What is The Canadian Institute For Cybersecurity & Why Does It Matter?

There was a time when cybersecurity was a thing that everybody could tackle exclusively on their own terms. Those days are now far behind us. The modern enterprise threat surface is larger than ever, and hackers grow increasingly sophisticated. Amidst such a landscape, organizations like the Canadian Institute for Cybersecurity are critical.   By Brad Litwin

I will not mince words - the challenges surrounding modern cybersecurity are not addressable by any one business, no matter how extensive its budget. Dealing with the sophisticated hacks, massive threat surfaces, and advanced attack vectors that have grown increasingly common of late requires a collaborative and multidisciplinary effort.

That’s precisely where the Canadian Institute for Cybersecurity comes in. Based at the University of New Brunswick in Fredericton, the institute brings together experts and researchers from multiple fields including social sciences, business, computer science, engineering, and law. It is the first institution of its kind to take such a multidisciplinary approach to cybersecurity - and it’s all the better for it.

More importantly, one of the CIC’s core goals is to address the looming global cybersecurity talent shortage, an issue for which there is currently no end in sight.

“While information and communication technologies provide an unprecedented number of tools and applications to collect, analyze and manage this data, security and privacy remain major concerns,” reads a section on the CIC’s website. “It’s clear a new, multidisciplinary approach is needed.The CIC will work across disciplines to create and cultivate a national network of research talent from industry, the user sector, academia, and government to examine and address internet security, privacy and trust.”

Thanks in no small part to the CIC’s influence, New Brunswick has become a leader in Canadian cybersecurity. A burgeoning center of innovation and development in the field. A hub of research and collaboration. This is all well and good, but what does any of it have to do with your organization? Joining the CIC means access to support from Canada’s top cybersecurity researchers. It means an opportunity to contribute to the development of cutting-edge security innovations, and a chance to guide the future of cybersecurity in Canada.

But more importantly, the CIC itself provides a model for how all organizations should approach cybersecurity both externally and internally. You may need to take your competitors down in order to dominate the market, certainly. But when it comes to defending against hackers and cybercriminals, you’re all on the same team - or at least, you should be.

It’s possible to collaborate on cybersecurity without sharing trade secrets. It’s possible to work together against hackers without anyone gaining a competitive advantage against anyone else. It’s possible to be both competitors and allies.  That’s one takeaway from the CIC. The other involves your internal approach to cybersecurity. Just as you must encourage collaboration between your organization and its competitors, you must also enable collaboration between departments within your own organization. Cybersecurity is no longer the sole purview of the IT department - it’s everyone’s problem.You need to approach it as such within your own organization. Involve everyone in talks about the development, selection, and deployment of new security solutions. Integrate new software and platforms based as much on business needs as security needs. Foster a culture of cybersecurity, one in which everyone does their part to protect your business’s most valuable assets. 

The CIC is an important fixture in Canada’s cybersecurity landscape - not just because of the innovations it works to promote, but because of the lessons it represents. Whether your organization is based in Canada or abroad, it’s important to take those lessons to heart, and to either work with the CIC itself or a similar agency. 

About the Author: Brad Litwin is the Marketing Manager at A2 Hosting, a high-performance web hosting provider. Brad’s experience ranges from PPC management to social media management. For more great content, you can follow A2 Hosting @a2hosting on Twitter.

You Might Also Read:

No Easy Button Solution To Cybersecurity’s Skills Shortage:

 

 

 

« Naval Hacker Team To Fight Drones
A Snapshot Of Cybercrime In The UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.