Printer icon Print Page

Security and Safety Service Reports

(Displaying 1 - 20 / 150) 1 2 3 4 5 6 7 8 »

Emergency Response to Terrorism Events: Six Key Insights

From Barcelona and London to Ottawa ON, terrorist attacks continue to make headlines all over the globe. These events differ in some ways from traditional emergencies, requiring responses that are complex, quick, and dynamic, all within a crowded stakeholder space. How prepared is Canada and its citizens to deal with emergencies resulting from terrorism events? What can we learn from recent events across the world that will help us to be better prepared to deal with an attack on home soil? In February 2017, The Conference Board of Canada’s Centre for National Security and Council on Emergency Management held a joint meeting that brought together senior members of local, federal, and international law enforcement, and emergency response officials to discuss recent terrorist attacks, trends in emergency preparedness, and ways to move forward.

Recorded Webinar | October 2017 | Satyamoorthy Kabilan | The Conference Board of Canada

Le point sur les interventions d’urgence en cas d’attentats terroristes

Le Canada est-il prêt pour faire face à de nouveaux attentats terroristes? Cette note de recherche explore les tendances relatives à la mise à l’essai de futures stratégies de planification des mesures d’urgence et propose des recommandations pour améliorer l’efficacité des interventions d’urgence dans l’éventualité de nouveaux attentats terroristes.

Note de recherche | 24 pages | August 2017 | Darren Gresch, Satyamoorthy Kabilan | Le Conference Board du Canada

Insights on Emergency Response to Terrorism Events

Is Canada prepared for future terrorism events? This briefing explores trends that will test preparedness strategies going forward and provides recommendations for improving emergency responses to terrorism events.

Briefing | 22 pages | August 2017 | Darren Gresch, Satyamoorthy Kabilan | The Conference Board of Canada

Cybersecurity and Legal Compliance – How to Strike a Balance

Organizations operating in the critical infrastructure space struggle to strike a balance between the need to dedicate the necessary resources to be compliant with regulations and responding to cyber attacks in real time. Given the ongoing expectation of cybersecurity-related compliance and the additional need to respond to scrutiny of cyber incident response readiness, organizations need to adopt a multidisciplinary approach that incorporates risk management, cybersecurity, and legal expertise. While one size does not fit all, this webinar will touch on four key steps that organizations can take to effectively respond to the dual requirement of compliance and overall cyber readiness.

Recorded Webinar | July 2017 | The Conference Board of Canada

Communiquer sur la cybersécurité avec un conseil d’administration

La cybersécurité est un problème urgent qui requiert une attention accrue des dirigeants. Une bonne communication à cet égard avec le conseil d’administration peut aider les organisations à gérer des risques en évolution constante.

Résumé | 27 pages | July 2017 | Ruben Vroegop | Le Conference Board du Canada

Communicating Cyber Security to the Board of Directors

Cyber security is a pressing issue that demands increased attention from executives. The issues highlighted in this briefing around communicating cyber security to the board can help organizations deal with evolving cyber security risks.

Briefing | 25 pages | July 2017 | Ruben Vroegop | The Conference Board of Canada

30 Truths about Cybersecurity

There are two kinds of companies: those that have been hacked and those that don’t know it yet. Cyber risk is not just an IT concern, but a crucial business issue.

Report | 14 pages | April 2017 | The Conference Board, Inc.

Ensuring Communications when Disaster Strikes – Lessons Learned by TELUS

The world is now connected in ways that seemed like science fiction only decades ago. And this is true not just of people, but of things as well. People connected to people, people connected to devices and devices connected to devices. Connectivity has become an essential dependency in our day-to-day lives, and an even greater necessity when disaster strikes. Telecommunications is the thread that connects all of us. In the event of an emergency, it is imperative that telecom companies have the capability to withstand adverse conditions and to recover critical services with minimal interruption. If not planned for accordingly, severe weather, flooding, wildfires and seismic activity pose a great risk to the critical infrastructure that connects us all. Well-known as one of Canada’s top telecommunications companies, TELUS provides a wide range of communications products and services, including wireless, data, Internet protocol (IP), voice, television, entertainment and video, and is Canada's largest healthcare IT provider. Join us for this webinar where Michael Galin and Jeff Hortobagyi from TELUS’ Corporate Business Continuity Office will discuss what it takes to keep this essential service operational when disaster strikes. Michael and Jeff will explore lessons learned from the management of multiple major incidents, such as the Fort McMurray wildfire, and a wide variety of other events, including floods, storms, and civil disorder. They will also examine the incident management “ecosystem”, which includes facilities, infrastructure, and teams specifically prepared for emergencies. Although developed in the context of a telecommunications company, these lessons and concepts are applicable to any organization that needs to stay up while others struggle to function. Whether you work in the public or the private sector, you won’t want to miss this important session on how to keep communications up when everything else is down.

Recorded Webinar | March 2017 | The Conference Board of Canada

Fighting Extremism: Counter-radicalization and the “Danish Model”

Extremist Islamist groups such as ISIS have been getting better at reaching and recruiting young Muslims since the Arab Spring. The massive migration of “foreign fighters” from both Western countries and the Middle East to ISIS and other extremist movements, as well as the recent attacks in European cities, are all worrying reflections of this phenomenon. So what can be done to stop it? In order to tackle this issue, we must first understand the drivers and processes of radicalization: why do radicalized youths risk everything to travel to Syria and Iraq? Why do some of the them go one step further and agree to support or participate in terrorism in their own countries? Most importantly, how do we handle these phenomena?

Recorded Webinar | February 2017 | The Conference Board of Canada

Conseils d’administration et cybersécurité : Pratiques prometteuses pour améliorer leur engagement et leurs résultats en la matière

La cybersécurité représente pour toute entreprise un risque systémique, mais beaucoup de membres de conseil n’ont pas les connaissances voulues pour le surveiller. Ce rapport propose une approche structurée en trois étapes pour améliorer les compétences des conseils dans ce domaine.

Résumé | 33 pages | December 2016 | Micah Clark | Le Conference Board du Canada

Taking Cyber Security to the Board: Promising Practices for Improving Board Engagement and Performance in Cyber Security

Cyber security is a systemic risk to any business, but many board members lack the literacy in cyber security that they need to oversee this risk. This report provides a three-stage developmental approach to improving board competence in this area.

Briefing | 30 pages | December 2016 | Micah Clark | The Conference Board of Canada

Dealing with Insider Threats: Too Close for Comfort

No workplace is immune to Insider Threats. From aviation and defence, to manufacturing and information technology security, headlines in recent years have emphasized the fact that any organization can face insider threats—risks posed by rogue employees who deliberately cause harm, or other employees who may be negligent or make inadvertent mistakes in the workplace. Typically, organizations focus on protecting themselves from external threats, however, outsiders usually lack knowledge about an organization’s vulnerabilities and risk management procedures and resources. Rather, it is people inside or aligned with the organization—employees, contractors, and suppliers—who are better positioned to exploit weaknesses through their organizational knowledge, everyday access to workplace systems and resources, and interactions with co-workers. For this reason, it is true that “while people are an organization’s greatest asset, they are also its most critical vulnerability.” So what can be done to mitigate insider threats? How can you ensure your organization is protecting itself without alienating your team?

Recorded Webinar | December 2016 | Satyamoorthy Kabilan | The Conference Board of Canada

When Seconds Matter: Critical Decisions in Crisis Response

Facts are hard to come by in the early hours of a crisis When a crisis hits, people turn to social media for the latest information. Minutes wasted are minutes lost, and organizations must be faster than ever in responding when a crisis hits home. However, as we have seen with incidents such as the Boston Marathon bombing, this immediate access to information and public opinion can cause misinformation and confusion, wasting time when it matters the most. What’s more, public trust can be quickly eroded when key stakeholders are misled, and critical mistakes are made as an organization struggles both to respond to the situation and to engage with interested parties. So how can an organization supposed to make critical decisions rapidly when the problem is not yet clearly understood? How can an organization engage in public communications when the key information is unclear or completely unavailable?

Recorded Webinar | November 2016 | The Conference Board of Canada

Building Emotional Intelligence into Crisis Leadership

The National Preparedness Leadership Initiative (NPLI), a joint program of the Harvard School of Public Health and Harvard’s Kennedy School of Government, has been studying as well as teaching preparedness and response to leaders for more than a decade. Faculty have been on the ground during, or in the immediate aftermath of, events such as Hurricane Katrina, the H1N1 pandemic, Deepwater Horizon oil spill, super storm Sandy, the Boston Marathon bombings, and the recent Ebola outbreak. The focus of the NPLI is on pragmatic lessons, ones that can be distilled and useful to those in leadership positions during high-stakes, high-pressure situations. So how could these lessons apply to you? Join the NPLI’s Director of Research, Eric J. McNulty, as he presents the latest research into how to integrate insights on behavior—good and bad—to improve performance in the supposedly rational setting of a highly structured Incident Command System (ICS). McNulty will draw upon a wide range of scholarship in psychology, neuroscience, and organizational behavior present pragmatic tools for applying these findings in real-world settings.

Recorded Webinar | October 2016 | The Conference Board of Canada

The Privacy Dilemma: Is Technology Bad For Privacy?

Is privacy a risk for your organization? The Internet of Things, Big Data, Smart Grid, health IT – new technologies promising to bring great advancements to society and individual quality of life. Notwithstanding their benefits, public awareness about these technologies’ potential impact on individual privacy and related societal values continues to grow. As high-profile data breaches continue to make the news, privacy engineering and risk management are concepts being used more and more commonly. And although risk management in cyber security is well understood, what does cyber risk management mean for privacy protection? In this webinar, Naomi Lefkovitz, senior privacy policy advisor at the National Institute of Standards and Technology (NIST) will discuss efforts to develop a privacy risk model and assessment methodology to better manage privacy in information systems.

Recorded Webinar | September 2016 | The Conference Board of Canada

A Private Matter: Regulating Privacy in Canada, the European Union and the United States

The Ground is Shifting The EU, U.S., and Canada are in the middle of a truly unprecedented period of change in privacy protection and regulation. After nearly a decade of stability, the ground is shifting on an almost daily basis, with regulators and industry struggling to keep up with the pace of technological development, as well as the public’s complex and sometimes contradictory expectation of privacy. In our always-connected world, privacy protection should be a concern for all Canadians. While large privacy breaches like the Ashley Madison hack make for cringe-inducing headlines, smaller privacy breaches plague Canada nearly every day. Whether it’s unauthorized access to the electronic medical records of Canadian veterans or the accidental breach of potential homebuyers in Saskatchewan, many privacy breaches are the result of poorly designed policies and privacy practices. What should Canadian firms be doing to protect their customers and keep up with the pace of change?

Recorded Webinar | August 2016 | Micah Clark | The Conference Board of Canada

Cyber Security for Small and Medium-sized Businesses: Never Too Small to Fail

In the last five years, organizations such as JP Morgan, Target, Home Depot, and Sony have all fallen victim to expensive and devastating cyber-attacks. Yet despite these high profile cyber-breaches, and increasing awareness of the importance of cyber security, many Small and Medium-sized Enterprises (SMEs) assume that their businesses are too insignificant to be of interest to hackers. Cyber security firm FireEye has reported that 77% of SMEs believe that their company is safe from cyber-attacks; however, one-third of those same SMEs were not aware that they had suffered a cyber-attack in the past year. Senior level staff are less likely to know about cybersecurity risks, and 58% of SME management teams feel cyber security is not a significant risk to their organization. The truth is that cyber-attacks can have many negative consequences for SMEs, including significant costs associated with loss of business or in extreme cases,shutting down operations altogether. Additionally, the theft of employee or customer information can be crippling for SMEs, causing irreparable harm to the reputation of the company and a total loss of customer confidence, trust, and loyalty. FireEye found 60% of small firms go out of business within 6 months of a data breach. Because of this, it is essential for SMEs to ensure that they include adequate cybersecurity measures into their business plans and budget accordingly. So where to start?

Recorded Webinar | July 2016 | The Conference Board of Canada

Spontaneous Volunteers: Community Participation in Disaster Response and Recovery

When disasters strike, emergency response teams are mobilized to find survivors, begin cleanup, and help communities recover. But it’s not just trained specialists doing this important work. When disasters hit home, communities rally together to volunteer with rescue and cleanup efforts. The help is welcome, but how can volunteer efforts be put to the best use possible in situations where time is often of the essence? Some international approaches to working with spontaneous volunteers favour a highly centralized, top-down approach that expects all volunteers to conform to emergency management organization and procedures. Others insist that emergency managers should work within the bottom-up emergent social structures that form in the wake of disaster. No matter the approach, spontaneous volunteers challenge the emergency management community to re-think its approach to disaster response and recovery.

Recorded Webinar | July 2016 | Micah Clark | The Conference Board of Canada

Cybersecurity Governance: Mitigating an Increasing Threat

The International Cyber Security Protection Alliance (ICSPA) reported that 69% of Canadian businesses experienced a cybersecurity incident in 2014, and a quarter of these cyber-attacks had a significant impact on their organization. Cyber attacks are not a new phenomenon, yet despite advancements in protection, many organizations are still underprepared to deal with increasingly complex cyber threats. Mitigating the threat of cyberattacks is difficult, and equipping IT department with all the latest hardware and software security solutions is simply not enough. By building a strong cybersecurity governance framework, managers and board members are encouraged to think more holistically about solutions, and ensure that all employees play a collective role in promoting cybersecurity. A robust framework will also create processes for identifying breaches and implementing fixes, something that’s becoming increasingly difficult with each new threat. So how prepared is your organization?

Recorded Webinar | June 2016 | The Conference Board of Canada

Le respect de la confidentialité : Réglementer la protection de la vie privée au Canada, aux États-Unis et dans l’UE

Les entreprises et les décideurs publics ont intérêt à comprendre les fondements de la protection de la vie privée au Canada et chez leurs principaux partenaires commerciaux. Cette note de recherche fait le point sur l’évolution de la réglementation au Canada, aux États-Unis et dans l’Union européenne. Cette publication comprend un résumé en français, suivi d'une version anglaise du rapport intégral.

Résumé | 4 pages | May 2016 | Micah Clark | Le Conference Board du Canada

(Displaying 1 - 20 / 150) 1 2 3 4 5 6 7 8 »