Evidence of meeting #93 for Public Safety and National Security in the 44th Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was cybersecurity.

A video is available from Parliament.

On the agenda

MPs speaking

Also speaking

John de Boer  Senior Director, Government Affairs and Public Policy, Canada, BlackBerry
Jennifer Quaid  Executive Director, Canadian Cyber Threat Exchange
Francis Bradley  President and Chief Executive Officer, Electricity Canada
Chris Loewen  Executive Vice-President, Regulatory, Canada Energy Regulator
Leila Wright  Executive Director, Telecommunications, Canadian Radio-television and Telecommunications Commission
Christopher Finley  Director, Emergency Management and Security, Canada Energy Regulator
Steven Harroun  Chief Compliance and Enforcement Officer, Canadian Radio-television and Telecommunications Commission
Anthony McIntyre  General Counsel and Deputy Executive Director, Legal Services, Canadian Radio-television and Telecommunications Commission

9:10 a.m.

Liberal

The Chair Liberal Heath MacDonald

Ms. Normandin, you have two and a half minutes, please.

9:10 a.m.

Bloc

Christine Normandin Bloc Saint-Jean, QC

Thank you, Mr. Chair.

My question is for all the witnesses. They should feel free to answer it.

Bill C‑26 strikes a type of balance between the items already enshrined in the bill and the regulations. I gather that many definitions will come from the regulations, penalties, all the people involved, and so on.

Cybernetics is a fast‑paced sector. While regulating a good portion of the sector can provide some flexibility, it can also hamper efforts to keep smaller companies up to date and informed of the latest developments.

I would like you to comment on the balance between the two.

9:10 a.m.

Senior Director, Government Affairs and Public Policy, Canada, BlackBerry

Dr. John de Boer

I think there still needs to be clarity in terms of some of the definition issues. For equilibrium in terms of, for instance, sanctioning and fines, etc., there needs to be some level of consequence for negligence—for failure to implement a baseline cybersecurity standard.

There also needs to be encouragement for large critical infrastructure entities to ensure that their supply chain is secure. That means working closely with the small and medium-sized businesses.

The other thing I would add is that in the United States, the U.S. government has created a grant program to enable critical infrastructure entities to put in place certain baseline cybersecurity requirements. That could be another suggestion.

The last thing I would mention in terms of the right equilibrium is that this law pushes a prevention-first approach. We know that in medicine, prevention is oftentimes better than the cure. Let's get people to invest up front.

9:15 a.m.

Executive Director, Canadian Cyber Threat Exchange

Jennifer Quaid

If I can pick up on what Mr. de Boer was saying in terms of incentives for those small and medium organizations, if we enable the larger organizations to share openly, truthfully and fully with the small and medium organizations about what they're seeing and doing, and support them so that they don't get hit with the same attack, the prevention is better than the cure. That will help.

Another approach we could take is to incentivize businesses that are not necessarily the ones covered by this legislation—that's a separate piece—but the supply chain. We can incentivize the supply chain to reach a level of cyber-maturity through tax incentives or through insurance breaks, if they have certifications.

9:15 a.m.

Liberal

The Chair Liberal Heath MacDonald

Thank you, Ms. Normandin.

For our last questions, we'll have Mr. Julian, please.

9:15 a.m.

NDP

Peter Julian NDP New Westminster—Burnaby, BC

Thank you, Mr. Chair.

I'd like to congratulate Mr. Motz on asking the first question for the Conservatives on Bill C-26, a month into the study.

I'd like to go back to you, Ms. Quaid, on the issue of consultation.

There's also the question of whether or not we're increasingly a target because of the lack of action and delay around important legislation.

My third question comes back to your recommendation around expenses for joining, if I have this correctly, the Canadian Cyber Threat Exchange. To what extent would that be a cost? You said there is no cost, but I'm sure there would be. Have you evaluated what that would be and what the advantages are from that?

Those are three questions for two minutes.

9:15 a.m.

Executive Director, Canadian Cyber Threat Exchange

Jennifer Quaid

I'll take the last question first, which is the reference to joining the CCTX.

In fact, I said a Canadian cyber-collaboration organization—not necessarily ours, although that would be wonderful. When I said there's no cost, it's that there's no cost to the government for that because it would be part of the ITB program. Any of the organizations or companies that are working through or impacted by the ITB program could join a threat-sharing association, so that they can be more aware of what's going on in the cyber-ecosystem, such as what the attack vectors are likely to be, and remediation and resiliency solutions.

That's the first one. There's no cost to the government. There is a cost for us, but it's nominal for small businesses. It's really small.

I believe the other question you had earlier was on consultation.

9:15 a.m.

NDP

Peter Julian NDP New Westminster—Burnaby, BC

It was on the consultation process.

9:15 a.m.

Executive Director, Canadian Cyber Threat Exchange

Jennifer Quaid

There was certainly an opportunity for consultation several years ago. We participated in that with our members, as well, because we reached out to them. It became a trickle-down process, but it would be nice to see something like Bill C-26 running in concert with a national cyber-strategy.

The consultation was several years ago and is now two years behind. I see that coming down the pipeline.

What was the third question?

9:15 a.m.

NDP

Peter Julian NDP New Westminster—Burnaby, BC

The third question was whether it is true, as some witnesses have pointed out, that Canada is increasingly a target because we haven't put in place cybersecurity measures.

9:15 a.m.

Executive Director, Canadian Cyber Threat Exchange

Jennifer Quaid

That may be harsh. Canada is increasingly a target because it pays ransom. There are countries that organizations intentionally don't attack because they don't pay ransom. Canada generally pays ransom—

9:15 a.m.

Liberal

The Chair Liberal Heath MacDonald

Thank you, Ms. Quaid.

Mr. Julian, that's your time.

Thank you so much to the witnesses for being here today on a very important topic.

We're going to suspend—

9:15 a.m.

Conservative

Glen Motz Conservative Medicine Hat—Cardston—Warner, AB

Chair, can I just ask the witnesses a question?

If there's anything further that came up today from the questions being asked that you couldn't give a fulsome answer to, could you please provide it to the committee for our deliberations and report?

Thank you.

9:15 a.m.

Liberal

The Chair Liberal Heath MacDonald

Thank you.

We're going to suspend for five minutes and get ready for another round of witnesses.

Thank you so much for being here.

9:25 a.m.

Liberal

The Chair Liberal Heath MacDonald

I would like to welcome our second panel of witnesses.

By video conference, from Canada Energy Regulator, we have Chris Loewen, executive vice-president, regulatory; and Christopher Finley, director, emergency management and security.

In person, we have, from the Canadian Radio-television and Telecommunications Commission, Steven Harroun, chief compliance and enforcement officer; Anthony McIntyre, general counsel and deputy executive director, legal services; and Leila Wright, executive director, telecommunications.

We'll be giving up to five minutes for opening remarks, after which we will proceed with rounds of questions. Welcome to all of you.

I now invite Mr. Loewen to make an opening statement, please.

9:25 a.m.

Chris Loewen Executive Vice-President, Regulatory, Canada Energy Regulator

Good morning.

My name is Chris Loewen. I am the executive vice-president, regulatory, at the Canada Energy Regulator. I'm joined today by Mr. Chris Finley, director of emergency management and security.

Thank you for inviting the Canada Energy Regulator to appear before the committee today to discuss Bill C-26.

We join you today from Calgary. I would like to take this opportunity to acknowledge the traditional territories of the people of the Treaty 7 region of southern Alberta.

I'll start by outlining the mandate of the Canada Energy Regulator, or CER.

The CER regulates infrastructure to ensure the safe and efficient delivery of energy to Canadians and the world. It regulates pipelines, power lines, energy resource development and energy trade on behalf of Canadians in a way that protects the public and the environment while supporting efficient markets.

Safety is at the core of our work. We regulate to prevent harm in all forms, and we understand that this includes the cybersecurity threats that Bill C-26 is seeking to address. The CER takes the matter of cybersecurity threats to Canada's energy supply seriously.

The CER oversees roughly 71,000 kilometres of the oil and gas pipelines in Canada. We regulate pipelines that cross provincial boundaries or the Canada-U.S. border. CER-regulated pipeline companies are required to have proactive measures in place to protect this critical infrastructure from cybersecurity threats.

Regulated companies must have a security management program that anticipates, prevents, manages and mitigates conditions that could adversely affect people, property or the environment. In addition to the physical threats to infrastructure, companies must consider cybersecurity threats in their security management program and implement appropriate mitigation based on the results of a security risk assessment process. These requirements are laid out in the Canadian Standards Association's Z246.1 standard, which is included in the CER Act's onshore pipeline regulations by reference.

Cybersecurity measures must reflect the criticality of cyber-assets, as well as the results of regular assessments of threats, vulnerabilities and overall security risk.

The regulation of electricity generation, transmission and distribution rests primarily within the jurisdiction of provinces and territories. However, the CER regulates approximately 1,500 kilometres of international power lines. The Canadian public rightfully expects us to hold the pipeline and international powerline companies we regulate accountable for the safe operation of CER-regulated energy infrastructure.

The CER is well positioned to administer the obligations of Bill C-26, in particular those that apply to companies we regulate, and, given these obligations, align with those already found in the Canadian Energy Regulator Act.

For example, the bill provides the CER with the ability to issue orders and to take necessary enforcement actions to bring a company back into compliance, so that critical cyber systems are protected.

The CER already uses similar tools. For example, it issues notices of non‑compliance, inspection officer orders and administrative monetary penalties, as needed, to bring companies back into compliance and ensure that they operate safely.

The CER also verifies that companies are meeting requirements through inspections, audits, compliance meetings and emergency response exercises.

The CER uses an integrated government approach. It works with federal, territorial, provincial and international agencies, as well as regulated industry, to ensure that proactive measures are taken to protect federally regulated energy infrastructure from cyber-related risks or attacks.

Thank you very much for the opportunity to speak with you today about this important issue. We look forward to your questions.

9:30 a.m.

Liberal

The Chair Liberal Heath MacDonald

Thank you, Mr. Loewen.

Ms. Wright, go ahead.

9:30 a.m.

Leila Wright Executive Director, Telecommunications, Canadian Radio-television and Telecommunications Commission

Good morning, and thank you for inviting us to speak with you this morning.

Before I begin my remarks, I would like to acknowledge that we are gathered on the traditional unceded territory of the Anishinabe people.

My name is Leila Wright, and I am the executive director of telecommunications at the CRTC. I am joined today by my colleagues Steven Harroun, chief compliance and enforcement officer, and Anthony McIntyre, general counsel.

The CRTC is an independent and quasi‑judicial tribunal that operates at arm's length from the government. We hold public hearings on telecommunications and broadcasting matters. We make decisions based on the public record.

In the telecommunications industry, our work focuses on increasing competition for Internet and cellphone services. We do this by promoting greater choice and affordability for Canadians, encouraging investment in reliable and high-quality networks, and improving access to telecommunications services in indigenous, rural and remote communities. We also have a team that helps protect Canadians from unwanted emails, texts and online scams.

The CRTC plays a small part in the federal government's effort to protect the security of Canada's telecommunications system.

Other organizations that contribute to this effort include the Communications Security Establishment, the Canadian Security Intelligence Service, Innovation, Science and Economic Development Canada, the Canadian security telecommunications advisory committee and many others.

The CRTC does not have a role to play within the proposed critical cyber systems protection act. Additionally, many of the proposed amendments to the Telecommunications Act establish new authorities exclusively for the Governor in Council and the Minister of Industry, and do not modify the CRTC's regulatory mandate under the act.

However, a few changes would be relevant to the CRTC's work. I'll focus on three changes in particular.

First, the proposed amendment to section 7 of the Telecommunications Act would add a new policy objective focused on promoting the security of the Canadian telecommunications systems. As with other policy objectives set out in the act, this addition would allow the CRTC to expressly consider how its decisions could further this new objective.

Second, the addition of proposed section 15.6 would facilitate information sharing between a broad group of security-focused government departments and agencies and the CRTC. This would be for the purpose of ensuring compliance with orders and regulations made by the Governor in Council and the minister.

Third, section 47 would require the CRTC to take into account any orders or regulations made by the Governor in Council and the minister in its decision‑making.

Should Parliament adopt Bill C-26, the CRTC will be ready to implement the amendments made to the Telecommunications Act that affect our work.

Thank you again for inviting us to speak today. We look forward to your questions.

9:35 a.m.

Liberal

The Chair Liberal Heath MacDonald

Thank you, Ms. Wright.

We're going to move right on to the questions.

Mr. Shipley is up first, for six minutes.

9:35 a.m.

Conservative

Doug Shipley Conservative Barrie—Springwater—Oro-Medonte, ON

Thank you, Chair.

Thank you to all the witnesses for being here today.

In the first hour of witness testimony this morning, we heard a shocking number from Mr. de Boer, who said that 5.2 million cyber-attacks were stopped. That number shocks me.

I'd like to know, through Mr. Loewen, as the regulatory board for your energy sector, how many of those you are seeing in the area that you're responsible for.

9:35 a.m.

Executive Vice-President, Regulatory, Canada Energy Regulator

Chris Loewen

Thank you very much for the question.

I would have to say that it's one of the reasons why reporting is going to be very important with respect to the proposed legislation. We currently rely on reporting from companies that provides us with an understanding of the magnitude but not the actual specific number of cyber-threats or cyber-attacks that are occurring with respect to our companies. Regulated industry is targeted by a number of threats from domestic and state actors. I would say that they vary from password theft and document theft all the way up to ransomware and other types of malware.

I might just turn to my colleague, Mr. Chris Finley. He might be able to provide you with a better sense of the volume.

February 8th, 2024 / 9:35 a.m.

Christopher Finley Director, Emergency Management and Security, Canada Energy Regulator

Thank you for the question.

To date, the Canada Energy Regulator has no evidence of any cybersecurity incidents suffered by regulated companies that have affected the operation of a pipeline—in other words, their operational technology network. Admittedly, we also have had no reported incidents that have caused a cybersecurity event. There is a series of reportable incidents in our regulations. There has been nothing reported to date.

In terms of our regulated industries, of course, they are always under threat. Many of those attacks are below the bar, and we certainly wouldn't hear about those. As well, there is voluntary reporting currently to the Canadian cyber centre.

9:35 a.m.

Conservative

Doug Shipley Conservative Barrie—Springwater—Oro-Medonte, ON

Thank you.

I think that somewhere in there there was a little bit of good news for us. As I said, with that number of 5.2 million at the beginning, hearing yours at considerably less than that obviously will help us sleep a little better at night.

How will Bill C-26 change the way you do business overall? Will it help your members and help you? What's the main implication, if and when this is passed, for how it's going to change?

9:40 a.m.

Executive Vice-President, Regulatory, Canada Energy Regulator

Chris Loewen

The proposed legislation is well aligned with the CER's oversight mandate. We already have a fairly robust regulatory framework in place that requires companies to identify and anticipate threats and risks to their systems, processes and operations and to have programs in place that prevent and mitigate those events. We also have in place inspection officers with the ability to issue non-compliance inspection officer orders and, where necessary, administrative monetary penalties.

You can see that the elements of the proposed legislation closely mirror what we currently have in place. In addition to that, it enhances reporting and information sharing, which I think can only lead to a much stronger oversight of cyber-threats within our industry.

9:40 a.m.

Conservative

Doug Shipley Conservative Barrie—Springwater—Oro-Medonte, ON

Thank you for that.

I'll turn to our witnesses from the CRTC this morning, probably Ms. Wright, who started off.

There have been concerns that in incidents of an order in council or a ministerial order or a regulation overriding a decision from the CRTC, there may not be a public notice or notice of decision. Do you agree that this process should be more transparent?