Evidence of meeting #155 for Public Safety and National Security in the 42nd Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was data.

A video is available from Parliament.

On the agenda

MPs speaking

Also speaking

Gregory Smolynec  Deputy Commissioner, Policy and Promotion Sector, Office of the Privacy Commissioner of Canada
Leslie Fournier-Dupelle  Strategic Policy and Research Analyst, Office of the Privacy Commissioner of Canada
Glenn Foster  Chief Information Security Officer, Toronto Dominion Bank

4:55 p.m.

Liberal

The Chair Liberal John McKay

Thanks, Mr. Foster.

As you know, you generally have a 10-minute opening statement. The committee would not be upset if that were less than 10 minutes. So with that—

4:55 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

I'll do my best.

4:55 p.m.

Liberal

The Chair Liberal John McKay

It's an opportunity. Please, go ahead.

4:55 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

Thank you.

My name is Glenn Foster. I'm the senior vice-president and chief information security officer of TD Bank Group. I'm responsible for TD's cybersecurity program across all of TD's activities globally.

TD is the sixth-largest bank in North America by branches and serves more than 25 million customers. We rank among the world's leading online financial services firms.

I'm here to talk to you about cybersecurity and its impact on financial services, Canadian consumers and national security. Traditional banking services have continued to become more digital. A recent CBA poll found that 76% of Canadians are using digital channels, both online and mobile, to conduct most of their banking transactions.

More than half of those polled say this is their most common banking method. This is true for TD customers as well. We have more than 12.5 million active digital customers and 7.5 million total active mobile customers. We complete 1.1 billion digital transactions per year in North America, and we have the highest digital penetration of any bank in Canada, the U.S., the U.K., and other parts of Europe.

Meanwhile, cyber-threats continue to become more sophisticated, driven by the commoditization of crime in the underground economy; the loss of top secret nation state intelligence technologies, when made available to bad actors; innovative technologies that spur advances in automation; geopolitical tensions and increased activity against global financial service participants and payment systems.

Recent economic sanctions have further increased tensions and have motivated retaliatory actions, cyberespionage campaigns, and attacks on financial services and critical infrastructure globally by nation state actors.

The proliferation of data breaches has significantly exposed consumer data and places pressure on banks' ability to authenticate customers.

This exposure of consumer data has also led to new automated attacks in which criminals leverage stolen account credentials and test them against online banking sites at a significant rate, an attack that's known as credential stuffing.

At TD, we have invested heavily in cybersecurity as one of our top priorities to ensure that we can protect our customers and live up to the high expectations of trust they place in us. We have a strong history of information sharing and collaboration with other Canadian banks through the Canadian Bankers Association, and across sectors of the Canadian economy through the newly formed Canadian Cyber Threat Exchange. We understand how critical it is to share intelligence on threat actors, and we consider it a best practice to combine our defences, as our ability to prevent, detect and contain cyber-attacks increases significantly when we work together as opposed to individually.

The effectiveness of our information sharing is limited based on current privacy laws and legal barriers. Legislative reforms allowing for safe harbour provisions for proactive protection could benefit our efforts. We support the government's creation of the Canadian Centre for Cyber Security under the Communications Security Establishment. We've been a long-time proponent of centralized authority for collaboration with the private sector.

Working with the Canadian Cyber Threat Exchange, we have established a solid structure for public-private partnerships and sharing. The critical part of the centre's mission should be not only information sharing and intelligence but also developing and implementing national strategies for cyber resiliency, preparedness and response.

The centre should be effectively resourced to engage with the private sector in establishing and measuring minimum security baselines for critical infrastructure sectors. The public and private sector would also benefit from coordinated resiliency tests and response capabilities verus systemic cyber events for critical infrastructure, which will prepare the centre to be the central point of coordination with the private sector in response to a national security threat.

It is important to note that cyber protection and safety are the responsibilities of not only financial institutions and government but also Canadian consumers.

Security practices fail when individuals do not understand their personal accountabilities and do not practise due care in their digital lives. Therefore the new national strategy is focused on educating Canadian citizens on cyber safe practices, which is vitally important to increasing their literacy with regard to risks and expectations.

The ever-increasing cybersecurity demands require a robust and highly skilled workforce. Various external benchmarks suggest an unmet demand of over one million open positions for cyber talent in North America alone.

At TD, a premier employer in Canada, our focus on talent is a top strategic pillar of our cyber program. We face increasing competition for cyber talent in Canada, and we are collaborating with academic institutions to create strategic partnerships such as the one mentioned in our announcement last year of our partnership with the cybersecurity institute of the University of New Brunswick.

We have also expanded our geographic footprint to the United States and Israel to meet talent demands. We are committed to growing the next generation of cyber talent here in Canada and encourage the federal government to accelerate the development of robust educational programs at Canadian universities to provide for the cyber workforce of tomorrow.

I am pleased to be here to discuss Canada's approach to cybersecurity, and I look forward to our discussion.

5 p.m.

Liberal

The Chair Liberal John McKay

Thank you, Mr. Foster.

Mr. Picard, we will go with the six-minute rounds again.

5 p.m.

Liberal

Michel Picard Liberal Montarville, QC

Welcome, Mr. Foster.

In how many countries can we find TD bank offices or branches?

5 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

I don't know the exact number. I would have to get back to the clerk.

We're primarily a North American bank with other securities investments firms overseas.

5 p.m.

Liberal

Michel Picard Liberal Montarville, QC

Is the network that you use for your transactions in Canada a private network, or is it the Internet—the web in general? How is the security managed when you have access to your bank from outside Canada through your branches or offices?

5 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

We have various connection methods based on the products or the stores or branches themselves, but the majority of our transactional traffic is through our online and our mobile applications, which will be coming in over the Internet.

Those connections are based on both browsers and our proprietary mobile applications that customers very commonly put on their smart phones, and they use standard PKI-based encryption to protect those transmissions from end point to end point.

5 p.m.

Liberal

Michel Picard Liberal Montarville, QC

Is the information related to Canadians only for personal identification or information all in your server in Canada, or can some of that information be found or copied elsewhere in your branches in foreign countries?

5:05 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

All of TD's data centres reside within Canada.

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

So outsiders, i.e., TD bank outside of Canada, or any other third party talking to your server, then enters into your server in Canada in order to have access, if possible, to the information that you have.

5:05 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

Yes.

For our core banking systems, there would be direct connectivity to us within our data centres in Canada. Now, TD does have external third party service providers for various banking services and customer services. Those services may reside within other countries, such as the United States.

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

We cannot compare your system with other companies', of course, because it's private, but we are talking more and more about open banking. What is your take on that?

5:05 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

As a security professional for a number of years, my opinion is that the integrity of any security scheme is reliant on a closed loop between the consumer of services and the service provider of the banking services. Any intermediary that's in between inherently weakens the security scheme.

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

With the concept of open banking, do I understand it correctly when you say that if there will be a third party, that's a vulnerability to the system?

5:05 p.m.

Chief Information Security Officer, Toronto Dominion Bank

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

Do you need a unique system then?

5:05 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

When it comes to authentication of credentials, a third party would inherently have to have access to those credentials for online banking. Of course, there are various models. There's the U.S. model, which is very much market driven, which allows us, as banks, to contract with these third parties and provide certain assurances over their security. The U.K. model is very much open; therefore, anyone could consume those services.

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

If or when you are a victim of a hacking or an attack, do you declare this to an authority, and how long do you do it after the fact?

5:05 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

I'm sorry. Could you repeat the question?

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

When you are a victim of a hacking aggression, do you declare that to an authority somewhere—to the government—and how long after the fact do you declare that?

5:05 p.m.

Chief Information Security Officer, Toronto Dominion Bank

Glenn Foster

Our primary regulator, which is OSFI, provides very prescriptive guidance on reporting requirements. The requirement is 72 hours, based on a described severity scale.

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

Thank you.

I had six minutes.

5:05 p.m.

Liberal

The Chair Liberal John McKay

You have a couple of minutes left.