Evidence of meeting #157 for Public Safety and National Security in the 42nd Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was security.

A video is available from Parliament.

On the agenda

MPs speaking

Also speaking

Mark Ryland  Director, Office of the Chief Information Officer, Amazon Web Services, Inc.
Richard Fadden  As an Individual
Steve Drennan  Director, Cybersecurity, ADGA Group
Clerk of the Committee  Mr. Naaman Sugrue

5:05 p.m.

NDP

Matthew Dubé NDP Beloeil—Chambly, QC

I appreciate that. In keeping with this issue, is there a particular issue for cyber, though? If you're a company that's building helicopters, you're not selling helicopters to the Department of Finance, but to DND. However, if you're operating in cybersecurity, Finance needs cybersecurity as much as DND does. Is there an issue there even where our traditional sort of military alliances make it easy to cut off people for security clearance when it comes to traditional military procurement, but it's more challenging when...? Is there an issue where, if you're involved in cybersecurity for the Department of Finance, let's say, and you're using a company that has skills coming from people who might not be recognized on the defence side? Do you see what I'm getting at?

You mentioned that security clearances are different. As Canadians, are we losing out on having proper protections, say, for the finance department because we're applying the same rules we would apply in defence because we're trying to create that uniformity where the alliances might be different and how it plays out in terms of—I mean who cares what the Americans have to say if we're protecting the Department of Finance, for example, unlike the military where we actually have an alliance with them?

5:05 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

I don't think the discrepancy is the issue. I think the issue is time. Now you're losing a year or two years sometimes before you can get key people in on engagements. For some of the cyber knowledge you want, you could take a group of people—I think we talked about how people can be accelerated and there's been witness testimony on how we can get people started quite quickly into cybersecurity, entry level positions and others. If you have a key group of people whom you can clear based on adding some people who are trusted from companies—and sometimes you need subject matter experts, let's say, from the U.S. So comparable clearances and moving quickly on it is fundamental. Sometimes what happens is that it's more about the time that we lose because of all these different clearances and that the impact of that is direct to national defence and to other groups that can't get teams meaningfully started for a year or two sometimes. The Department of Finance might not require as many clearances. DND requires what's also called a VCR at each site, but other entities don't do that. It's about having the same standards applied to everyone. If the data is more sensitive, that's what the clearance should be for everyone.

5:05 p.m.

NDP

Matthew Dubé NDP Beloeil—Chambly, QC

With the 20 seconds I have left, I'm just wondering if you believe that we shoehorn or pigeonhole ourselves rather too much by looking at the traditional alliances and some of the countries that are comparable to Canada and that might have the expertise, but because they're not part of the traditional paradigm that we look at, we're maybe missing out on some of that talent.

5:05 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

Yes and no. I think we can go to the Five Eyes community and get a lot of that talent and have comparable clearances, but yes, we should also look at extending to other countries. How do we have a fast track clearance process from other countries so we can trust individuals for information, and how can we do it quicker?

5:05 p.m.

Liberal

The Chair Liberal John McKay

Thank you, Mr. Dubé. That was interesting analysis. The analyst here whispered in my ear, “That's exactly one of the big problems, just getting those clearances”.

Mr. Picard you have six minutes please.

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

It's nice to see you again. You provide services to financial institutions, is that right?

5:05 p.m.

Director, Cybersecurity, ADGA Group

5:05 p.m.

Liberal

Michel Picard Liberal Montarville, QC

What was the comment you made about the fact they would be the trusted company or the guardian of this critical information? What was that again?

5:10 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

It's a really key point. I just didn't have enough time to go into it too much, so thank you for the opportunity.

We all trust when we walk into a bank, and we all trust when we walk into the Bank of Canada, or one of these trusted places like the Department of Finance. That is something that can be leveraged in a very positive way. One of the things we talk about is passwords. When you're setting up credentials online, you have to be able to trust how you set that up. I think we should be leveraging that space and those personas and organizations more. That can establish more security for those online credentials and it can play a broader role. It can be more uniform as well. That's a key thing. We can set up stronger credentials that are more uniform that could be used in a more specific way for cybersecurity.

5:10 p.m.

Liberal

Michel Picard Liberal Montarville, QC

Doesn't that create an awkward situation where a bank would be the guardian of my critical information instead of the bank having access to some third party being responsible for that information, because you put the customer in a vulnerable situation where he has to deal with the bank, being secure of course, but at the same time the objective of the bank is to make money, not to guard my information? That puts the customer in a weak situation with the bank.

5:10 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

The main thing would be that the bank would play a role called a “registration authority”. The bank doesn't have to have the data.

I think you've been briefed on tokenization. The data wouldn't have to be held by the bank; the bank could be the enabler of saying, “You are who you are, we know it, you've come into a bank, we trust you, you trust us, we've done a registration check.” It would be a function in support of setting up the online identity rather than holding the data.

5:10 p.m.

Liberal

Michel Picard Liberal Montarville, QC

You were quite positive about the earlier comments of AWS about centralized structure and an iCloud type of system where everything is at the same place.

There are two things. First, does that mean you support any initiative towards open banking where everything is in the same place?

At the same time, we talk about those centralized systems with such trust in their security that we don't feel the necessity to discuss an insider job or human risk factors. It's as though they don't exist anymore.

5:10 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

Yes, I am in favour of using secure public cloud. That would mean large data storage, but the ability, then, to detect attack correctly when it's happening and protect the data better.

In terms of protecting that data, there are lots of mechanisms that can be used. For example, there are good products for cloud that enable you, at the field level, to encrypt data whenever you need to. If you have an insider threat and there's a breach, the data that's stolen is encrypted data. It's protected because it was protected properly as you stored it.

What we don't do a lot sometimes is organize our security design correctly, so when we're breached, we're not protected properly. We don't detect it fast enough and we don't know how to respond. To your point, if we organize ourselves and there is an insider threat, the data can be protected and we can more quickly detect and respond to the event, too.

One example I'm sure everyone is aware of is Snowden. He actually had a lot of access, and then was able to give himself more access. That's not exactly the paradigm you want to have in an environment. There are better ways of doing that.

5:10 p.m.

Liberal

Michel Picard Liberal Montarville, QC

I'll leave the rest of my time to Mr. Graham.

5:10 p.m.

Liberal

The Chair Liberal John McKay

Mr. Graham.

5:10 p.m.

Liberal

David Graham Liberal Laurentides—Labelle, QC

Thank you.

Mr. Drennan, in the three minutes that Mr. Picard has been asking questions, I logged into a server, and using raw SMTP, sent myself an email from god@heaven.org. I think this brings to a big part of your spear phishing discussion the question, why is it that we are still using protocols that are completely hackable like that?

There's no authentication whatsoever in SMTP. I can put any spoofed address that I want. SMTP SSL is not universal, but it doesn't prevent spoofing in any case. Therefore, is there a role for, say, PGP signing our emails as a standard, or is there something we can do to sign cryptographically? Is that an approach we should be looking at?

For whatever reason, that has not taken off in the 25 years it has been around.

5:10 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

I'm speaking from some first-hand experience, but it's probably because PKI, or public key infrastructure, can be a bit of a big hammer in actually deploying certificates. Then what assurance of certificates are you deploying, and are they proprietary?

S/MIME was very good, but the point is that there are ways of establishing identity and having digital certificates, or proof of the message originator and who sent it and whether it has been tampered with, that can be added and done better.

Absolutely, there are technologies. If we standardized on one, that would be good. I don't know if we need full public key infrastructure. We have to be careful about what digital certificate approach we take, given the massive community that would be involved in the financial community.

5:15 p.m.

Liberal

David Graham Liberal Laurentides—Labelle, QC

What system would you suggest we use to authenticate? Email is the greatest source of all vulnerabilities as far as phishing, and so forth, is concerned, so what should we use?

What do you use?

5:15 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

Well, we're moving away from email. That's more for productivity reasons. Email is not necessarily being used for what it was created for. There are things such as Slack and other tools that can create more efficient conversations.

Earlier we talked about user awareness. People need to know how to use email and what to click on. Just because everything is encrypted doesn't mean a bad actor didn't send an encrypted email to you, so it still comes down to that point.

There are ways to do it. If we wanted to have a portal service where there would be secure emails kept in a location that you could pull down, that would an option. There's time-to-live encryption, so that when you send messages, they're encrypted, and then if you don't open them fast enough, they expire and disappear.

There are some options to look at.

5:15 p.m.

Liberal

David Graham Liberal Laurentides—Labelle, QC

Like key signatures.

5:15 p.m.

Liberal

The Chair Liberal John McKay

Thank you, Mr. Graham.

There are four minutes left. Are there any questions on the Conservative side?

Mr. Eglinski, do you want to use four minutes?

5:15 p.m.

Conservative

Jim Eglinski Conservative Yellowhead, AB

You were talking about security along with Mr. Dubé. At your company, which works a lot with many government agencies, what security level do you look at for your people, or do you have to get them a secret or a top secret level?

5:15 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

In our cybersecurity team in the organization, we have a lot. We have the ability to hold and process top secret information. We have classified environments. We all get top secret clearance and these extra clearances that we were just talking about. We do that because it enables us to be able to do the contracts we were talking about earlier. We know we have to do it. It affects whom we can hire as well, and that's an unfortunate byproduct because we always want to get as much diversity as we can. But we get all the top clearances for sure. And some other parts go with it for—

5:15 p.m.

Conservative

Jim Eglinski Conservative Yellowhead, AB

You seem to be a little on the negative side. There seems to be a lot of.... I used to do top secret investigations for security clearances, and a lot of work is involved in them. But you think that we should be reducing our level or our standard?

5:15 p.m.

Director, Cybersecurity, ADGA Group

Steve Drennan

No, creating more consistency.