Evidence of meeting #154 for Public Safety and National Security in the 42nd Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was cybersecurity.

A video is available from Parliament.

On the agenda

MPs speaking

Also speaking

Ron Green  Executive Vice-President and Chief Security Officer, Mastercard Canada
Thomas Davies  National Financial Services Cyber Leader, EY
Charles Finlay  Executive Director, Cybersecure Catalyst
Robert Gordon  Executive Director, Canadian Cyber Threat Exchange
Ruby Sahota  Brampton North, Lib.
Earl Dreeshen  Red Deer—Mountain View, CPC

4:35 p.m.

NDP

Matthew Dubé NDP Beloeil—Chambly, QC

In other words, you would have the merchant name, the card number and the amount, essentially.

4:35 p.m.

Executive Vice-President and Chief Security Officer, Mastercard Canada

4:35 p.m.

NDP

Matthew Dubé NDP Beloeil—Chambly, QC

That's not necessarily stored in Canada, so is that subject to protection from Canadian law?

4:35 p.m.

Executive Vice-President and Chief Security Officer, Mastercard Canada

Ron Green

We have to be compliant with Canadian law for the data for Canadian citizens. Right now the majority of transactions take place at our St. Louis or Kansas City facility. There are other locations that also do work for us. The data needs to remain local only. From where I sit globally I can see threat actors attempt to work against the payment system no matter where they are. But as countries localize or look for localization of data, and that data can't be used in other places, the ability for me to analyze and see where the threat actor moves becomes more difficult.

The threat actors don't care about borders. They're willing to attack Latin America or Europe or Canada or the U.S. If I can see their attacks taking place in Latin America, but I'm not allowed to use that information to help protect another country, the attacker can then move without my using the learning to protect the other, so attackers can continue to attack different places without my using the information to help protect it.

4:40 p.m.

Liberal

The Chair Liberal John McKay

Thank you.

Mr. Picard.

4:40 p.m.

Liberal

Michel Picard Liberal Montarville, QC

Thank you.

Mr. Davies, you provide consulting services to financial institutions. In business, one challenge is to properly manage security investments and risks. It's about balance. When it comes to investing in security measures, we must consider whether paying for any possible damage would be cheaper than or equal to the cost of investing in security.

For a long time, the perception was that financial institutions limited their investments in security and chose to pay for damage that occurred as a result of incidents because it was more beneficial. Is this type of resistance still encountered or has the market changed with regard to security?

4:40 p.m.

National Financial Services Cyber Leader, EY

Thomas Davies

I would say that they are investing heavily in protection in cybersecurity. There is brand and reputational risk. While in the community we talk about not competing on security itself, I believe the financial institutions do compete on customer trust.

The biggest issue the financial institutions have today is actually having the individuals necessary to deploy the capital. They have robust budgets and they set aside adequate funding, but to try to get through as many projects as they do with the limit in skill shortage becomes a challenge.

4:40 p.m.

Liberal

Michel Picard Liberal Montarville, QC

It should be noted that third parties that have access to financial institutions may not have the financial means or tools to protect themselves from risks. As a result, they may represent an access risk to the financial system. Do the industry's security investments still protect the market?

4:40 p.m.

National Financial Services Cyber Leader, EY

Thomas Davies

Third parties that service financial institutions are considered one of their greatest risks. The financial institutions develop a really strong security program but then can be weakened by an external party. Third party risk is something taken very seriously by the financial institutions.

I think one of the issues is that people believe that cybersecurity is an overly complicated domain when a lot of breaches occur due to the basics being missed. I think that proper education, in terms of what the basics are and how to go about resolving them, can greatly mitigate that risk. We are seeing financial institutions start to basically mandate that their third parties have certain minimum controls inside of contracts and that there is an assumption of risk along with them. In Canada we have OSFI that regulates the banks. If a third party is the reason for a breach, OSFI doesn't really care that it was a third party. It still holds the bank liable, so the banks are taking this very seriously and are going through heavy risk programs to mitigate this issue.

4:40 p.m.

Liberal

Michel Picard Liberal Montarville, QC

My next question concerns human resources, and it's for Mr. Davies and Mr. Green.

From a consulting perspective, the focus is on recruitment, while from a client perspective, for example at Mastercard, the focus is on the risk posed by human resources.

I want to share an anecdote. A number of years ago, I filled in a credit card application form properly—I won't say which card. When I received the card, the credit limit had already been exceeded. Obviously, I contacted the security department. The problem wasn't caused by me, but by the security department when the card was issued. The problem came from the inside.

In a previous life, I attended Canadian Bankers Association meetings, where we talked about payment terminals that were impossible to break into. However, the terminals were broken into within three weeks. We think that there's still a risk of inside jobs.

How is this human resources risk, which seems to lead to a dead end, managed for both the client and the consultant?

4:45 p.m.

Executive Vice-President and Chief Security Officer, Mastercard Canada

Ron Green

We do a great deal of background checking on our employees before we bring them on, but we also have insider threat programs. We know what the correct or usual behaviour is, and then we look for anomalies. I had an opportunity to take my board through what we have in our insider threat program, but we have a way of sensing when people are acting abnormally.

When those triggers are set, then my team will launch an investigation to see if the employee is acting in a way that is not in the best interests of the company.

Additional to that, we have employees who have high-risk roles. The things that they do allow them the ability to make or destroy machines, or things like that.

We have an increased level of monitoring, so my guys watch what it is that they're doing. It's all in behind the scenes, but it happens to make sure they they're doing the things that they are supposed to. If they're not, then we respond to it.

4:45 p.m.

National Financial Services Cyber Leader, EY

Thomas Davies

I'll add that the insider threat is the number one concern of most chief risk officers, because of the magnitude of the event when it occurs. You know, the Edward Snowden discussion comes up often in terms of national security. The idea that an insider has access to privileged information is always a concern.

There is a discussion around enhanced monitoring under what we call powerful users, people who have—to Mr. Green's point—powerful privileges inside the organization, and making sure to mitigate the risks.

So one account is frauded, that's a mitigated risk, and there's a certain risk tolerance you have to have internally. You can't guarantee that nobody will do a bad thing, but you can minimize the impact and do some basic training and awareness.

When I was a member at Scotiabank the code of ethics, business conduct, know your customer, and anti-money and laundering training were mandatory. It is important to have that be a mandatory component and to at least give everybody the sense that you're here to do the right thing.

4:45 p.m.

Liberal

The Chair Liberal John McKay

Thank you.

Mr. Motz, you have four minutes, please.

April 1st, 2019 / 4:45 p.m.

Conservative

Glen Motz Conservative Medicine Hat—Cardston—Warner, AB

Thank you, Chair, and thank you for being here, gentlemen.

Mr. Gordon, we've heard from previous witnesses to this committee that countries like Australia and Israel have pretty effective information-sharing networks between industry, government and academia. We haven't heard necessarily that the same exists in Canada. Could Canada improve in this regard, and if so, how should we go about doing that?

4:45 p.m.

Executive Director, Canadian Cyber Threat Exchange

Robert Gordon

I think we actually are improving. I think one of the big steps was creating the new cyber centre to do that. It's one of the reasons why we're working so closely with them to do that linkage between what the private sector is doing and what the government's doing.

As a matter of fact, we're working with some Australian organizations to create an organization in Australia similar to the CCTX, to do that cross-sector piece. It's one of the ways of bringing together all of the companies, all regardless of size or what they're doing, and bring them forward in a way they can start to interact with the government.

The government's going to be looking after the cyber centre, a fairly narrow window into the critical infrastructure—that's what they are going to scale to—and they're looking at us to expand that out to all the those sectors and areas that aren't going to be covered by what they're doing. The government can be providing some general advice, but a lot of it is taking the general advice and saying, we need to do something in technology, but as an individual within a company, how do I actually do that?

It's a little bit of the skills development that Mr. Finlay was talking about. We're trying to bring that along, to take the knowledge the government is providing and then translate that by getting individuals who are going to execute on using that technology to sit down and figure out how you actually do some of these things.

4:50 p.m.

Conservative

Glen Motz Conservative Medicine Hat—Cardston—Warner, AB

Your organization has a platform that's now more accessible to the smaller markets, to small and medium-sized business, and they're taking advantage of that.

Have you observed any attacks in those start-ups, in those smaller enterprises, that have grown from there?

4:50 p.m.

Executive Director, Canadian Cyber Threat Exchange

Robert Gordon

On the companies that we have, no, but that's been happening.

A lot of examples come out of small companies. Part of the supply chain is being the source of the target into the much larger organizations. It's one of the reasons—and it was said previously— the banks are so interested in looking at their third parties and what they can be doing to try to enhance the cyber-resiliency of that third party, because they're all hooking into their systems.

It extends beyond that into literally every sector. For example, when dealing with the owners of large buildings who are now worried about all the tenants of their building hooking into them, you're only as strong as your weakest link. Every sector is going through the same issue.

4:50 p.m.

Conservative

Glen Motz Conservative Medicine Hat—Cardston—Warner, AB

A previous witness to this committee said that Canada is often the first victim of attacks, and it's partly due to the fact that we have fewer resources than our friends to the south have.

In your exchanges and with the allies, have you seen that to be so?

4:50 p.m.

Executive Director, Canadian Cyber Threat Exchange

Robert Gordon

That we're being attacked first, or...?

4:50 p.m.

Conservative

Glen Motz Conservative Medicine Hat—Cardston—Warner, AB

You have a lot of interaction with our allies.

Are you seeing that Canada sometimes might be the first point of attack on some of these issues, as opposed to some of our allies?

4:50 p.m.

Executive Director, Canadian Cyber Threat Exchange

Robert Gordon

Yes. The attackers will come after countries for a variety of reasons.

In some instances, we may be the only target of an attack coming in, and other times we'll be a jumping-off point for attacks starting here and going elsewhere, or we can be the second country going down, where the attack starts somewhere else and then comes over to Canada. We get hit in all three areas.

4:50 p.m.

Conservative

Glen Motz Conservative Medicine Hat—Cardston—Warner, AB

That's perfect.

Mr. Davies, in your view, what are the biggest cybersecurity shortcomings that you see or experience in the Canadian financial sector?

4:50 p.m.

National Financial Services Cyber Leader, EY

Thomas Davies

The biggest issue they have is legacy sprawling systems, and proper hygiene over those systems is still extremely challenging. Security tooling doesn't really exist for a lot of older systems, where they have to build what we call a ring fence to protect that asset. It's still the number one issue. It sucks time.

4:50 p.m.

Conservative

Glen Motz Conservative Medicine Hat—Cardston—Warner, AB

I have a follow-up to that, because it's important to that issue.

You're right. If you're old like John and me—

4:50 p.m.

Liberal

The Chair Liberal John McKay

Thanks very much.