Spear Phishing in Critical Infrastructure: Potential Applications of Mixed Methods Action Research

“Amateurs hack systems, professionals hack people.”  – Bruce Schneier, American cryptographer and writer. AbstractIntroductionThe Problem: Spear PhishingA Potential Solution: Mixed Methods Action Research (MMAR)Problem + Solution: MMAR and Spear PhishingConclusionReferences Abstract Spear phishing is a growing attack vector in critical infrastructure sectors. The majority of cybersecurity literature focuses on presenting technical Read more…

Cybersecurity Culture: A Definition and Maturity Model For Critical Infrastructure

“If you get the culture right, most of the other stuff will just take care of itself.” – Tony Hsieh, CEO of Zappos Abstract As the world becomes more interconnected, cybersecurity continues to be a growing concern in critical infrastructure environments. Neither policies and procedures nor technical solutions can consider all Read more…

The Challenge of Digitizing Services

IntroductionMacroeconomic LevelUnclear Definition And Measurement Of Digitization.Lack Of Digitization Impact Assessment Tools.Policy Imperatives Focused on Taxation of ICT. Microeconomic Level Digitizing Services: Fragmentation Digitizing Services: Resistant CultureDigitizing Services: Change ManagementDiscussionConclusion: Digitizing ServicesReferences Introduction The challenges of digitizing services are multiple; however, the benefits are considerable if successful. It has been called “one of Read more…

Economic Cyber Espionage: Issue Definition and Potential Policy Intervention Points in Canada’s Science, Technology, and Innovation & Cybersecurity Strategies

Introduction1.1       Objective1.2       Organization of the DocumentEvaluation Framework1    Key Definitions1.1       Defining Economic Cyber Espionage1.1.1        Espionage, Industrial Espionage and Economic Espionage1.1.2        Cybercrime1.1.3        Economic Cyber Espionage2    Problem Definition and Identification2.1       Impact of Economic Cyber Espionage in Canada2.1.1        Canadian Example: Nortel2.1.2        Implications for Risk Management: Government Funding2.1.3        Technology and Business Innovation Impact2.2      Read more…

The InGenuity Group Mentors Canada’s Future Cyber Professionals: Digital Youth Summit 2015

While the digital age has brought with it a wealth of technological boons, it has also been plagued by unique challenges and obstacles. Towards the end of National Cyber Security Month (October) in 2015, the Information and Communications Technology Council (ICTC) and MediaSmarts gathered together industry experts and 200 secondary Read more…