Professional Documents
Culture Documents
Suerte-Network Security Presentation
Suerte-Network Security Presentation
2
Why is Cyber Defense Important?
Organizations at some point will encounter persistent threats that will hinder the business operations. Threats can be
stealing sensitive data or disrupting the network connectivity. These persistent threats are always knocking on any
organization and strengthening the defense against these will greatly improve the trust of individuals.
3
Cybercrime in Canada
4
Examples of Cybercrime
7
Moral Responsibility in Cyber Defense
As cyber attacks become increasingly common, it is important to consider the moral responsibility of those involved in
cyber defense. This includes individuals, organizations, and governments.
8
Examples of Moral Responsibility in Cyber Defense
10
Preventing Attacks
Corporate Governance
Corporate governance plays a crucial role in cyber defense.
It involves the policies, procedures, and structures that
guide the management and direction of an organization.
Effective corporate governance ensures that cyber defense
is a top priority for the organization and that all employees
understand their role in protecting sensitive information.
• Establishing a cyber defense strategy that aligns with
the organization's overall goals and objectives.
• Providing adequate resources and support for cyber
defense initiatives, including training and education
for employees.
• Implementing appropriate controls and safeguards to
protect sensitive information and systems.
11
Good Practice Principles for Data Ethics in the Public Sector
• Transparency: Ensure that data collection,
use, and sharing is open and understandable
to the public.
• Fairness: Ensure that data is collected, used,
and shared in a way that is unbiased and does
not discriminate against any individuals or
groups.
• Accountability: Ensure that those responsible
for data collection, use, and sharing are held
accountable for their actions and decisions.
• Privacy: Ensure that personal data is
collected, used, and shared in accordance with
relevant laws and regulations, and that
individuals have control over their own data.
12
References
Chin (2023). Cybersecurity and Social Responsibility: Ethical Considerations. https://www.upguard.com/blog/cybersecurity-ethics
Ling et al. (2023) Cybersecurity Laws and Regulations Canada 2024. https://iclg.com/practice-areas/cybersecurity-laws-and-
regulations/canada
13
THANK YOU