siberX

siberX

Computer and Network Security

Vaughan, Ontario 9,513 followers

#WeAreCyber #siberXchange

About us

siberX delivers cybersecurity events and experiences globally. Backed by an advisory board of leading cybersecurity experts, siberX delivers in-person, virtual and hybrid experiences through conferences, workshops and digital gaming scenarios. Keeping in trend with new engagement models, siberX also curates a dedicated online cybersecurity community, www.siberxchange.ca, delivering 24 x 7 LIVE and on-demand content, gamified engagement a virtual store.

Website
http://www.siberx.org
Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Vaughan, Ontario
Type
Privately Held
Founded
2017
Specialties
Training, Workshops, Cyber, Training, and SecurityAwareness

Locations

Employees at siberX

Updates

  • View organization page for siberX, graphic

    9,513 followers

    Happy Canada Day! 🎉🍁 As we celebrate this beautiful country, let's take a moment to honour the rich history and enduring contributions of Indigenous peoples. Did you Know: The name "Canada" originates from the St. Lawrence Iroquoian word "kanata," meaning "village" or "settlement." Canada’s foundation is deeply intertwined with the cultures, traditions, and histories of First Nations, Métis, and Inuit communities. Today, we encourage everyone to listen, learn, and reflect on the stories and experiences of Indigenous peoples. Understanding our shared history is essential in our journey toward reconciliation and building a more inclusive and respectful nation. At siberX, we are committed to fostering an environment where diversity and equality thrive. We believe in the power of education and dialogue to create a better future for all Canadians. Wishing you a reflective, mindful, and secure Canada Day! 🎆🔒 #CanadaDay #IndigenousHistory #Reconciliation #Diversity #Inclusion #Cybersecurity #siberX #StaySafe

    • No alternative text description for this image
  • View organization page for siberX, graphic

    9,513 followers

    🎉As we gear up for a fantastic Canada Day🍁long weekend, remember that mindfulness and taking a mental break are just as crucial as staying digitally safe. Unplug, relax, and recharge your mind! As you enjoy this long weekend, here are some tips to keep you and your loved one's safe: 🔒 Secure Your Devices: Use strong passwords and lock your screens when not in use, especially while travelling. 🛡️ Update Your Apps: Make sure all your devices and applications are up-to-date to prevent security vulnerabilities. 📱 Mind Your Social Media: Be cautious about sharing your location and personal information online. 🚫 Watch Out for Scams: Be wary of suspicious links, emails, and messages that could be phishing attempts. 🌐 Use Secure Connections: Avoid using public Wi-Fi for sensitive transactions; consider using a VPN for added security. Enjoy the break, and stay safe both online and offline- wishing everyone a joyful, mindful, and secure Canada Day weekend! 🍁 #CanadaDay #Cybersecurity #Mindfulness #StaySafeOnline #TravelTips #DigitalSafety #WeAreCyber

    • No alternative text description for this image
  • View organization page for siberX, graphic

    9,513 followers

    3 days, 10 modules, 21 sessions—on behalf of all our defenders, THANK YOU for joining the inaugural Operation: Defend the North! Your posts and key takeaways continue to inspire us all. In his closing remarks, host Ali Abbas Mehboob Hirji left us with a powerful statement: "Yes, the power is back. But, for how long? With this uncertainty, I invite you all to rise up and defend the north" There is still work to do, and together, we will continue to build our defences. Mark your calendars for Fall 2024 as we continue with Operation: Defend the North. Stay tuned for updates, including our reports and whitepaper, by following us here on LinkedIn or visiting siberx.org. Earning CPE credits? Complete this form: https://lnkd.in/ggzGdnEV #wearecyber #defendthenorth #collaboration #cybersecurity

    • No alternative text description for this image
  • View organization page for siberX, graphic

    9,513 followers

    And with our lessons learned and closing session, the inaugural Operation: Defend the North comes to a close. Joining us for this closing session were Terry T Kush Sharma Kelley Irwin Ali Shahidi Mark Dillon Ali Abbas Mehboob Hirji Amit Chopra Graeme Barrie George A. Octavia N. Howell, CISSP, GSLC Sumon Acharjee Lina Dabit Roozbeh Taheri-Nia Rachel Babins Bryan McCaffrey The top 5 takeaways from this session were: 1. Realistic scenario walkthroughs reveal the need for more rigorous training and support systems for operators. Continuous training, simulations, and proactive coaching are essential to ensure everyone knows their roles and responsibilities, bolstering confidence and effectiveness during real incidents. 2. Recovery from cyber incidents involves more than just restoring services; it requires addressing the lingering effects on systems and people. Comprehensive recovery plans should extend beyond immediate restoration, ensuring long-term resilience and support for those impacted. 3. Consistency in strategy, well-documented procedures, and ongoing training are crucial for maintaining robust defences. Additionally, having offensive capabilities alongside defensive measures is vital for responding to nation-state attacks, requiring coordination with national security agencies. 4. Cybersecurity requires global collaboration, similar to natural disaster training. Public training and awareness build resilience, and AI can help identify vulnerabilities. Public understanding of cybersecurity threats and their geopolitical impacts is essential for effective preparation and response. 5. Cybersecurity involves layers of security, including fraud prevention, physical security, and misinformation management. A holistic approach that integrates disaster recovery with incident response ensures preparedness for immediate and long-term needs. Continuous education and training are vital for maintaining a strong security posture and adapting to evolving threats. #wearecyber #cyberbreach #simulation #cybersecurity #conference #defendthenorth

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +6
  • View organization page for siberX, graphic

    9,513 followers

    Penultimate session! Module 7: Cyber Threat Escalation and Recovery, Restoration Our defenders are preparing for escalating cyber threats and secondary attack scenarios, focus on recovery strategies and restoring critical services post-cyber crisis. Joining us for this session were Terry T from Canadian Security Intelligence Service (CSIS) | Service canadien du renseignement de sécurité (SCRS), Kush Sharma Kelley Irwin Ali Shahidi from Toronto Community Housing Mark Dillon from Enova Power Corp. Ali Abbas Mehboob Hirji Amit Chopra Graeme Barrie from Netmechanics George A. from ruby Octavia N. Howell, CISSP, GSLC from Equifax Canada Sumon Acharjee from City of Markham Lina Dabit from Royal Canadian Mounted Police | Gendarmerie royale du Canada Roozbeh Taheri-Nia from CPP Investments | Investissements RPC Rachel Babins from Bell and Andrew Grealy and Michael F. from Armis 📅 Visit siberx.org/defendthenorth to join us for the FINAL sessions of Defend the North! The top 5 takeaways from this session were: 1. Indications of ongoing attempts to attack systems highlight the need for heightened vigilance and continuous monitoring. This includes identifying and mitigating attempts before they cause further damage and ensuring thorough risk assessments to close any gaps identified during the initial attack. 2. Focus on fortifying defences against future threats by anticipating potential attack vectors and strengthening the security posture. Identifying Indicators of Compromise (IoCs) and understanding threat actors' objectives and motivations are crucial for effective threat attribution and prioritizing areas needing immediate attention. 3. Prepare for prolonged engagements with threat actors by enhancing monitoring and implementing additional security measures to detect and neutralize complex Tactics, Techniques, and Procedures (TTPs). Implementing a 1+1 rule and recognizing distraction events help identify when an incident is resolved and prevent secondary attacks. 4. Consider the interconnected nature of systems and the broader impact of secondary attacks on various industries. Opportunistic threat actors may exploit the chaos of the first incident, so understanding these dynamics and implementing robust safety measures and clear communication can mitigate further attacks. 5. Foster strong relationships with partners, ensuring open communication and collaboration to respond effectively to threats. Continuous collaboration and assessment of partners' roles and potential vulnerabilities are essential. Focus on restoring systems correctly, utilizing experts to address vulnerabilities thoroughly, and maintaining readiness for potential repeated attacks. #wearecyber #cyberbreach #simulation #cybersecurity #conference #defendthenorth

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +2
  • View organization page for siberX, graphic

    9,513 followers

    Module 6: Misinformation Management and Public Trust Restoration This session ignited a lot of great conversation in the chat! Our speakers tackled the challenges of misinformation during crises and strategies for rebuilding trust. Joining us for this session were Terry T, Bryan McCaffrey Kush Sharma Kelley Irwin Ali Shahidi Mark Dillon Ali Abbas Mehboob Hirji Amit Chopra Graeme Barrie George A. Octavia N. Howell, CISSP, GSLC Sumon Acharjee Lina Dabit Roozbeh Taheri-Nia Rachel Babins 📅 Visit siberx.org/defendthenorth to join us for the final few sessions of this one-of-a-kind experience. The top 5 takeaways from this session were: 1. Clearly explain the nature of the attack and the specific measures being taken to address it. This helps alleviate public anxiety, maintain trust in response efforts, and prevent misinformation from filling the void. 2. Treat misinformation with the same urgency as the incident itself. Proactively counter misinformation by providing clear, accurate, and frequent updates to the public. Educate citizens on critical thinking and encourage them to rely on trusted sources. 3. Government decisions should be based on the best available information, and transparency is crucial. Admit mistakes and correct misinformation promptly to maintain public trust. Learn from past crises, like the COVID-19 pandemic, to improve communication strategies. 4. Increase public awareness about how social media algorithms can amplify misinformation. Educate the public on critical evaluation of information and the psychological vulnerabilities that threat actors exploit. Implement mechanisms to monitor and mitigate misinformation in real-time. 5. Ensure organizations are prepared for incidents through tabletop exercises and established communication protocols. Develop consistent and intentional messaging from trusted sources to counteract misinformation. Engage with media organizations to extend the reach of accurate information and build strong relationships for effective crisis communication. #wearecyber #cyberbreach #simulation #cybersecurity #conference #defendthenorth

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +5
  • View organization page for siberX, graphic

    9,513 followers

    Module 5: Cross-Border Impact Our speakers navigated the complexities of cross-border cyber repercussions and collaborative responses. Joining us for this session were Rob Wilson Kush Sharma Kelley Irwin Mark Dillon Ali Abbas Mehboob Hirji Jack Brooks George A. Octavia N. Howell, CISSP, GSLC Sumon Acharjee Lina Dabit Roozbeh Taheri-Nia Rachel Babins Osman Saleem 📅 Visit siberx.org/defendthenorth to join us for the final few sessions of this one-of-a-kind experience. The top 5 takeaways from this session were: 1. Establish robust intelligence-sharing networks among partners to facilitate swift recovery. Ensure coordinated efforts across borders, leveraging federal partnerships and collaborating with international partners to enhance security and manage the interconnected nature of supply chains and critical infrastructure. 2. Develop clear action plans and protocols for maintaining transport, processing passengers, and logistics. Prioritize coordination with primary partners like the US, which can provide significant assistance, ensuring that essential sectors remain functional for order and continuity of services. 3. Advocate for regulatory frameworks that mandate third-party risk assessments and provide guidelines for businesses to follow. Implement proactive cybersecurity measures, including regular audits and updating controls, to enhance resilience against future threats and ensure compliance with evolving standards. 4. Incorporate human factors into emergency response planning, ensuring coordination efforts address psychological and social impacts. Develop clear communication protocols and assign responsibilities to prevent misinformation, maintain security, and ensure consistent messaging during crises. 5. Develop a national strategy to address nation-state attacks, integrating mechanisms and policies to guide responses. Strengthen collaboration with international allies like the US and plan for gradual improvements in capacity, recognizing current limitations and working towards a stronger security framework over time. #wearecyber #cyberbreach #simulation #cybersecurity #conference #defendthenorth

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +4
  • View organization page for siberX, graphic

    9,513 followers

    #HappeningNow Module 4C: Impact on Travel, Tourism & Hospitality We are examining cyber impacts on travel industries and strategies for rapid recovery. Joining us for this session are Nadir Izrael Kush Sharma Kelley Irwin Mark Dillon Ali Abbas Mehboob Hirji Jack Brooks George A. Octavia N. Howell, CISSP, GSLC Sumon Acharjee Lina Dabit Roozbeh Taheri-Nia Rachel Babins Osman Saleem Michael F. 📅 Visit siberx.org/defendthenorth to learn more and sign up for FREE for this one-of-a-kind experience. The top 5 takeaways for this session are: 1. Quickly disseminate information about the power outage and supply chain attack to relevant stakeholders. Implement isolation protocols to prevent further spread, and emphasize the importance of information sharing with partners for effective containment and recovery. 2. Conduct thorough audits of access points to identify and address missing controls. Implement stricter access control measures to mitigate vulnerabilities and prevent similar attacks in the future. Regularly update and test these controls to ensure they remain effective. 3. Develop multilingual communication strategies to inform visitors accurately and timely about travel and safety, especially in rural areas with diverse linguistic needs. Collaborate with local tourism boards to manage the impact on tourism and hospitality sectors. 4. Prioritize collecting and analyzing intelligence related to threat actors and their targets globally to stay ahead of potential threats. Develop stringent third-party risk assessment protocols and ensure regular evaluations of suppliers to mitigate supply chain risks. Advocate for regulatory frameworks to standardize security measures. 5. Implement proactive cybersecurity strategies, including regular penetration testing, detailed incident response plans, and continuous learning. Develop industry-specific recovery checklists and standard playbooks to enhance resilience. Support small businesses with government grants, training programs, and partnerships to manage risks effectively. #wearecyber #cyberbreach #simulation #cybersecurity #conference #defendthenorth

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +5
  • View organization page for siberX, graphic

    9,513 followers

    And we're off with a kick-off and opening, including a special address from The Honourable Ahmed Hussen, Minister for International Development. Joining us for this session were Ali Abbas Mehboob Hirji George A. Mark Dillon Jack Brooks Kush Sharma Nadir Izrael Osman Saleem Rachel Babins Michael F. Lina Dabit Roozbeh Taheri-Nia Sumon Acharjee Octavia N. Howell, CISSP, GSLC Kelley Irwin If you haven't already, it's STILL not too late to join! Register for FREE at siberx.org/defendthenorth #wearecyber #cybersecurity #conference #defence #defendthenorth #simulation #cybersecuritytraining #tabletop #threatintelligence

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
      +4
  • View organization page for siberX, graphic

    9,513 followers

    Operation Defend the North:Day 3 begins shortly! If you missed out on Day 1 or 2, check out our posts to catch up, or check out the incident response feed on the platform to follow along. We will be starting the day with a recap of Day 2! If you haven't already, it's STILL not too late to join! Register for FREE at siberx.org/defendthenorth #wearecyber #cybersecurity #conference #defence #defendthenorth #simulation #cybersecuritytraining #tabletop #threatintelligence

    Operation Defend the North

    Operation Defend the North

    https://www.siberx.org

Affiliated pages

Similar pages

Browse jobs