-
Catalogue Entry: Open Government Implementation Plan - Communications Security Establishment - 2020-21
The Open Government Implementation Plan document describes the Communications Security Establishment's (CSE) planned activities and deliverables aligned based on the...-
File available for download in the following formats:
-
Catalogue Entry: CCNSS Bulletin Edition 1 | March 2018
"In This Edition Recent Approval of Two New Standards Recent Discussion on CEO Material Future Meeting Agendas May and September Contact Us "-
File available for download in the following formats:
-
Catalogue Entry: CCNSS Bulletin Edition 2 | June 2018
"In This Edition Recent Approval of Two New Standards Recent Discussion on Physical Security Future Meeting Agendas September and December Contact Us "-
File available for download in the following formats:
-
Catalogue Entry: Guidance on Cloud Service Cryptography (ITSP.50.106)
"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this... -
Catalogue Entry: Guidance on Securely Configuring Network Protocols (ITSP.40.062)
The information in this publication identifies and describes acceptable security protocols and their appropriate methods of use to ensure continued protection of UNCLASSIFIED,... -
Catalogue Entry: Top 10 IT security action items: No. 10 Implement application allow lists -...
This document outlines several best practices for controlling permitted applications on your systems. -
Catalogue Entry: Cyber Mitigation: The Essential Steps
o Essential Mitigation o Application Whitelisting o Spear Phishing o Taking Care of Your Secure Communications Device o Using Portable Media o Mobile Device Management-
File available for download in the following formats:
-
Catalogue Entry: IT Security: An Individual and Collective Responsibility
Risk Management Cyber Mitigation – Patching Best Practices – Passwords Securing WLANs Procuring Assured Products for Protected B Networks-
File available for download in the following formats:
-
Catalogue Entry: Building Stronger Cyber Security
o Top 10 For Everyone o Put Your Money Where Your Data Is – Invest In Cyber Security o CSE’s Assessment On Cyber Threats To Canada’s Democratic Process o The Forecast On Cloud...-
File available for download in the following formats:
-
Catalogue Entry: Partnering for Secure and Resilient Canadian Systems
o The Canadian Centre for Cyber Security o Meltdown and Spectre o Trending Topic: Cloud Benefits o COMSEC Update o Assemblyline o CSE in the Community: Hackergal o ITSLC News-
File available for download in the following formats:
-
Catalogue Entry: Network Security: Protecting Our Information Assets
o Network Security Zones o Smart Computing Tips for Everyone o Securing WLANs o Risk Management for iPads o Common Challenges to Adopting a Risk Management Strategy o Minimizing...-
File available for download in the following formats:
-
Catalogue Entry: Protecting Classified Information
o 5 Tips for Protecting Classified Information o Modernizing our Secret Infrastructure o Security Categorization for an Open Government o Go Ahead...This Line is Secure o...-
File available for download in the following formats:
-
Catalogue Entry: Be Proactive: Prevent Malicious Attacks On Your Network
o Don’t Fall Victim to Ransomware: 5 Actions to Protect Your Network o Cyber Security Event Management Plan o Treasury Board Secretariat of Canada “Engarde” Exercise o How Are...-
File available for download in the following formats:
-
Catalogue Entry: Keeping Pace with Emerging Threats
o CSE’s Top 10 Security Actions o The Dangers of Free Dynamic DNS o Using a Blackberry as a Hotspot o Cyber Security Considerations for Management o Hardware Security Modules o...-
File available for download in the following formats:
-
Catalogue Entry: Keeping our Information Secure
o Instant Messaging Security Risks o Spotting Malicious Emails o GC CIRT Pointer: Exploit Kits o Securing your GC SECRET Network o Sharing Information across Different Security...-
File available for download in the following formats:
-
Catalogue Entry: The Changing Nature of How We Work
o Web 2.0 Security Risks o Data Diodes in a Cross-Domain Solution o The Importance of a Departmental TA o Two-Factor Authentication o Cloud Computing-
File available for download in the following formats:
-
Catalogue Entry: Building a Resilient Network
o Interview: Why the Top 10? o Denial of Service o Mobility Security o Cyber Security Awareness Month o Zero-Day Exploits o Disposition of Windows XP o Cross Domain Solutions-
File available for download in the following formats:
-
Catalogue Entry: Building a Strong Foundation for the GC
o Social Media Security Pitfalls o Success of your Departmental Mission o Anatomy of a Cyber Intrusion o Securing BlackBerry Devices o Using Wi-Fi While Travelling-
File available for download in the following formats:
-
Catalogue Entry: Continuing to Advance Our IT Security Goals
o Canadian Medium Assurance Solutions o Shared Services Canada’s Security Operations Centre o CSE’s Top 10 and Shared Services Canada o CSE’s Top 10 in the Mobile Environment-
File available for download in the following formats:
-
Catalogue Entry: Cyber Threats To Canada's Democratic Process
The recent cyber threat activity against the democratic process in the United States and Europe has raised concerns about similar threats to Canada. In this assessment, we...-
File available for download in the following formats: