Sign in to view Chris’ full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Chris’ full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Waterloo, Ontario, Canada
Sign in to view Chris’ full profile
Chris can introduce you to 10+ people at Chainguard
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
664 followers
500+ connections
Sign in to view Chris’ full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Chris
Chris can introduce you to 10+ people at Chainguard
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Chris
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Chris’ full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
664 followers
-
Chris Herborth reposted thisChris Herborth reposted thisApple: we care about protecting kids. Oh yeah? Explain this:
-
Chris Herborth reposted thisChris Herborth reposted thisCome and join Joshua Powers and team working on replacing manual sustaining work with AI-driven agents and automation. Job advert here: https://lnkd.in/e5wHWBqk
-
Chris Herborth reposted thisChris Herborth reposted thisWe're hiring an Engineering VP here at Chainguard, reporting to me. This is a builder’s role! I’m looking for a hands-on engineering leader who loves taking new products from 0 to 1, then scaling what works. Someone who leads by example, sets a high bar, pushes teams hard in the right ways, and is the kind of teammate people want in the trenches with them. You should be all in on the new era of software development powered by the latest models and agents. If you're based in the US, love open source, Linux, Kubernetes, and security — and want to work with some of the best people in the business on securing the open source supply chain — please apply! https://lnkd.in/gTDwwu5v
-
Chris Herborth reposted thisChris Herborth reposted thisI'm excited to grow the Product Security team at Chainguard, come and be part of the future of security, solving tomorrow's problems today! https://lnkd.in/eEZXnRGR https://lnkd.in/emQYn6Bb
-
Chris Herborth reposted thisChris Herborth reposted thisWe put an ad for Chainguard Libraries outside the Boston Public Library to make a simple point: Physical libraries preserve the past. 📚 Chainguard Libraries secure your future. 🔐 Secure-by-default libraries aren’t just an upgrade. They’re essential for building the software your customers rely on. Choose trusted libraries your team (and your Board of Directors) won’t lose sleep over: https://lnkd.in/dnreQ7sn
-
Chris Herborth shared thisOne of my brothers had a heart attack last week, which was a surprise: https://lnkd.in/gWfMRhND We're pretty much in shock still.
-
Chris Herborth posted thisJust got back from Chainguard's Chicago Summit; a hell of a way to get introduced to a company! It's only my third week, and I'm loving everything so far. I went through a huge list of Chainguardians and tried to connect with everyone I chatted with (or, even better, karaoke'd with 🤘). The web being what it is, I have no idea if I was given a full list of folks… if I missed you, connect with me! Totally burnt out my social battery though, hopefully I can spend the rest of the weekend being an unresponsive blob on the couch or patio.
-
Chris Herborth reposted thisChris Herborth reposted thisJoin the first Ontario Cryptography Day at University of Waterloo.
-
Chris Herborth shared thisThis is something we were going to propose as a trial at ISARA before we left, as a way of improving everything after the massive layoffs. I still believe it's a massive win, and that most companies are too set in their ways to think about it rationally (see also remote work).Chris Herborth shared thisThe benefits of a shorter working week (e.g. 4 day week) for *an employer* 👇 💪 Staff are more productive 🚀 Job listings get more applications 😊 Staff are happier 🏥 Staff are healthier i.e. off sick less 🌱 It's better for the environment 📉 Staff turnover reduces 💼 It attracts experienced candidates 💰 Office costs reduce ⚖️ It's better for gender equality And most importantly, output doesn't decrease. This has been shown in many 4 day work week studies. For jobs with a better work life balance 👇 https://lnkd.in/dBi6C4WB
-
Chris Herborth reacted on thisChris Herborth reacted on thisMillions of people look up to Steve Jobs and Bill Gates. My role model is Daniel Stenberg. You've never heard of him. His code runs on 10 billion devices, including the one you're reading this post on. He started building cURL in 1996. It handles data transfer on nearly every phone, console, smart TV, 47 car brands, and it was on the Mars helicopter. He's also the person who's kept it going for nearly 30 years. Tech has the wildest spectrum of any industry: either you're a billionaire with a biopic, or you're quietly running things for billions of people who don't know your name. > Steve Jobs got a movie. > Bill Gates got a documentary. > And Daniel? He's got a pull request backlog and an inbox full of AI bots. I get it. I run an infrastructure company One (formerly Pica). We handle API authentication and execution across 250+ platforms. Our code runs inside tools you use every day. Nobody's ever been impressed by this at a dinner party. But the most important software is almost always the kind nobody knows exists. Auth libraries, data mappers, execution engines. Look up Daniel Stenberg, Werner Koch, and Theo de Raadt -- between them, they maintain the code that transfers your data, encrypts your email, and secures every server connection on earth. We stand on the shoulders of a thousand Daniels. Most of us have never said their names, let alone thanked them.
-
Chris Herborth reacted on thisChris Herborth reacted on thisJason's Idle Hands Prevention Club Day Two: 🦀 Rustvulncheck 🦀 One of my favorite powerful features of the Go ecosystem is a thing called govulncheck (https://lnkd.in/dDzBJPK7) -- it's whole job is to tell you, when you have a vulnerable dependency, whether you actually call the vulnerable code. It's an impressive combination of traditional call graph analysis and human-curated metadata. Chainguard uses govulncheck internally to triage and prioritize remediations in Go packages, and it's super effective. I truly believe every language ecosystem would be better off if they had a govulncheck. So I built one for Rust! Rust already has a curated dataset of Rust crate vulnerabilities (https://lnkd.in/dKvESxya), but unlike Go, Rust's advisories don't include information about the specific symbols that are vulnerable. So I wrote a thing that periodically scrapes advisories, compares the symbols changed between the latest affected version and the oldest fixed version, and stores those in a high-performance AI-native datastore (i.e., a JSON file). Then, the rustvulncheck tool can scan a Rust codebase to determine whether any of those affected symbols, from affected version ranges, are actually called by your code. If not, you're probably safe. If so, you have a clearer signal that you're affected, and exactly where and how. The automated symbol analysis can be enriched by a real human brain if you have one handy, but even just having the baseline is helpful, hopefully. Check out the repo (link in comments) for more, and if you've got a Rust codebase with vulnerable dependencies to test it on, give it a shot!
-
Chris Herborth reacted on thisChris Herborth reacted on thisApple: we care about protecting kids. Oh yeah? Explain this:
-
Chris Herborth reacted on thisIt's been just over a year since I shared that Shelley L. Mayer, CM had invited me to join the Ramp team as Managing Director. Honestly, it went fast. And I think that's because the work has been genuinely absorbing. We just released our 2025 Impact Report, and putting it together gave me a chance to step back and take in the full picture of who we got to work with this year. Organizations tackling housing insecurity, expanding access to care, challenging period poverty, protecting freshwater systems. These are the kinds of organizations I always wanted to work alongside, and getting to help them strengthen their communications and tell their stories has been so rewarding. I'm so grateful for our clients and the Ramp team. Year one down, and I genuinely can't wait for what comes next 😊Chris Herborth reacted on thisOur 2025 Impact Report is now live. This year, we worked alongside organizations tackling housing insecurity, expanding access to care, challenging period poverty, and protecting freshwater systems and natural spaces. The report captures that work and the role Ramp played in supporting it. We'll also be sharing a series of blogs over the coming weeks taking a closer look at each sector and spotlighting some of the organizations featured. Stay tuned. Read the report here: https://lnkd.in/eMXfPbJH #SocialImpact #BCorp #Communications #ImpactReport #BrandStrategy
-
Chris Herborth reacted on thisChris Herborth reacted on thisI just found out about the Baader-Meinhof phenomenon and now I can't stop seeing it everywhere. Anybody else?
-
Chris Herborth liked thisChris Herborth liked thisJason's Fun Time Buildathon Day One: 🏰 Portcullis 🏰 Even in the year 2026, even with all our magical AI agents and our flying cars, people are still piping curl to bash. They simply can't get enough of it! No amount of screaming at them to stop seems to work. Portcullis tries to make it a _little_ better. You use it like this: `curl <url> | portcullis | bash` Portcullis buffers the curled script, and checks for entries about it in Sigstore's Rekor transparency log. If someone you trust has publicly vouched for it, Portcullis pipes straight through to bash. If someone you trust has flagged it as suspicious, Portcullis exits and stops it from running. If there's no existing signal about the script, Portcullis at least opens your $EDITOR and makes you to review what you're about to run. You can either accept or reject it, and optionally record your decision to Rekor for future Portcullis users. And that's it! It's a pretty simple tool, and it should get even more useful if it gets more trustworthy users.
-
Chris Herborth reacted on thisChris Herborth reacted on thisJason's Doomscroll Avoidance Day Three: 💥 War 💥 (not that kind) You know the card game War? It's been a big hit with my kids, but once you've played a couple games you realize it's very boring, super repetitive, and essentially just a game of pure luck. What would it take to make it interesting, I wondered. 🤔 How about we run it in a browser, on your GPU, and see how fast we can get through a game? Well obviously that's exactly what I did, and the answer is: pretty fast. You can "play" it here: https://lnkd.in/dDKr_hnG On my phone I get ~1M games/sec, and on my Macbook I get 3.5M+/sec (your wars may vary). My favorite part is that it records and collects interesting outlier games so you can step through them, like games that went on for thousands of rounds, or ended in a tie(!) or even games that ended in a tie *on the first draw* (!!!) I had it spin for a while and simulate 1 billion games (about 630 human lifespans of pure War (the card game)) and it managed to result in a draw only ~80 times. Is this just a fancy random coin flip with a vibe-coded UI? It sure is! But it's heck of a lot more fun than playing a game of War, which is itself even more fun than the other kind.
Experience & Education
-
Chainguard
***** ******** ********
-
****** *** ******** *****
****** ******** ********
-
***** ***********
******** ************* *********
-
********** ** ********
** ******** ****** ****** **** ******** ******** ******* undefined
-
View Chris’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
Volunteer Experience
-
Developer
Info-ZIP
- 5 years 9 months
Science and Technology
Maintained open source zip/unzip for the QNX, and BeOS operating systems.
-
Developer
Python Software Foundation
- 5 years 5 months
Science and Technology
Developed and maintained ports of Python to the QNX and BeOS operating systems. Improved the language's portability for use as a shared library. Wrote various BeOS platform-specific modules.
Recommendations received
9 people have recommended Chris
Join now to viewView Chris’ full profile
-
See who you know in common
-
Get introduced
-
Contact Chris directly
Explore more posts
-
010 Data Protection Canada
22 followers
Compliance won’t stop hackers; operations will. In 60 days, make Canada’s Baseline Controls actually work: identity‑first SIEM, immutable backups, and real‑world IR. Read our opinionated plan & get actionable checklists. 👇 Full article link in the comments. #cyberprotection #cybersecurity #SIEM
1
1 Comment -
Itzik Chimino
IBM • 3K followers
🚀 Exciting News! Our AutoC tool has been officially accepted also to Black Hat Canada 🍁🇨🇦(SecTor) 2025 🎉 It will be available on-demand through the official Black Hat application. For those who haven’t seen it yet, AutoC is an open-source automation tool designed to extract and analyze Indicators of Compromise (IoCs) from cyber reports and blogs, making threat intelligence faster and more actionable. 👉 Check out this short demo video to see AutoC in action (attached to this post) 🔗 You can explore and download AutoC from our GitHub: https://lnkd.in/dmQtfaSg Proud to see AutoC gaining recognition across multiple conferences this year, and looking forward to sharing more with the community! #CyberSecurity #ThreatIntelligence #BlackHat #AutoC #OpenSource Bar Haim
29
3 Comments -
Cyberspective Inc.
581 followers
Toronto organizations need penetration testing that reflects how attacks actually happen. CyberSpective delivers expert-led penetration testing services for Toronto businesses, combining manual testing, clear risk context, and actionable remediation. 👉 Read more here: https://lnkd.in/gpjWaKkP #PenetrationTesting #Cybersecurity #TorontoBusinesses #CyberSpective
4
-
OpenThreat SRL
275 followers
ICYMI: 🚨 New High Impact CVE Detected! 🚨 CVE-2025-11251 affects Dayneks Software Industry and Trade Inc. / E-Commerce Platform Details: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Dayneks Software Industry and Trade Inc. E-Commerce Platform allows SQL Injection.This issue affec... 🔗 https://lnkd.in/d9TSvpPD 🔍 Could this affect your systems? 🎯 We map threats to your infrastructure and help you respond smart and fast. 📩 Let's talk: https://openthreat.ro #CVE #CyberSecurity #SMBSecurity #VulnerabilityManagement #OpenThreatRO
-
Layer 8 Solutions
901 followers
False positives flood SecOps and IAM when every log is treated the same. Introducing Cribl Guard - a solution that helps teams tune observability data at the source, so identity tools get the context they need without the noise. Explore how Cribl improves security signal quality: layer8solutions.ca/cribl #NetworkSecurity #AISecurity #SecOps #Observability
5
-
OWASP Saskatoon
121 followers
We are super excited to announce the first OWASP Saskatoon event! We will be meeting on November 5th, at the Andgo Systems offices. Our event will feature two speakers with a focus on AI. Our first speaker, Tyler Dewald is one of the co-founders of OWASP Saskatoon. His day job focuses on application security and he will be speaking about Model Context Protocol (MCP). Read more about the talk below. As AI adoption accelerates across enterprises, the Model Context Protocol (MCP) is quickly becoming the standard for how LLM systems interact with external tools and resources—but with this innovation comes significant security challenges for SOC managers and security professionals. This session takes a practical look at how this emerging standard operates and gives actionable intelligence on potential security blindspots in your organization's defences. We'll examine real-world attack scenarios where familiar threats find new pathways through MCP implementations, from credential harvesting and arbitrary code execution to the more insidious "rug pull" attacks and context poisoning unique to this protocol. You will walk away knowing more about the threats your company faces and how you can build an actionable security strategy for defending your organization. Our second speaker on the evening is Gavin Klondike. Gavin is the principal security consultant at GlitchSecure. His talk will focus on the OWASP® Foundation Top Ten for LLMs. Read more about his talk below. Learn to build AI applications with enhanced security, implementing best practices for secure and responsible AI development. In this session, Gavin will walk through the OWASP Top 10 for Large Language Model (LLM) applications — and cover the most critical security risks associated with AI systems. As the author of two of the OWASP top 10, he’ll share lessons from his work in penetration testing, practical ways these risks show up in real-world environments, and strategies to mitigate them. A big thank you to both of our speakers, and Andgo Systems for hosting the event. You can register at Meetup https://lnkd.in/gfjrCWN3 . You can find more information about OWASP Saskatoon at https://lnkd.in/gGjY--YR
12
-
Canadian Cyber Inc.
433 followers
🔥 Canadian SMBs don’t fail compliance because they lack tools they fail because they lack leadership. ISO 27001, SOC 2, PIPEDA, Law 25… the list keeps growing. Clients want proof. Insurers want evidence. Regulators want structure. But most SMBs don’t have the budget (or time) to hire a full-time CISO. That’s why the vCISO model is becoming essential across Canada. In my latest blog, I explore how a vCISO transforms compliance through the story of Erin Cho, a fictional CEO facing a very real Canadian challenge: 📌 Clients demanding SOC 2 📌 Security questionnaires piling up 📌 Law 25 complexity 📌 No internal compliance lead Her turning point? A single conversation that revealed the truth: ➡️ Compliance isn’t about firefighting it’s about leadership, structure, and repeatable processes. ➡️ A vCISO provides exactly that at a fraction of the cost of a full-time CISO. 💡 Inside the article: • How a vCISO builds your entire ISO 27001 program • The roadmap to SOC 2 readiness (made practical for SMBs) • How a vCISO handles client questionnaires, vendor reviews & audits • The 48-hour turnaround that won Erin a major client • Why vCISO services are exploding across Canada If ISO 27001, SOC 2, cyber insurance, or privacy compliance feels overwhelming this post explains how SMBs finally get control. 🔗 Read the full blog: https://lnkd.in/eMA7gkTG 📩 Need compliance leadership without hiring a full-time CISO? info@canadiancyber.ca Canadian Cyber Helping Canadian SMBs meet ISO 27001, SOC 2, and privacy requirements with clarity and confidence. #vCISO #CyberSecurity #Compliance #ISO27001 #SOC2 #CanadianCyber #Law25 #PIPEDA #SMB #RiskManagement
-
Critical Systems Labs
414 followers
This afternoon Laure MILLET, CSL's VP Research, spoke at BSides Vancouver about using eliminative argumentation (EA) to reason about cybersecurity assurance. A key idea in the presentation was using "defeaters" (sources of doubt) to drive critical thinking about cybersecurity. Our commercial tool, Socrates - Assurance Case Editor, can be used to perform EA-style analysis and streamline compliance activities. Checkout our website or reach out to Laure to learn more. https://lnkd.in/geta9QkU #bsides #assurance #cybersecurity
7
-
Market Bridge Life Sciences
194 followers
Cloud compliance for visual assessment tools: Your CISO isn't blocking the deal. They're previewing every question procurement will ask you six months from now. Canadian digital health companies sometimes frame CISO scrutiny as a friction point. It's more accurate to treat it as early procurement intelligence. If your compliance architecture can't withstand the CISO's vendor questionnaire, it won't withstand procurement either. For cloud-hosted visual assessment tools specifically, three layers matter in the Canadian context. 👉 Data residency: Provincial health privacy legislation is not uniform. Ontario's PHIPA, Alberta's HIA, and BC's PIPA (etc) each carry different requirements around where patient data is stored and who can access it. If you're using AWS or Azure, your data region must match the province you're operating in. This is a pre-contract requirement, not an IT configuration to sort out after the pilot starts. 👉 SaMD classification: If your software uses AI or computer vision to produce an assessment output (wound healing percentage, fall risk score, gait pattern analysis), it's likely classified as Software as a Medical Device under Health Canada's framework. A Class II or higher licence may be required before clinical deployment. "Clinical decision support" framing can reduce regulatory burden in some cases, but the line is narrower than many founders expect, and Health Canada's guidance on AI-enabled devices is evolving. Important: Follow your own regulatory affairs dept or consultant's recommendations as they know your business best. 👉 Contractual liability. Hospital legal teams will push indemnification clauses and minimum cyber insurance thresholds onto the vendor. Knowing your exposure before the first legal review changes the commercial conversation and the timeline. The CISO is a gatekeeper. They're also giving you a roadmap. Build the compliance architecture before the pilot, and the rest of the process moves faster. Questions about how this applies to your specific tool? Reach out directly to chat. 🙂
7
1 Comment -
Blair Attard-Frost
University of Alberta • 10K followers
Edmonton police are the first in the world to test Axon's body-worn facial recognition cameras in public, and they're doing it without waiting for the privacy commissioner to review their impact assessment. https://lnkd.in/gMfNjVk6
13
2 Comments -
Devon Ackerman
Devon Ackerman is a… • 8K followers
A new AboutDFIR.com security bulletin is live! 160,000 Impacted by Valsoft Data Breach Canada-based vertical market software (VMS) firm Valsoft Corporation (dba AllTrust) is notifying over 160,000 people that their personal information was compromised in a data breach. The incident, discovered on February 14, involved unauthorized access to a non-production network of AllTrust subsidiary Aspire USA. “Aspire’s internal security team identified an in-progress file transfer which they were able to interrupt mid-transfer,” the company says in a notification letter to the impacted individuals, a copy of which was submitted to the Maine Attorney General’s Office. Update to How CISA Shares Cyber-Related Alerts and Notifications Starting May 12, CISA is changing how we announce cybersecurity updates and the release of […]
2
-
Chase Sutphin
AI Governance Solutions • 2K followers
Guardrails were never governance. They were duct tape. Enterprise AI has outgrown them. When AI systems were just chatbots, output filtering and prompt sanitization were enough. That era is over. Today's enterprise AI is agentic. It calls APIs. It orchestrates other agents. It takes actions inside your systems — autonomously. The attack surface is no longer just the model output. It's the entire operational lifecycle. In my view, organizations still treating guardrails as their primary AI control mechanism are running a governance deficit they haven't fully priced yet. What's actually needed is a formal control layer — one that governs tool use, API permissions, agent-to-agent interactions, and decision authority at every stage of execution. This maps directly to NIST AI RMF GOVERN and MANAGE functions — structured accountability, not reactive patching. Action Layer: Audit your current AI controls against agentic behavior — not just model outputs. Map every tool, API, and orchestration path your AI systems touch, then ask whether each one has an explicit permission boundary and audit trail. If your AI governance framework was designed before your AI became autonomous, is it still a governance framework — or just documentation? https://lnkd.in/en4wW7RA
3
4 Comments -
CTI Labs
323 followers
🚨 CRITICAL SharePoint Zero-Day Alert: CVE-2025-53770 Under Active Exploitation in Canada The Canadian Cyber Centre just issued an urgent update on a critical SharePoint Server vulnerability that's being actively exploited. This affects ALL on-premises SharePoint versions - and there's no patch yet. 🔍 What Makes This Dangerous CVE-2025-53770 exploits untrusted data deserialization, allowing attackers to execute remote code on unpatched SharePoint servers. The vulnerability only impacts on-premises installations - SharePoint Online users are safe. Key exploitation indicators to hunt for immediately: 🎯 Malicious file: spinstall0.aspx in C:\PROGRA\~1\COMMON\~1\MICROS\~1\WEBSER\~1\16\TEMPLATE\LAYOUTS\ 🎯 Suspicious POST requests to /\_layouts/15/ToolPane.aspx with SignOut.aspx referer 🎯 Network activity from IPs: 107.191.58\[.\]76, 104.238.159\[.\]149, 96.9.125\[.\]147 🛠️ Immediate Defense Actions Without a patch available, focus on these Microsoft-recommended mitigations: Enable AMSI integration on all SharePoint servers Deploy Microsoft Defender Antivirus across your SharePoint infrastructure If AMSI can't be enabled, disconnect servers from internet access Implement Defender for Endpoint for post-exploit detection Monitor continuously for the three compromise file hashes listed in the advisory ⚡ The threat actors have been active since July 17th. If you find ANY indicators, take affected servers offline immediately and hunt for lateral movement. 📢 How are your teams responding to this zero-day? What additional detection measures are you implementing while waiting for the patch? https://lnkd.in/dyXdipnn #ThreatIntelligence #SharePoint #ZeroDay #CyberThreat #InfoSec #IncidentResponse #SecurityOperations #Microsoft #RCE #CriticalVulnerability
1
-
Data Trust Partners
4 followers
Breaking Privacy Update: OPC Releases Final Guidance on Biometrics in Canada On August 11, 2025, the Office of the Privacy Commissioner of Canada (OPC) published its final guidance for the processing of biometric information—a milestone for privacy compliance across both the private and federal public sectors. 🔑 Key Takeaways: Purpose & Proportionality: Organizations must ensure biometric projects have a clear, legitimate purpose and remain proportional to privacy risks. Consent Matters: The guidance clarifies when and how to obtain valid, meaningful consent for collecting and using biometric data—including when it’s a condition of service. Data Minimization & Transparency: Strict requirements for limiting the amount collected, maintaining transparency, and ensuring robust data protection. Accuracy & Oversight: System accuracy and security are emphasized, with ongoing testing and evaluation expected from qualified experts. Quebec’s Influence: These updates come after Quebec’s privacy regulator raised the bar for biometric use in fields like loss prevention and access control, setting a high national standard. Why this matters: As Canadian organizations increasingly deploy biometric technologies, this guidance sets new benchmarks for lawful and ethical use. 🔍 Next Steps: Review your current/future biometric initiatives for compliance, and consult a privacy professional for tailored advice. #privacy #biometrics #OPC #compliance #dataprotection #Canada https://lnkd.in/gpRXQjkC
-
Conestoga Cyber Security Association
183 followers
Setting up a Virtual Machine (VM) environment is a fundamental skill for any aspiring cybersecurity professional. Whether you're looking to test malware safely or simulate complex networks, it all starts here. Join the Conestoga Cybersecurity Association this Wednesday for a hands-on walkthrough on setting up and configuring your very own VM Lab! 📍 Where: Conestoga College, Waterloo Campus - Room 1G05 📅 When: Wednesday, Feb 11th | 6:30 PM – 8:00 PM 💻 Note: This is a BYOD (Bring Your Own Device) workshop. Action Item: You must download the required software before arriving. Watch the tutorial here for instructions: https://lnkd.in/eJVfEsa5 See you there! 🛡️ #CyberSecurity #ConestogaCollege #VirtualMachines #TechWorkshop #StudentSuccess #InfoSec
4
-
Alexander Rudolph
Canadian Cyber in Context • 1K followers
The first edition of the Canadian Cyber in Context series, "Compliance is Cash," with Andrew Laliberte, is now out! Are you struggling to understand where to start with the Canadian Program for Cyber Security Certification (CPCSC)? Andy walks you through the basics and explains the initial steps for scoping and incorporating CPCSC into your business activities. https://lnkd.in/e_AjMQzF #CPCSC #compliance #canadianprogramforcybersecuritycertification #procurement #DND #PSPC #cyber #cybersecurity #cyberdefence 123 Cyber Inc. Steve Gregory, MSM
8
1 Comment
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More