energy, telecommunications, and transportation.
Additionally, BlackBerry encourages an increased focus on securing Canada’s smalland medium-sized businesses (SMBs) from cyber threats. SMBs are the backbone of Canada’s economy. In 2021, SMBs made up 98 per cent of all businesses in Canada and employed almost 85 per cent of the total labour force. Supporting the growth of SMBs is critical for Canada’s economic prosperity.
Yet, Canada’s SMBs are increasingly vulnerable to cyberattacks. According to the
Insurance Bureau of Canada, 47 per cent of Canadian small businesses did not invest in cybersecurity protection in 2021. The following statistics highlight why more needs to be done to help Canada’s SMBs establish cyber defences:
• SMBs face an average of 11 cyber threats per day (BlackBerry 2022 Threat Report
The average cost of a cyber breach is $7 million (IT World Canada)
Only 14 per cent of businesses have cyber insurance coverage limits above $600,000 (BlackBerry Cyber Insurance Study)
• 59 per cent of businesses hope that the government will cover damages for attacks linked to nation-states (BlackBerry Cyber Insurance Study)
Cyberattacks are devastating to SMBs. 60 per cent of SMBs that fall victim to a cyberattack are out of business within six months (BlackBerry 2022 Threat Report) With the rapid pace of digitalization — especially since the start of the pandemic — Canada cannot afford to leave SMBs exposed to cyber threats.
BAHR-GEDALIA: How can SMBs better protect themselves from evolving and increasingly complex cyber threats? How can using Artificial Intelligence (AI)-driven solutions reduce risk and costs?
DICKMAN: By adopting an AI-driven, prevention-first approach to cybersecurity, SMBs can increase their cyber resilience and focus on their growth. With the application of AI-driven cybersecurity solutions, it’s possible to neutralize malware threats before they have a chance to execute on a business’ systems. In addition, AI-driven cybersecurity solutions can help SMBs dramatically reduce the cost associated with recovering
from a cyberattack. If malware cannot execute, then the downstream consequences, and the resulting efforts to trace, contain, and remediate the damage from cyberattacks, are dramatically reduced. For example, a Forrester Consulting study of BlackBerry’s CylancePROTECT Endpoint Protection (EPP) solution, which uses advanced AI, found that CylancePROTECT helped a customer achieve a 95 per cent reduction in lost employee time due to faster threat investigation and remediation. In short, AI-driven cybersecurity solutions give SMBs the ability to protect themselves from highly sophisticated cyber threats and achieve cost savings.
BAHR-GEDALIA: As a partner and co-chair of Cyber. Right. Now., could you summarize in one sentence what the initiative is trying to achieve?
DICKMAN: The Cyber. Right. Now. campaign aims to make Canada one of the most cyber-secure countries on the planet. It’s a unique initiative championed by the Canadian Chamber of Commerce, BlackBerry, and more than two dozen leading technology and cybersecurity organizations, including Microsoft Canada, Amazon Web Services (AWS), General Dynamics Mission Systems-Canada, Cenovus Energy, Sun Life, BMO, Calian, and eSentire. Together, we’re urging the Government to make cybersecurity a top priority and Canada, a world leader in cyber protection.
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/185a02d832d33f3bc0d64e6363a18a32.jpeg)
To learn more about BlackBerry’s AI-Driven Cybersecurity solutions, visit BlackBerry at blackberry.com/us/en/ products/cylance-endpoint-security
To learn more about the Cyber. Right. Now. campaign, visit the Canadian Chamber of Commerce at chamber.ca/ campaign/cyber-right-now
This article was made possible with support from the Canadian Chamber of Commerce
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/2689b2fc846c94248fc483ac3a66c83b.jpeg)
Diversifying Talent Pool Key to Solving Cyber Talent Shortage in Canada
Long thought of as the domain of people with specific technical skills, the cybersecurity industry welcomes people with diverse backgrounds and perspectives.
Demand for cyber talent in Canada is high because of the increased number and complexity of threats facing organizations of all sizes. And for employers trying to meet the growing needs of the sector, figuring out how to attract, recruit, and retain qualified cybersecurity talent is an ongoing challenge.
Rogers Cybersecure Catalyst — Toronto Metropolitan University’s national centre for training, innovation, and collaboration in cybersecurity — is working to solve this problem. “We bridge the talent gap by working to ensure there’s a consistent supply of cyber professionals with in-demand skills,” says Rushmi Hasham, Director of Accelerated Cybersecurity Training Program and CyberStart Canada at the Catalyst.
To diversify the talent pool and provide access to training, the Catalyst launched the Accelerated Cybersecurity Training Program (ACTP) in 2020. “The program is specifically designed to give women, newcomers to Canada, and individuals who’ve recently lost employment the opportunities and skills needed to launch a successful career in the sector,” says Hasham. ACTP learners earn three GIAC Certifications within seven months, which qualifies them for entrylevel cybersecurity roles.
While many may perceive cybersecurity as restricted to people with highly developed technical skills, there’s no single cybersecurity persona. The field is open to virtually anyone who is interested, regardless of their professional background, education, and industry experience. In recent research conducted by Blueprint — a non-profit research organization — in partnership with Future Skills Centre, the top three non-technical skills that cybersecurity employers look for are verbal communication skills, problem-solving and critical thinking, and attention to detail.
“Cybersecurity is one of the most welcoming industries, and the more we bring in diversity of thought and background, the more we’re able to create solutions that are as diverse as the problems that are coming at us,” says Hasham. Cybersecurity employers are invited to connect with the Catalyst to gain access to a talent pipeline of certified and employment-ready cyber professionals.
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1c5b15b72f95cf53d324b9e30c67753d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e4c984d3f3729d976347cc06fdd00997.jpeg)
The Search for True Randomness: Quantum Hardening of Cybersecurity’s Weakest Link
With cybercrime skyrocketing, cybersecurity experts are working overtime to not only protect systems against sophisticated attacks but also against the unprecedented threat of quantum computing. Fortunately, innovation in quantum security is helping them stay ahead of the curve.
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1a4eedf0c4d674e5057705a461f958a2.jpeg)
Join the conversation by taking our cyber talent survey or learn more about hiring skilled cyber talent at cybersecure catalyst.ca
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f6af02e00b672a652c3e32f4b8243883.jpeg)
Why a Career Transition to Cybersecurity Is Not a Far-Fetched Idea
Deloitte’s
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/7bceb20119852887a021e41dd607dccc.jpeg)
Protecting Canada against cyberattacks is a daunting challenge. Cyber breaches have increased by 4,379 per cent between 2015 and 2020, according to Risk Based Security — costing billions of dollars from ruined reputations, lost sales, and legal costs. Aware of the threats, organizations are stepping up their cybersecurity. However, they face the problem of not having enough skilled talent in the industry.
Discover the quantumsafe future of cybersecurity at quantum emotion.com
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/a51579ce7b4ae30033c67f9892add964.jpeg)
The quantum computing revolution is imminent, and it brings with it an existential threat to traditional encryption and cybersecurity, even as we find ourselves in an era of unprecedented cybercrime. It’s vital that we evaluate today the quantum vulnerabilities of our systems, and that we be equally cognizant of the opportunities to bolster these systems with quantum reinforcement.
Significantly, the advent of quantum random number generators (QRNGs) is providing an opportunity for immediate future-proofing by enabling cryptographic systems that are truly secure against all random number attacks.
“Currently, encryption seeds are generated by pseudorandom number generators that are essentially algorithms using mathematical formulas to produce sequences of seemingly random numbers,” explains Francis Bellido, CEO of Canadian quantum-safe cybersecurity innovator Quantum eMotion. “We have produced a second-generation QRNG based on the quantum tunneling phenomenon created by electrons, unlike other competitive technologies which depend on photonics physical properties. This new approach shows distinctive advantages in terms of robustness, speed, scalability, and cost.”
Quantum eMotion’s QRNG technology is just 10 microns across, making it possible to enjoy this added layer of security in all contexts, embedding it into pre-existing chips in computers, smartphones, or any other device that connects to the Internet.
Tomorrow's essential security is today’s peace of mind
Adopting this type of quantum-enabled security measure today not only provides essential future-proofing to sensitive digital systems, it also functions as a key safeguard against the ever-increasing assault of conventional cyberattacks. “Cyber threats are growing more sophisticated by the day, and the cost of breaches to North American businesses is measured in the billions of dollars,” says Bellido. “The difficulty in sourcing truly random numbers has long been known to be a existential vulnerability to our digital security systems, and embracing the power of quantum randomness today is the only way to get a full step ahead of the most dangerous cybercriminals, before they have access to next generation quantum tools of their own.”
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e847fa6ec4cbf769f43e0493acd828e8.jpeg)
In 2020 Deloitte made a goal to make Canada a safer place. To do that the company has taken actions to help fill the skill gap, through various hiring programs, partnerships with post-secondary, and developing cybersecurity skills base with new individuals not traditionally found in cyber or IT. To help fill the skills gap, Deloitte — a worldwide leader in cyber strategy consulting and cyber intelligence — is inviting professionals from different industry backgrounds to make a career transition.
Existing skills, additional training, and supportive culture ensure successful transition
Lillian Piao, Senior Manager with a cybersecurity team in Deloitte’s Risk Advisory practice, is one of them. With a degree in electrical engineering, she spent six years in the energy sector within the operational technology field. As she reflected on her career path, she realized she was starting to feel a bit repetitive. Shortly thereafter, Justin Fong, a partner in Deloitte’s cybersecurity practice, reached out to her with an opportunity. “I was curious, but I didn’t have
careers.
a lot of background in the area,” says Piao. She decided to give it a try, and nearly six years later, Piao is enjoying a rewarding career, supporting clients on large cybersecurity programs to mature their cybersecurity practice. She was able to use some of her prior professional background and industry knowledge to fill her skills gap. The rest she did through additional training, coaching, and certification. Piao credits Deloitte’s open and supportive culture with helping to ease the transition. “It can be really nerve-wracking when you’re starting in an area where you don’t have a lot of knowledge, but my peers and superiors were amazing and made me feel very comfortable,” she says.
Right now, we have people who’ve been in the industry for many years as well as a lot of new talent just coming out of school, but the real gaps are in the middle, and one way to fill those gaps is through career change.
background. This is not the case. “There are many different types of roles and jobs in the field,” says Piao. These range from technical roles in IT to roles in strategy, business development, incident response, and risk management, which require soft skills. Other traits such as analytical and critical thinking and the willingness to build skills through self learning will make this transition a rewarding one. “I’m constantly learning and developing, especially as we evolve our Cyber Target Operating Model.” she says.
A burgeoning industry with high demand for talent Cybersecurity is a burgeoning industry. A 2018 Deloitte report estimated that 1.8 million cybersecurity jobs would need to be filled by 2022. “There’s still a talent shortage in cybersecurity,” says Piao. “Right now, we have people who’ve been in the industry for many years as well as a lot of new talent just coming out of school, but the real gaps are in the middle, and one way to fill that gap is through career change,” she says.
In being the catalyst for training and nurturing cybersecurity leaders, Deloitte is ensuring a broader cybersecurity talent pool for Canada as a whole, thereby helping to keep Canada safe from cyber
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/68e66e3ce0db73da90d2a122e8281e18.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/42d84d8ff1e6c1613da12d556df7d19d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/93856ec76aa22d2bc5d8021406771413.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/de1383a95a1fb5c447dc82a0172723a6.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/a60577da1e787a7cfdb580dbd72227f9.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/cfbac8907177fea8f0e6c7503db84409.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/fe510370bd2f3a0dde299eaa6bdc6593.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1a5d09a4464fa4f7b8f900407242f21e.jpeg)
All Hands on Deck: The Skyrocketing Demand for Canadian Cybersecurity Skills
The impact of cybercrime on the Canadian economy is measured in the billions of dollars, but so too is the economic contribution of the rapidly growing cybersecurity jobs sector. As cyber threats and cybersecurity systems continue to multiply and grow ever more advanced, the biggest question is how to fill thousands of available cybersecurity positions with appropriately skilled workers.
D.F. McCourt
Cybercrime in Canada is reaching crisis levels. The federal government estimates the damage to the country’s economy somewhere north of $3 billion annually. With the cost of an individual breach or ransomware attack on a business usually measured in millions of dollars, companies — large and small — are scrambling to hire the most qualified cybersecurity experts. That’s easier said than done. Job openings in the field appear faster than people can be trained with the specialized skills needed to fill them.
“From supply chain disruptions in the private sector to ransomware attacks on governments, cybercriminals have become increasingly sophisticated and the threat landscape more diverse,” says Kevin Magee, Chief Security Officer at Microsoft Canada.
a whole is more vulnerable to cyberattacks,” Mondou says.
Solving the talent time-to-market problem
With the demand for cybersecurity professionals doubling every year, the immediate need requires a better approach to training cyber talent. The first step is to fully leverage the cybersecurity talent we already have available in Canada. TECHNATION’s Career Ready Program, funded by the Government of Canada’s Student Work Placement Program, is one important way to address the growing time to market challenge.
“As part of TECHNATION’s Career Ready Program, we worked collaboratively with SkyHive, who are developing some of the world’s most advanced reskilling technology based on Quantum Labour Analysis, to develop and deploy CareerFinder,” says Mondou.
The job gap Canadian industries are experiencing across the board means that Canada as a whole is more vulnerable to cyberattacks.
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ea3b1d79f6170f834cf63e2b474549f8.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/7f9a2fed8bbdead0cabfc58b35239eed.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/70bb7adfdc52ff8aebf829d0f71f88e1.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/311b2fba429aed223db0363aa31a4147.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e9c22d20c2d1f5f79ad86f322ff32481.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/44540d481e2f5d974cc6b2c42d29c605.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f2f30c2aceec01744e0424f49a1836f2.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/74fa3e28cc6644ce3f756585ef1e950b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/38f56e75e7c287f73a35d7c4ab2dfa56.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/685b8b34f5f4a9238836ba754f23d554.jpeg)
“These cybersecurity challenges are compounded by a workforce shortage; there simply aren’t enough people with the cybersecurity skills needed to fill open jobs. This is a global problem. By 2025, there will be 3.5 million cybersecurity jobs open globally, representing a 350 per cent increase over an eight-year period, so there will be no shortage of career opportunities in the field in Canada.”
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e35a519ba100d28574239f545c73e85c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/aa9dcd8f3cd1d98e5046654f00dfefb6.jpeg)
“CareerFinder is a first of its kind in Canada, a leading-edge digital labour market intelligence platform and unique national asset, which uses artificial intelligence and machine learning to identify critical workforce skills needed across all sectors both in the present and in the future.”
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/52314158c2a61507ff8101de13ef208d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ef1d9f17242f2ab0f347e3793444c432.jpeg)
expedite the connection to talent between industry and academia to address the ongoing cybersecurity talent shortage. “We need more bold thinking like we see at Lassonde. Canadian post-secondary institutions must start modernizing curricula with WIL and closer industry partnerships now or we will continue to fall behind as a global tech leader.” says Mondou.
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/65420303a0e63396d45396d1fca50260.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/4a7f7f31a07cf1e1ffc501a4b06e9344.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e148823d6b5aa698593cd02731e52648.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d76e90e76eaef0af3432f2327db14129.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/38b5fc5eac0039f125951876400b1372.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f5ced352c0b3b58829c1492a281f6d84.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f10debce44d4dae80d340cc64d3d17a3.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/64ad8e356db8ed3fc9fca579873070f4.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/546f54b5f7102d5de72ebb09b24d4a25.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/65748e16a25a9df4e17aaba9bb160daf.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e2bfa69e8edfdb4263099cb71a60d331.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/00df6697af82e986e8d93a78629c074f.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/8fc09de6c0dbfe327e0f9e870c6d73f6.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/788ee0716106b164f3fa2efe15a524b1.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/68a99c4baa224eb11a4e5912359d632c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/91998b2e4638269a3487987bd0763196.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/96c9c5c7bed57b440dabb63a15e2ac7c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/4a3a2f6fb6c026af620e4c5df2c9eac4.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ab90ba5c8295caae6a90e635d85e71b5.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/5907ca48101723e2a24cb72f61eab160.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/58c25f6426fd39c0a9824a6645f43f02.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/fc544d9fcde07a84b7aafd931b58bbc9.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/83a4bc3d5f6c1747de40e2ff932fbfe2.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/fded7e2aa52f2a1a96f1fd100570e34a.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/15e425b7ec1fd24f7568a24e962096e2.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/3d57ddabe76d3128126315b9cd3534b3.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/0c954d23a76c0d45a63924f3f1c15504.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f63180ee3fee2d407543f2215dd8b0db.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/4a3d0047932d791f57518e1b1b3d8d8f.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/619ac6f7611f69414a26d536e099153e.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/9d0048f8e1dc3a8813418899a56ab963.jpeg)
Injecting cybersecurity skills at every level
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/16054eb11a152dfbc412446c79a2b191.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b171d339abcbdb0552bac4d8dbdf0b89.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/8a1d52b40482833f12fc1ac370efb1c7.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f2044aed307b7fa65b9aab073fa2a43c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ba73e79563271ed0122c188062b40b0e.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/3da484bd173cb27e66202fac845255c5.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/3da1da95165a6e6eed90d5c8d9c8a7e3.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/291b36e24b354e9d56c560f7b866e586.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e768b7c6b8841bbd28230cc337f1d27a.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/82f49141b2fa7d5c298446fb4219e6ef.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/9102e95d0dfb87ecc3398c0fae7b34a9.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/48c554be65d19fd144aef6269dc5d28c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d2dfe25b19dacf895a5723b1c0c0ed97.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/c4f7ee0506dc904d51122cea75db65d1.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/9bf7fa273b51a1c2f9730010a4b50672.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f4dd514303285f754eb31c7cffbb1bb9.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f55334937fb74a1fa3af0add69182fa8.jpeg)
The CareerFinder platform shows over 4,000 open cybersecurity positions across Canada daily. To meet growing demand, TECHNATION is working with industry and academia to push new and innovative forms of Work Integrated Learning (WIL) to accelerate tech talent in critical areas. TECHNATION has also partnered with Microsoft Canada to pilot the Explore internship program, which helps students from diverse academic and cultural backgrounds to realize career pathways into the digital workforce and cybersecurity.
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/7796a5e78791b3c9667a24132cf031ce.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/cc3c2898b6023e9e3ee93f4270b9ae22.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b1572e72f593b116c8c1df2f7e787072.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/fbc7ced8e007c6cb773c74d3663627bd.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f4ed716fa8d959e9cbf6bf82d69da863.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/c83e771f54e670604bc3b9b93389fb25.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f3b63ec0973f7e1a2102767c25c98eda.jpeg)
“Education and skilling-focused programs and tools like Explore and Career Ready are helping to equip and empower the next generation of digital leaders with the essential skills our economy needs to thrive in the future,” Magee says. “A challenge of this scale is significant, and to address it, tech companies like ours, governments, academia, and business will need to work together to provide skilling opportunities both to skill-up our own employees and to grow the cybersecurity workforce by attracting new people to the profession.”
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b682632a20afeb52cb4b4b8d81eba18b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/691bd04b3d73f08e4651756ac7e1740e.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b05b41abdda1295d54c5f994d81d7a42.jpeg)
The growing cybersecurity job gap and unfilled positions, is not a viable option. Angela Mondou, President and CEO of TECHNATION Canada, the leading national technology association, compares the current situation to a military with thousands of soldiers and aviators absent from the ranks during wartime.
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1295f30c98ffa90132f43e2c2cee9636.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1326291a3c88f104656649565ead330d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1f8a8312653d0cad73b26785bc62fcf6.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/cc12220894947cacb21debf9e40c5ec2.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ec385cf9d729ca83377077144c3fc648.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/3cd24aefd0d0205bc6357fa71562fbd4.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/25f41cca06c9f7466afd640d5312d429.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/32ed2802bcc80237ceb64ef3cc5d4b42.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/083bdfab5e7c5168d4c7e5197f8d5a28.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d610812b29bae5339e4d32ed46bc9ac2.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/6c6a16b00bd99a463f69ccdedb9c9573.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b7631f6b6a0af56221181b29846bbbd6.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/dd0835518b2945bb6ad220229e976e7d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/2ca68fb4f2d3bbc0c71dfc5293a3fe0d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b6b7996a3357bd94a30b8bdcaadb2e93.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/3a01a1be766752bfbe2ec71c40be484f.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/3839847c70d2e5c97645d5f0728ef442.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/05c4708daa719b4b6a3f289381de142d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/5e84f68b4a88fcfadecebbce80860d0e.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/baf36d7da77be336ae9b20dba92a3fe2.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/cf48c3e0d0c060c4d4d46e38fba64e4d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/3afa663ff27c25e6111efccff0dbbf61.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/2454f8c4e4a831e23d55f64a1a15f88c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/38227fb3aa0475b1457096dca426d0de.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/dfe109e13279ac8ab6278ab3b9e4f255.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/cbe32f871cebb9ad68bea22513b2501d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/09abc7203b3e069c3da92e927e60ba71.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/606e638e03b5329e66ebeb395f90708b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d1052507a9beaa90e1774d3aac6488dd.jpeg)
“The job gap Canadian industries are experiencing across the board means that Canada as
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d99e15072da52ba094a60056ea7835ff.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/bea46fb8b4a3949aebe1c40c025c67fb.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/83f24f4c1156b64b0b171674892a2fb4.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/8dbb5701a47df743fd5ac6559ca348d4.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/a5f94be2cf7e43e627161fc3a687443c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e39afb7eddc9fc60bf22ee5d7995a401.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/6b6dc7ccf3f506f486efc80c66a6ce5d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f164dec74e5158d287a3bee5d56b7c7c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e6e68a3feaaff10d8523deda22ce4b8d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b895ffae57ba993751a7a4017b066156.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/c4b3cc083f122b450bb173a214fce93e.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/034f0235849438d458b8613343fceadc.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/bc072ca10ed9d7cb30d812a7aff0c3bd.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/652fc1d1543c12e4202ba8862e1fbe9b.jpeg)
TECHNATION has been advising on Lassonde School of Engineering at York University's work-integrated degree program in Digital Technologies, a first in Canada. Students earn a salary while working with the same employer throughout the fouryear degree and 20 per cent of their student worktime is allocated for academic learning — delivered in intensive, year-round blocks. This program is expected to produce many cybersecurity analysts and other cyber professionals. It’s an innovative program to
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/abbf12a2dc794d59771e00d33f62f0c6.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/c137466b76e15bc93973808ba2507bd9.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/cb10348c17e611783d8b37b442776ef6.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/8a2e4288113112da595b0f7c9c7e93c7.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/c1a3f2709ddb1bd8e1fbc72c2fb3d66d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/17b25786adc6f45da2f559e519c9d734.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1df7a430e4d000fe988a08b160056fca.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/9eb8a4144d71445d6a15e68e05096026.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/290b44e6d2d74d686def518590d4bb11.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/87fb0573c7752ace97bafa4de17ac6eb.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/5d2193310ebaa5bd1c3905ab472fdf28.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/7d89df00b6e1d1821a7d4902c8bc9bb7.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e355131d23c1aa99431d9bbe36175799.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/a458e0f2e62331887d2ed28a6eb37cee.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ceac7779f38fbae24257b816f640bb21.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d728fa08fdbac450e8fddcc626cbdc0d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/db8519efe027170aa9b4d2d2fb36d99b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/6cba8edf0b9393a4db16159023976c4f.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/a722eba808b80625edae1f5fc4231dae.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/8d94c65d4cb82109c3f1070d5fc27da0.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b271558504ac12a0b9b3739e451616db.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/777c2195f25e480b0f641c693abdbebd.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/8b2e0c4475cadd17c01313678204943e.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/0ec7f2c968497be05bff11814cf6e586.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b8a8fdaa0e3d3dc11be48c56ddf08f77.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/4fe67b6e2d007f856be431881783677a.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/76e1e1dac167340fa3c19ee2d3e06a2f.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/965decf6179a4742a7eb40f011ecc7a7.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/30b322792e27491dbec67204cc4c046b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/06881302243256c4096be88fa697fc31.jpeg)
Rising cybercrime presents a tremendous challenge to Canadian businesses and government, but the skyrocketing demand for cybersecurity professionals also presents a tremendous economic opportunity. TECHNATION and its partners are hard at work finding innovative ways to meet this challenge and opportunity in ways that benefit Canada, Canadian businesses, and Canadian workers.
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/33fd78c50532754109cd176553523ddd.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ed5c1fd8633d0dfe5d26cfe98cb76089.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/2bba701bedb1ca6fd344993e4ccbc70b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/7e5ceb87539887d8662b1be09e6ef0f0.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/6cb589d953194dae1c6fdf9a36394a94.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/82daa3c9c5cca5a802507fbbf5839b90.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ccb5ebc58236164f33d01dae2b12e933.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/8dcbb1e2b7bb9a324d31a7fc94dece0c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/bf03e3615b45289f5fdfba3e3acd573b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/482dc34b38105de60dd61cdbf5d0f576.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/9b58c9dfbb3f388e497d6d42edf9b0ca.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/02e3f2bd3631df25ef8cc2d214b0f6d6.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/145f260de248a3289446ae5b6ec8ca1d.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/426d8de9876aa7fc9475ba150b57679f.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/2762877a4a36adf060f1d79901ce6284.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/22f3ee28f7d4b3df86fc155844e81b11.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/913a475d63fde0f839b1ad5a8270bca8.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b41361db7b514d729651e228840010e5.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/7978a97f0f0639cc1c8d4538034d4575.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ba2fdf944f9cb97b16ddf599aafd5ba5.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/cf56e2c94ce0d856a784c44ba95b8303.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/63d583f8d9823987259d6b3d012487f8.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/f6593c6eb3a3dd10001fec9cab440aaa.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ec8720c2ce3c9b48a009aae98c8687d9.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/9ac47f73627dc60f9f2c9e0e906c4fb4.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/e91cd7588604f599c611505be740cc09.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/4d4f3b22ed538f977e6f35b948d06bd8.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1762c1819697cb58c6ec4954f513dd30.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d7c3278f2e475174fd832bc7b6a68e2e.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/670f3cd5f92430dccbe8d77afb2e3eff.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/67a36f9a8397091085f2ae8850c877d9.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/aa6ce1222becc184aa56acf6befe1d67.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/9cc798fbdbc52dfa8348490417ab5155.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ecc78861d4a65310aa7c324c963e378b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/1a6ee3c437a613adb51ef66afa641bc2.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/8518f492fbd70dae336336ef553e19ea.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d9f57a45a420725b90361cfa7c6693c0.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/6d36531c2ac9f5f971185a665b451a2a.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/2000846d1979b93810f0e4130dbc6dda.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/54f8e5d52e0ca6f3d5be001eb45ff19a.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/a8492f44f8607eae0cfc86284060046c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/90c4229839d622bf8e9a0747f7612f8b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/13a4ed9c3b691f9043892112de90667e.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/c6c0e8eade8eb611b7863d3eb43ffc3b.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/59b380edadcf6c151e363e9600a3fc9a.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/87bab61d9734782790b6eb94933e1261.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ad8b8d9c9b0ee7ab2f5cacb1ba2f2258.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/ffcf5b44174645bae0ac425a6f7f6df8.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/33165922f413575620cb82dda8e56360.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/278e8795b31e74c1d3214249f41ebd90.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/d5875841d0d6ff440611cb54d675d71c.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/971514ef57e01a93dfd477bcbc363f27.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/b167667da27f79a2d48fc1a91e54bd13.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/6b2050fecba384559f7464db77a165ad.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/3d57be80662d5a5576edc297bb5cfb75.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/7cb6a9295a80eb7cb9366dfd9eb8c364.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/001af39cbb5a7ad5ee74709be13dc4c4.jpeg)
![](https://assets.isu.pub/document-structure/250110161340-17220a7f6b0b64a00a3a3519a2ecd453/v1/23b39b149e17c6b3d5fc27fb8fc997cd.jpeg)
When security, privacy, and data management services (people undertaking process with supporting technology) work in harmony as part of a cohesive cyber framework, the organization moves from the tactical to the strategic.
What the Convergence of Cyber Risk Means for Your Business
“What’s next?” — The question plaguing businesses trying to manage corporate cyber risk. Complexity and risk are increasing as the domains of security, privacy, and data management converge. This is the convergence of cyber risk.
Keith Jonah
Businesses that don’t adapt to this new reality can face dire consequences: business-risk decisions made in isolation will drive up costs through redundancy and inefficiency. Projects initiated without context won’t deliver the highest return on cyber investment, nor address the most pressing corporate needs. As the lines between security, privacy, and data management dissolve, a decision in one area can affect multiple aspects of the enterprise.
Bringing order to chaos
But this “Convergence of Cyber Risk” creates opportunities as well. Adopting a holistic view of cyber breaks down the traditionally siloed areas of security (information technology, operational technology, internet of things, and more), compliance, business continuity, third-party/supply chain management, personnel, and privacy risk. Taking a riskbased approach — rather than chasing the latest technology or a flashy point solution — brings order to chaos. Security, privacy, and data management initiatives can be driven by well-coordinated and defined corporate requirements and shaped to address all cyber legislative/regulatory requirements, governance, corporate policy, industry standards, and control objectives. When security, privacy, and data management services (people
undertaking process with supporting technology) work in harmony as part of a cohesive cyber framework, the organization moves from the tactical to the strategic.
A new era equals new opportunity
The starting point for a comprehensive cyber program is “by-design” compliance with regulation and legislation. Then, applying a risk management paradigm ensures that the organization addresses real-world risks cost-effectively and balances those risks against other critical organizational imperatives, such as ensuring timely, effective, and efficient services.
ISA Cybersecurity’s Cyber Management Consulting (CMC) practice helps businesses benefit from the convergence of cyber risk. CMC is led by some of the most accomplished and experienced experts in Canada and backed by an extensive network of cyber professionals developed over 30 years in the business. We ensure appropriate rigour and internationally-recognized techniques are applied to the analysis and management of security, privacy, and data management risk and the development of programs and solutions. We can help you decide, “What’s next?”