Canada's new Digital Charter Implementation Act, also known as Bill C-11 has significant ramifications for Canadian businesses and cybersecurity.
The act composed of three new acts focuses on privacy, data protection and artificial intelligence.
Subscribe to receive your full 29-page educational e-book.
Learn how to secure your accounts, devices and connections to maintain strong cyber safety best practices. Your online accounts contain a lot of information about you. Make sure that the information stays where you want it to by keeping your accounts secure. Visit https://getcybersafe.ca to learn more about free resources.
Watch, participate and learn with the NCSC’s interactive video and supporting resources for 11–14 year olds.
Young people are growing up in an increasingly digital world, exposing them to both the opportunities and risks of the internet.
CyberFirst: How to stay secure online highlights some of the most common cyber scams and malicious activity that a pre-teen and teenage internet user might come across and empowers them to make choices to keep themselves more secure online.
The videos are supported by three lesson plans together with delivery guidance and subject matter factsheet. The materials are all quality assured by the PSHE Association.
Practitioners working with 11–14 year olds can use these materials to build on the subjects introduced in the video and start conversations with students about online security. The activities will help students to get an actionable understanding about how to keep themselves more secure online.
5 Tips To A Successful Diversity Program
See yourself in cybersecurity. You don’t need experience — just the passion and drive to enter a demanding and rewarding field, one that opens limitless opportunities worldwide.
To help close the cybersecurity workforce gap and diversify (ISC)² is offering FREE training and certification to one million people.
ICS2 Certified Cloud Security Professional (CCSP) Flash Cards
Chapter 1 - Cloud Concepts, Architecture, and Design
Chapter 2 - Cloud Governance - Legal Risk, and Compliance
Chapter 3 - Cloud Data Security Domain
Chapter 4 - Cloud Platform and Infrastructure Security
Chapter 5 - Cloud Application Security
Chapter 6 - Cloud Security Operation
The Ultimate Guide for Certified Cloud Security Professional (CCSP) (pdf)
DownloadCCSP ISC2-Exam-Action-Plan (pdf)
DownloadIWCD 2022 Digital Safety for Older Adults (pdf)
DownloadPart 1 What is Cybersecurity - Cybersecurity For Beginners (pdf)
DownloadPart 2 History of Cybersecurity - Cybersecurity For Beginners (pdf)
DownloadPart 3 Cybersecurity Basics - Cybersecurity For Beginners (pdf)
DownloadPart 4 Cyber Terminology - Cybersecurity For Beginners (pdf)
DownloadPart 5 Privacy - Cybersecurity For Beginners (pdf)
DownloadPart 6 Shoulder Surfing - Cybersecurity For Beginners (pdf)
DownloadIntroduction to Threat Hunting (pdf)
DownloadMentor Monday Presentation (pdf)
DownloadWCS2 Career Development Plan Workbook v2 (xlsx)
DownloadCheck out this excellent resource to find cybersecurity courses across Canada.
Did you know you can check if your Anti-Malware program is working?
1) Download and save file to desktop as eicar.txt
2) Update and run your AV program
3) Your AV should detect the .txt as if working.
4) If not, reinstall AV program
How to use Wireshark for threat hunting exercises. Examine two use cases:
1) How to detect unauthorized access
2) Examine a USB for malicious activity.
Give customers a reason to do business with you.
This study is being conducted by the Women CyberSecurity Society (WCSS) which is a registered non-profit organization dedicated to providing support and resources to women in the cybersecurity industry. Our goal is to aid in the retention and recruitment of women in the cybersecurity workforce. In order to do that, we need research that records the issues, challenges, and barriers that discourages women from entering and sometimes remain in the industry.
This survey also examines demographic information as well as inherent bias, lack of diversity & inclusion, and lack of support.
The results of the survey will be posted here in the coming months once the research project has completed.
If you wish to collaborate with us in this research, please email us at contact@womencybersecuritysociety.org.
Part 1 - What is Cybersecurity?
The Women CyberSecurity Society fosters meaningful and safe spaces for online and local events to members of the community. Please review our Code of Conduct and abide by the rules when interacting with our members, visitors and attendees during events at all times. Violations may result in being banned from events and or removal of your membership privileges.
Thank you for respecting our community!