Meet our Experts | Canadian Institute for Cybersecurity | UNB

Global Site Navigation (use tab and down arrow)

Canadian Institute for Cybersecurity

Meet our experts

Webinar series for Cybersecurity Month

The Canadian Institute for Cybersecurity showcases the expertise of cybersecurity researchers, academics and professionals during its annual Cybersecurity Awareness Month webinar series.  The presentations are scheduled during October and are about 20 minutes, with time for Q&A.

CIC also provides speakers to the Cybersecurity Revolution (SECREV) conference held annually in May.  The conference  provides an open and inclusive event that streams discussions and presentations of cybersecurity research from locations around the world, following the sun from UTC 0:00 until midnight. It is absolutely free to attend.

2023 schedule 

October 5th, 12:30pm ADT:  "Are you Cyber Ready? - Securing Your Organization with Cybersecurity Standards, Guidelines and Best Practices" by Dr. Windhya Rankothge, Research Associate, Canadian Institute for Cybersecurity.

Abstract: Standards, guidelines and best practices for cybersecurity can help any organization with designing effective cybersecurity frameworks. Therefore, institutions such as the National Institute of Standards and Technology (NIST) of United States (U.S.), worked on developing Cybersecurity Frameworks, targeting to improve organizations cybersecurity strengths. In addition, industry and academia have shown a keen interest on developing comprehensive tools to assist organizations to follow cyber security frameworks. In this presentation, I will discuss about the NIST Cyber Security framework and Cyber Security Evaluation Tool (CSET), which can be used by any organization to follow cyber security frameworks and protect their systems, people, assets, data, and capabilities against cyber threats.

Register Here

Past webinars

ThemeBeyond Classical Crypotgraphy:  Feasibility and Benefits of Post-Quantum and Hybrid Solutions
Host:  Brian Milthorp, Strategic Collaborations and Partnership Development Officer
Date and Time: May 10, 2023 at 1pm ADT

Presentations:
"Beyond Classical vs. Post-Quantum: A Hybrid Approach for the Quantum Era" by Dr. Vikas Chouhan, Postdoctoral Fellow, Canadian Institute for Cybersecurity.

Abstract: The advent of quantum computing presents a significant challenge to traditional cryptographic systems, rendering them vulnerable to attacks. As such, the development and implementation of post-quantum cryptography (PQC) are gaining momentum in the field of cybersecurity. However, the deployment of PQC can be challenging, particularly when it comes to interoperability with legacy systems. The hybrid approach addresses this issue, which combines PQC with traditional cryptography to secure communications in a post-quantum world. The approach leverages the strengths of both cryptographic systems, enhancing security and ensuring compatibility with existing systems.

"Beyond the Hype: Identifying the True Quantum-Secure Algorithms in the Quantum Era" by Mohammed Al-Darwbi, Cybersecurity Researcher, Canadian Institute for Cybersecurity.

Abstract: This presentation will discuss the quantum threat to current cryptographic algorithms and the potential consequences of quantum computing. We will explore post-quantum algorithms and the key criteria for achieving true quantum security. The analysis will cover the security levels provided by various algorithms and emphasize the importance of evaluating them based on their true quantum security rather than just reputation. The goal is to raise awareness of the need to adapt and implement post-quantum cryptography to secure the digital world against the quantum threat.

"From Theory to Practice: Assessing the Viability of Post-Quantum Cryptography for Various Applications" by Dr. Somayeh Sadeghi, Postdoctoral Fellow, Canadian Institute for Cybersecurity.

Abstract:  Quantum computing presents a significant threat to various industries that rely on digital security, such as finance, healthcare, and defense. Asymmetric cryptography, which is one of the foundation of modern digital infrastructure, is vulnerable to attacks from quantum computers. Post-quantum cryptographic algorithms have been proposed to address this issue, which can withstand quantum computing attacks. However, the implementation of these algorithms presents new challenges, including storage and processing requirements. Depending on the specific security requirements and available resources, the post-quantum strategy should be tailored to each application.


October 3 at 12.30 pm ADT: "Effect of Networking Evolutions Towards Cyber Security" by Dr. Windhya Rankothge, Postdoctoral Fellow, Canadian Institute for Cybersecurity.

Abstract: Computer Networks and Data Communication Technologies have gone through a rapid evolution over the past decade, and thanks to them, we are enjoying super-fast and reliable communications. However recent advanced technologies used in computer networks management and communication channels such as Software Defined Networks and 5G, have introduced several complex cybersecurity challenges for communication. In this webinar, Dr. Rankothge will discuss these security challenges and possible countermeasures, so that we can enjoy fast, reliable as well as secure communications. 

October 4 at 12.00 pm ADT: "Leverage AI in Threat Management" by Dr. Ida Siahaan, Research Director,  Info-Tech Research Group.

Abstract: As adversaries become more advanced with their techniques and tactics, security professionals must draw on effective tools, processes, and emerging technologies in their arsenal to mount a successful defense.  In this presentation we will review the current state of threat management and threat intelligence sharing. We will also discuss AI-based threat management and its benefits, risks, and the solution landscape for cyber-physical threats. 

October 4 at 1.00 pm ADT: "Improving Incident Response with Hands-on Security Team Training" by Mark Gaudet, VP Simulation Technologies, Field Effect.

October 5 at 12.00 pm ADT: "Mitigating Data Poisoning Attacks in Federated Learning" by Dr. Euclides Carlos Pinto Neto, Postdoctoral Fellow, Canadian Institute for Cybersecurity. 

Abstract: Nowadays, privacy is a major concern in distributed and federated computation. This motivates the development of new concepts focused on learning a single global statistical model from data stored on several remote systems to minimize the error of local estimators. However, mitigating data poisoning attacks in Federated Learning (FL) is challenging for many reasons. A possible strategy to deal with that is to evaluate each client's knowledge to prevent misleading instances from affecting the learning process.

October 6 at 12.00 pm ADT: "Simulation-enabled research, training and exercises for cyber security and instrumentation and controls" by Marienna MacDonald, Section Head, National Innovation Centre for Cyber Security R&D Division, Canadian Nuclear Laboratories.

Abstract: Canadian Nuclear Laboratories conducts research in cyber security for industrial systems.  These systems operate our critical infrastructure such as our nuclear power plants, oil and gas refineries, transportation systems and water treatment plants. The presentation will describe how CNL uses simulation capabilities to create realism in processes, technology, and even physical surroundings, and the kinds of research projects we can conduct that is enabled by these simulations.

October 14 at 12.00 pm ADT: "Combating Adversarial AI" by Sulakshan Vajipayajula, Architect, IBM.

Abstract: Use of AI in Cybersecurity attacks created a challenging threat landscape. Defending against adversarial AI requires sophisticated frameworks addressing evasion, poisoning and stealth cybersecurity attacks that use AI. The talk goes over few examples of AI based attacks and a defensive Cybersecurity approach.

October 19 at 12.30 pm ADT: "Operational Technology Security Global Outlook" by Sheldon Shaw, Director, Cyber Research and Response, Difenda.

Abstract:  Sheldon Shaw will discuss the global state of affairs in Operational Technology (OT), Security skillsets and future job opportunities in the OT market.

October 18 at 12.00 pm ADT: "Threat Intelligence Sharing" by Dr. Leila Rashidi, Postdoctoral Fellow, Canadian Institute for Cybersecurity.

Abstract: Threat intelligence refers to the knowledge, skills and information derived based on experiences about cyber incidents and assessment of threats. Sharing the threat intelligence between different companies or organizations has some benefits as well as drawbacks. Although sharing threat intelligence can disclose important information to adversaries, it can result in better protection and mitigation against cyber threats and risks. In this webinar, we review threat intelligence sharing with an emphasis on its advantages. 

October 25 at 12.00 pm ADT: "Switching to a Career in Cybersecurity" by Kwasi Boakye-Boateng, Cybersecurity Researcher, Canadian Institute for Cybersecurity.

Abstract:  The demand for cybersecurity professionals still not satiated, leading to about 3.5 million job vacancies worldwide in 2021. Also, a career in cybersecurity domain is a lucrative one to explore. Join me in exploring how one can, with little or strong knowledge, in cyber technology transition into cybersecurity.

October 26 at 12.00 pm ADT: "The Netherlands Approach to Cybersecurity in Supply Chains: the horticulture & agriculture Cyber Resilience Center" by Bert Feskens, Senior Programme Manager, Security Delta (HSD).

Abstract:  What do tulips have to do with cybersecurity? While digitalization creates enormous opportunities for innovation and economies of scale, our digital economy can only be successful if it is secure. Security does not end at the border of one’s organization but affects the whole supply chain. In many sectors there is a huge lack of understanding on what the implications of cybersecurity are. Also, cybersecurity expertise is scarce. A supply-chain approach towards cybersecurity could offer a solution.

October 28 at 12.00 pm ADT: "The IoT Threat Landscape" by Alireza Zohourian, Cybersecurity Researcher, Canadian Institute for Cybersecurity.

Abstract:  Internet of Things (IoT) devices have been increasingly being used in different public and private sectors, such as Smart Home, Smart Industry and Smart Healthcare. However, the proliferation, heterogeneity and resourced-constrained nature of these devices have opened several doors to adversaries and created many security and privacy issues. In this presentation, we will examine the IoT environment and its specific characteristics, see how they create many security issues and investigate the ways we can mitigate them.

October 28 at 1.30 pm ADT: "RCMP and Cybercrime in Canada" by S/Sgt. Dawn Morris-Little, National Cybercrime Coordination Centre and the Royal Canadian Mounted Police.

Abstract:  Cybercrime continues to impact Canada with increasing scale and severity. Cybercriminals continue to evolve their tactics to victimize Canada’s business economy, key institutions and the general public. In this presentation you will hear about cybercrime trends in Canada, the role of the RCMP in combatting cybercrime and how the RCMP works with other federal, provincial, territorial, municipal, private industry and academic partners and the public to disrupt cybercrime infrastructure and assets and work towards ultimately pursuing and identifying the criminals behind the scenes.


Innovation, Science & Economic Development Canada’s Joint Session, by Emilie Bourque and Hamza Khan.

"Recent Evolutions in Open Security" by Jason Keirstead, IBM Distinguished Engineer and the CTO of Threat Management for IBM Security.

"Ahead of the Curve: Building on Canada’s Trust Advantage" by Bill Tam, co-founder and COO of the Digital Technology Supercluster.

"The Dumbo Protocol Family: Making Asynchronous Consensus Real" by Dr. Qiang Tang, Senior Lecturer at the University of Sydney, Australia.

"Critical Infrastructure Security" by Andrew Easton, Provincial Security Advisor for the Province of New Brunswick and the Assistant Deputy Minister of the Security and Emergencies Division of the Department of Justice and Public Safety.

"The cyber-resilience imperative: recent trends and future needs" by Dr. Benoît Dupont, Professor of Criminology at the Université de Montréal as well as the Canada Research Chair for Cybersecurity and the Research Chair for the Prevention of Cybercrime.

"Practical lessons from Zero Trust adoption" by Dr. Sridhar Muppidi, IBM Fellow and CTO for IBM Security.

"Prioritizing Risk to Mitigate Attacks on Public Cloud Deployed Workloads" by Sandy Bird, co-founder and CTO of Sonrai Security.

"Thinking Broadly About Privacy, Security and Trust in a Connected World" by Dr. Joel Martin, National Research Council Chief Digital Research Officer and Chief Science Officer.

"Extraction of Complex DNN Models: Real Threat or Boogeyman" by Dr. N. Asokan, Professor of Computer Science, University of Waterloo.

You keep using that word. I do not think it means what you think it means” (Inigo Montoya) by Dr. Stephen Marsh, Associate Professor of Trust Systems, Ontario Tech University.

"Addressing Cybercrime in Canada through Law Enforcement collaboration, innovation, and partnerships" by Chris Lynam, Director General of the National Cybercrime Coordination Unit and Canadian Anti-Fraud Centre, Royal Canadian Mounted Police.

"From Sea to Sea: Mobilizing to Address Canada’s Cybersecurity Needs" by Jennifer Sloan, Vice President, Public Policy, Mastercard Canada.

"Unified View of IoT and CPS and Trend of Research on Microcontroller Based IoT" by Dr. Xinwen Fu, Professor, Department of Computer Science, University of Massachusetts Lowell.

"Confidence in AI systems -- Can we trust AI-based systems?" by Dr. N. Asokan, Professor of Computer Science, University of Waterloo. 

"Supply Chain Risk – The weakest" link by Rod Hynes, Director Information Security, Bell Canada Enterprise.


Cybersecurity Awareness Month

"Securing the Weakest Link in Cybersecurity" by Dr. Haruna Isah, Research Associate, Canadian Institute for Cybersecurity, Oct. 2021.

"An Introduction to Federated Learning and its Applications in Cybersecurity Domain" by Xichen Zhang, Senior Cybersecurity Software Developer, Canadian Institute for Cybersecurity, Oct. 2021.

"To Each Its Own? IoT Devices Being The Last Line of Defense" by Kwasi Boakye-Boateng, Cybersecurity Researcher, Canadian Institute for Cybersecurity, Oct. 2021.

"Training in Cybersecurity" by Hugh Hicks, Talent and Partnership Development Manager, Canadian Institute for Cybersecurity, Oct. 2021.

"Security in IoT" by Dr. Barjinder Kaur, Postdoctoral Researcher, Canadian Institute for Cybersecurity, Oct. 2021.

"5 Powerful Life-changing Behaviours to Reduce Threats and Influence Cyber Risk" by Erin Hutchison, CIRA, Oct. 2021.

"Building Canada's Cyber Competence and Competitiveness through Standards" by Keith Jansa, CIO Strategy Council, Oct. 2021.

"Alternative Difficulty Adjustment Algorithms for Preventing Selfish Mining Attack" by Hamid Azimy, Cybersecurity Researcher, Canadian Institute for Cybersecurity, Oct. 2021.

"Quantum key distribution: principles, types, challenges, and security promises” by Mohammed Al-Darwbi, Cybersecurity Researcher, Canadian Institute for Cybersecurity, Oct. 2021.

"Threat Intelligence and Operational Technology" by Dr. Ida Siahaan, Research Associate, Canadian Institute for Cybersecurity, Oct. 2021.


SECREV2021

Interpreting AI-Based Cybercrime Prediction,” presented by Dr. Haruna Isah, as part of SECREV2021 with the Human-Centric Cybersecurity Partnership, May 2021.

"Combating Fake News: Trends and Challenges," presented by Dr. Saqib Hakak, as part of SECREV2021 with the Human-Centric Cybersecurity Partnership, May 2021.

A Hub for Cybersecurity Innovation and Talent Development,” presented by Faruk Ener as part of SECREV2021 with the Human-Centric Cybersecurity Partnership, May 2021.


 “Synthetic Data Generation and Evaluation,” presented by Duc-Phong Le as part of SECREV2020 with the Human-Centric Cybersecurity Partnership, May 2020.

"DNS over HTTPS" by Dr. Gurdip Kaur, Post Doctoral Fellow, Canadian Institute for Cybersecurity, Oct. 2020.

"Security and privacy aspects of COVID alert application" by Dr. Sajjad Dadkhah, Research Associate, Canadian Institute for Cybersecurity, Oct 2020.

"Forensics and Anti-Forensics" by Saeed Shafie, Researcher, Canadian Institute for Cybersecurity, Oct 2020.

"Applications of Data Anonymization Technologies" by Jackson Mo, Principal Engineer, Huawei Canada, Oct 2020.

"Challenges of Our Threat Landscape and Outlook" by Helen Oakley, Security Manager, SAP, Oct. 2020.

"Cybersecurity Economics" by Josh Waite, Economic Development Officer, Atlantic Canada Opportunities Agency

"Something Phishy: How to effective roll-out and measure phishing simulations in your organization" by Jon Lewis & Eric Normandian, CIRA, Oct 2020.

"5G Security" by Olivera Zatezalo, CISO, Huawei Canada, Oct 2020.

"Mapping and Understanding Social Networks from a Security and Law Enforcement Perspective" by Dr. David Hofmann, Assistant Professor, Faculty of Sociology, University of New Brunswick, Oct. 2020.

"How to Enable Secure and Private Computation on Digital Assets" by Dr. Kalikinkar Mandal, Assistant Professor, Canadian Institute for Cybersecurity, Oct. 2020.

"Rise of Fake News Over Social Media: Issues and Challenges" by Dr. Saqib Hakak, Assistant Professor, Canadian Institute for Cybersecurity, Nov. 2020.

"Watermarking Textual Deep Neural Networks" by Mehdi Yadollahi, Researcher, Canadian Institute for Cybersecurity, Nov. 2020.

"Real-time Analytics for Cybersecurity" by Dr. Haruna Isah, Research Associate, Canadian Institute for Cybersecurity, Nov. 2020.

"Machine Learning Trends in Cybersecurity" by Dr. Farzaneh Shoeleh, Post Doctoral Fellow, Canadian Institute for Cybersecurity, Nov. 2020.


"Security and Privacy Threats in Mobile Crowdsensing: Challenges and Solutions for the Internet of Things" by Xichen Zhang, Research Assistant, Canadian Institute for Cybersecurity, Oct. 2019.

"Canada's Security and Resiliency Framework - Filling Gaps" by Andrew Easton, Government of New Brunswick, Oct. 2019.

"Selfish Mining and Competitive Selfish Mining in Bitcoin" by Hamid Azimy, Researcher, Canadian Institute for Cybersecurity, Oct. 2019.

"Detecting Insider Threats using Big Data and Machine Learning" by Matthew Ouellette, IBM Security Systems, Oct. 2019.

"Security in Smart Grid" by Dr. Ida Siahaan, Research Associate, Canadian Institute for Cybersecurity, Oct 2019.

"Military Communications Security at the Edge of Disruptive Technological Change: 1918, 1944, and 2019" by Dr. Lee Windsor, Associate Professor, Gregg Centre for the Study of War and Society, University of New Brunswick, Oct. 2019.

"International Enforcement of Cybercrime" by Dr. Janet Austin, Associate Professor, Faculty of Law, University of New Brunswick, Nov. 2019.

"Security and Privacy Challenges of IoT" by Dr. Rongxing Lu, Associate Professor, Canadian Institute for Cybersecurity, Nov. 2019.

"Big Data Security" by Dr. Suprio Ray, Associate Professor, Canadian Institute for Cybersecurity, Nov. 2019.


"Military Communications Security at the Edge of Disruptive Technological Change: An Historical Look at 1918, 1944, and 2018" by Dr. Lee WindsorAssociate Professor, Gregg Centre for the Study of War and Society, Oct. 2018.

"Information Security Management Frameworks" by Chris Lincoln, Security Professional Services in Atlantic Canada, Bell, Oct. 2018.

"Cybersecurity Risk Assessment and Metrics for IoT-based Smart Cities" by Dr. Marzieh Jalal Abadi, Post Doctoral Fellow, Canadian Institute for Cybersecurity, Oct. 2016.

"Fake News Detection" by Xi Chen XhangResearch Assistant, Canadian Institute for Cybersecurity, Oct. 2018.

"Fake News Detection" by Dr. Mahdi Daghmechi Firrozjaei, Post Doctoral Fellow, Canadian Institute for Cybersecurity, Oct. 2018.

"Critical Decision-Making in Crises" by Andrew Easton, Oct 2018.

"Application of Deep Learning in Malware Detection and Classification" by Samaneh MahdavifarCybersecurity Researcher, Canadian Institute for Cybersecurity, Oct. 2018.

"Behavioural Analytics to Defend Against Internal Threats" by Dr. Mohamed S. MamunResearch Associate and Project Manager, Canadian Institute for Cybersecurity, Oct. 2018.

"The ins and outs of penetration testing" by Bernard AssafSystems Architect, Canadian Institute for Cybersecurity, Oct. 2017.

"Android app market security" by Dr. Natalia StakkhanovaAssistant Professor, Canadian Institute for Cybersecurity, Oct. 2017.

"Dark Web monitoring and detection" by Dr. Arash Lashkari, Assistant Professor, Canadian Institute for Cybersecurity, Oct. 2017.

"Web application vulnerabilities — cross-site scripting and SQL injection" by Dr. Dima Alhadidi, Assistant Professor, Canadian Institute for Cybersecurity, Oct. 2017.

"Internet of things security and privacy" by Dr. Rongxing Lu, Associate Professor, Canadian Institute for Cybersecurity, Oct. 2017.

"Big data security" by by Dr. Suprio Ray, Associate Professor, Canadian Institute for Cybersecurity, Oct. 2017.

"Big Data Security" by Dr. Suprio Ray, Associate Professor, Canadian Institute for Cybersecurity, Nov. 2018.