2011 issue 3

TABLE OF CONTENTS

BY EDWARD R. MYERS

National security is threatened where political spies operate.

BY LCol PAUL M. THOBO-CARLSEN

The CF Unit protects our defence agents from terrorism, espionage, sabotage...

BY KARL PAYEUR

Human weaknesses provide a fascinating look at vulnerabilities from within.

BY EDWARD R. MYERS

ISACA is an international organization offering tools, training, and networking to IT based organizations.

Canada Is A Target of Chinese Espionage
BY J. MICHAEL COLE

Examining the threat to Canada from Chinese espionage is examined.

BY MICHEL JUNEAU-KATSUYA

Dealing with motivation, coercion, and threat vulnerability drivers.

BY GUY CHAMBERLAIN

Common sense measures will help stop careless disclosure of key information.

BY STEPHEN MOORE

Protocols will allow multiple users to cooperate in the fight against intrusion.

From Corporate Espionage
BY DORON BERGERBEST-EILON

Corporate managers of the nation's largest companies are responsible for 85% of all critical infrastructure components.

BY LOIC BERNARD

Advanced Persistent Threats (APT) is the new watchword when it comes to the latest in cyber threats.

BY JEAN LOUP Le ROUX

Comparing ITAR restrictions with the Controlled Goods Directorate.

BY EDWARD R. MYERS

CADSI holds Ottawa's largest multi-jurisdictional security conference.

BY CINDY HANNA

The Deputy Chief of Calgary Emergency Management Agency looks to his tablet for timely and accurate mapping information during emergency events.

One Last Thing
BY SCOTT NEWARK

Can we recognize the degree of vulnerability at stake in cyber infrastructure?