What is The Canadian Institute For Cybersecurity & Why Does It Matter?

There was a time when cybersecurity was a thing that everybody could tackle exclusively on their own terms. Those days are now far behind us. The modern enterprise threat surface is larger than ever, and hackers grow increasingly sophisticated. Amidst such a landscape, organizations like the Canadian Institute for Cybersecurity are critical.   By Brad Litwin

I will not mince words - the challenges surrounding modern cybersecurity are not addressable by any one business, no matter how extensive its budget. Dealing with the sophisticated hacks, massive threat surfaces, and advanced attack vectors that have grown increasingly common of late requires a collaborative and multidisciplinary effort.

That’s precisely where the Canadian Institute for Cybersecurity comes in. Based at the University of New Brunswick in Fredericton, the institute brings together experts and researchers from multiple fields including social sciences, business, computer science, engineering, and law. It is the first institution of its kind to take such a multidisciplinary approach to cybersecurity - and it’s all the better for it.

More importantly, one of the CIC’s core goals is to address the looming global cybersecurity talent shortage, an issue for which there is currently no end in sight.

“While information and communication technologies provide an unprecedented number of tools and applications to collect, analyze and manage this data, security and privacy remain major concerns,” reads a section on the CIC’s website. “It’s clear a new, multidisciplinary approach is needed.The CIC will work across disciplines to create and cultivate a national network of research talent from industry, the user sector, academia, and government to examine and address internet security, privacy and trust.”

Thanks in no small part to the CIC’s influence, New Brunswick has become a leader in Canadian cybersecurity. A burgeoning center of innovation and development in the field. A hub of research and collaboration. This is all well and good, but what does any of it have to do with your organization? Joining the CIC means access to support from Canada’s top cybersecurity researchers. It means an opportunity to contribute to the development of cutting-edge security innovations, and a chance to guide the future of cybersecurity in Canada.

But more importantly, the CIC itself provides a model for how all organizations should approach cybersecurity both externally and internally. You may need to take your competitors down in order to dominate the market, certainly. But when it comes to defending against hackers and cybercriminals, you’re all on the same team - or at least, you should be.

It’s possible to collaborate on cybersecurity without sharing trade secrets. It’s possible to work together against hackers without anyone gaining a competitive advantage against anyone else. It’s possible to be both competitors and allies.  That’s one takeaway from the CIC. The other involves your internal approach to cybersecurity. Just as you must encourage collaboration between your organization and its competitors, you must also enable collaboration between departments within your own organization. Cybersecurity is no longer the sole purview of the IT department - it’s everyone’s problem.You need to approach it as such within your own organization. Involve everyone in talks about the development, selection, and deployment of new security solutions. Integrate new software and platforms based as much on business needs as security needs. Foster a culture of cybersecurity, one in which everyone does their part to protect your business’s most valuable assets. 

The CIC is an important fixture in Canada’s cybersecurity landscape - not just because of the innovations it works to promote, but because of the lessons it represents. Whether your organization is based in Canada or abroad, it’s important to take those lessons to heart, and to either work with the CIC itself or a similar agency. 

About the Author: Brad Litwin is the Marketing Manager at A2 Hosting, a high-performance web hosting provider. Brad’s experience ranges from PPC management to social media management. For more great content, you can follow A2 Hosting @a2hosting on Twitter.

You Might Also Read:

No Easy Button Solution To Cybersecurity’s Skills Shortage:

 

 

 

« Naval Hacker Team To Fight Drones
A Snapshot Of Cybercrime In The UK »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

CPP Group UK

CPP Group UK

CPP Group UK develops products to help insurers add further value to their products and services through its innovative suite of new products in FinTech, InsurTech and cyber security.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.