Refine by MP, party, committee, province, or result type.

Results 1-15 of 43
Sorted by relevance | Sort by date: newest first / oldest first

Public Accounts committee  Thank you. As I said earlier, and as the Auditor General mentioned, the numbers that total the $570 million include program activities for cyber-security that are not necessarily directed at cyber. The investments we made in our activities for our contribution to cyber-security

April 23rd, 2013Committee meeting

Toni Moffa

Public Accounts committee  Detail on the spending? To answer that question certainly would reveal our level of capability in these areas, which we would consider classified information. It would not be prudent to disclose to those who seek to do us harm. I will try to provide you an outline of the variou

April 23rd, 2013Committee meeting

Toni Moffa

Public Accounts committee  Thank you. Good afternoon. As part of its IT security mandate, CSEC provides advice, guidance, and services on the protection of electronic information and information infrastructures of importance to the government. CSEC also produces intelligence on foreign cyber-threats. We

April 23rd, 2013Committee meeting

Toni Moffa

Procedure and House Affairs committee  That's right. We increase our vulnerabilities as we increase the things we attach to our networks. So thumb drives and mobile devices increase the ways into our network and make them more vulnerable.

April 3rd, 2012Committee meeting

Toni Moffa

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  I cannot comment on that, and I certainly cannot comment on other people's experiences. That is considered classified information.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  There's plenty of advice and guidance that's available on our public website. That's openly shared. In general it's about taking steps to put in place proper security measures at the perimeter, and that is monitoring for things that can happen so that we can react swiftly when t

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  The average user would find that all bundled into their anti-virus software or their security software on their computer.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  Certainly it doesn't take much technical expertise to post a video.

April 3rd, 2012Committee meeting

Toni Moffa

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  We are learning about the methods they use in an effort to prevent their actions in the future.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  No, I wouldn't say we're keeping ahead of it. We're trying to track as many as we can, and those numbers increase exponentially. It's very difficult to keep pace with the number of threats we see out there.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  Spear-phishing is a technique. One of the ways someone can take advantage of your computer, your network, and the information that it contains is to send you an e-mail that looks like a legitimate e-mail, which would have an attachment that would look very attractive to you or be

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  There are venues for cooperation more broadly.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  Unfortunately, I wouldn't be qualified to speak to their intent. What we look at is the techniques that are used by such groups and how to provide advice to prevent those things from being successful in our own systems. So I would be unable to comment on that.

April 3rd, 2012Committee meeting

Toni Moffa