Views Navigation

Event Views Navigation


Are you prepared for a breach? A virtual tabletop webinar

Attack and Defense Webinar Series: Episode 3 Do you know how your team would react to a data breach? Set clear expectations, responsibilities and establish procedures to guide your team through the process. With clear directions, your team can effectively minimize loss from incidents. In this webinar, Tyler Hatch, Founder of DFI Forensics and Michael...

How to enable and secure work within your distributed teams

As your business grows, building a great culture, finding flow and ensuring security in your digital environment are becoming more crucial. If you don’t have the right tools and tactics to enable secured and efficient collaboration within your distributed team, your business can run into unnecessary risks.

Addressing challenges in the cloud

Traditional approaches to cloud compliance are not effective anymore. Adopt new cloud security tools, technologies and automations to meet today’s growing security demands.

How to create a cyber resilient business

As a business leader, one of the worst nightmares is becoming a victim of a cyber attack. A cyber attack can erase all the hard work you’ve put into the business throughout the years in a split second.

How not-for-profits should tackle cybersecurity

No matter the size of an organization, for-profit or not-for-profit, all businesses should be protected online by implementing cybersecurity measures. Compared to for-profits, not-for-profits may need a different security approach and focus than other organizations. Michael Argast, CEO and Co-Founder of, and Helen Stortini, Executive Director of Social Venture Partners Vancouver, will be hosting a webinar to go through...

Reduce data breaches: Implement best practice web app security testing

Advancements over the last decade in web technologies have reshaped the software landscape and have evolved traditional desktop software into web applications.  This transition has several advantages, but security has also become more critical than ever before. Verizon's latest data breach incident report states that web applications have become the number one form of breach....

Warfare and Digital Identity – The Impact on the Digital Economy

Cyber Warfare is the silent war that is taking place without the public knowing about it. Cyber warfare has the potential to wreak havoc on people’s accounts, infrastructure and critical systems. With the changing cyber attack landscape, it is critical that organizations approach cyber risk methodically and invest in controls that protect their people and core assets. Join Miki Fukushima, Security Program Lead of on June 15.

Going Passwordless: The Future of Cybersecurity

Increasing cyber threats and poor password hygiene continue to pose risks to organizations using passwords. Passwordless authentication strengthens security by eliminating risky password management practices and reducing attack vectors.

What SMBs Need to Know about Bill C-27?

In today’s economy, organization competitiveness depends on the ability to use digital innovation to harness the power of data. Data privacy and security have since become one of the defining social issues of our era.

Reducing Cybersecurity Risks with a Developer-first Security Approach

Cloud-based business creates efficiencies and cost-savings, but may also provide an attractive target for threat actors. Developers need to shut these doors and secure them using a developer-first security approach. Security testing can no longer be something done after the code is produced. Security needs to be integrated into every aspect of a DevSecOps approach to secure application development.