About Cyber Security Canada
With the Digital Privacy Act now in full force, companies have obligations to their clients, employees, suppliers, directors and shareholders to protect the integrity and security of the intellectual property and private information the organization holds.
Our protection services secure your data by first assessing vulnerabilities and validating security controls through a comprehensive audit of your network infrastructure. This may include penetration testing or “ethical hacking.”
Next, we analyze your security requirements and work with your IT staff to implement the appropriate security controls.
Even with the best security, there are still risks. Should you get hacked – a security or privacy breach – we provide the 24×7 response services and expertise to minimize business, financial and reputation loss.
We guide you through the steps to keep your company safe, secure, compliant and profitable.
The Cyber Security Canada team includes a range of certified professionals in the following fields:
- Penetration Testing
- Security Compliance (The Cyber Highway)
- Incident Response & Remediation
- Digital Forensics Investigation
- Breach Mitigation
- Intrusion Detection & Protection
- Multi-Layer Network Protection
- Cyber Essentials Certification
- Business Continuity
- Recovery Planning & Implementation
- Issue & Crisis Management
- Privacy Legislation compliance
Founder and CEO
CISSP, G.G, E-Technologist
Victor Beitner has been working in the technology industries for over 30 years and the last 15 have been focused on network security and cyber issues.
He is the Chair of the Georgian College Protection, Security & Investigations Advisory Committee and holds a CISSP as well as other certifications and degrees, that allows him the ability to adapt quickly and confidently to any security situation.
Currently involved in multiple projects, including security audits for medical establishments, multi-factor authentication systems using tokens, SMS, phone for out of band security, and deployment of servers in data centers.
He is also regularly called upon for multi-media interviews by local and international media concerning cyber security issues. His in-depth knowledge and expertise in cyber security has featured him in print, radio and TV news organizations such as CTV News, Global News, The Toronto Star and The Toronto Sun. Victor was previously a contributing editor for Graphic Exchange Magazine and Print Action, and is also a Ham radio operator (VA3OZZ). He enjoys giving back to the community with his volunteering work.
Over the past four decades, Earl has been involved in almost every aspect of practical IT design and implementation – including programming, database and web site design, business system implementation, building specialized hardware, software and networks for graphics processing, business analytics and information security.
As an entrepreneur, he is accomplished at building lean teams, focusing on goals, surpassing expectations and meeting deadlines. Eight years designing, building and implementing large-scale pharmaceutical direct marketing programs for chronic disease therapies have given him a unique perspective on delivering high ROI in an extremely competitive environment while working within stringent PIPEDA, Health Canada and PAAB guidelines.
Earl has earned a Certificate in Digital Forensics from Ryerson University and is currently working with Cyber Security Canada designing and implementing security control structures.
M.C.S.E.+I, F5 Systems Engineer, CITRIX C.C.A., RSA Certified Engineer, RSA Data Loss Prevention
Kelly has extensive experience in project management and delivery in sectors including banking, government, healthcare, and cyber security. He has worked with large and small business, with specialties in remote access and security with a focus on SSL/VPN and two factor authentication servers.
Kelly is also Network Admission Control and Common Vulnerabilities and Exposures (CVE) certified, as well as creating technical training manuals and teaching a variety of IT training.
Engineer, MSc, NSSA, OSCP
Jugal Bhatt is a Senior Security Consultant and has worked for over 5 years as a full-time Blackbox Penetration Tester for Web, Mobile (iOS/Android), Desktop and Web Services. He is currently focussing on Application & Network Security.
Jugal’s experience includes projects in Banking, E-commerce, Insurance, Medical, Internal and other applications using DAST and Manual security assessment.
An important aspect of his work is discovering and reporting actionable security vulnerabilities and recommending appropriate remediation. His proficiencies include Burp Suite, Fiddler, Nikto, Kali Linux, Wireshark, Nessus, Nmap, Firebug, SQL Map and OWASP ZAP.
Jugal is responsible for developing Cyber Security Canada’s best security practice policies, penetration testing methodology and internal training.
He has earned a Master’s degree in Computer Science and a Post-Graduate Diploma in Network and Systems Security Analysis from George Brown College, Toronto, and recently earned the Offensive Security Pentester Certification.
Masters of Criminology, BSocSc Honours with Criminology Specialization
Marci recieved her Criminology degree with high honors from the University of Ottawa where she also completed her Masters of Criminology Applied (MCA).
She completed a placement in the field of criminology at the Canadian Resource Centre for Victims of Crime as a victim support worker. In that role, she worked directly with victims of violent crime to provide them with advocacy, support, and resources. She conducted extensive research to contribute to the agency’s newsletter, and acted as a Communication liaison writing support and advocacy letters on behalf of victims.
Marci was also a Learning Technology Mentor at the University of Ottawa, providing customized training for adaptive technologies to student’s specific needs. In her spare time, Marci volunteers at the Ottawa Mission soup kitchen, preparing and serving meals.
Senior Information Security Consultant
Specializing in IT security risk, auditing, & management. 25 plus years of IT & Business background with over 12 years of experience in IT security. Includes: Risk policy, compliance, training, audit and consulting. Steve relies on his vast experience as an IT professional to ensure the company’s security is top priority. Crucial experiences include malware investigations, emergency incident response, threat intelligence and remediation. Creating and implementation of policy is a passion. His experience in Policy Process and Procedure is of great value. Serving primary roles with enterprise and small business alike. Developing relationships and regular communication is important to Steve. “I served 4 years with the CDN Armed Forces and enjoyed a 5 year active role in Scouts Canada as a Troop Scouter. Policy is my life”
CIPP/C, CIPP/IT, CISSP, CCSP, Security+, B. Com. (Accounting)
Database, Cloud, Security/Privacy Expert with a proficiency in Compliance and Regulatory legislation. Technical expertise, maintaining knowledge of Canadian as well as World Wide Privacy Laws, GDPR, PIPEDA, BASEL II, PCI Data Security Standards and Data Privacy Compliance among others.
Robert has a track record in using abilities for analysis, aligning technology services with business goals, building long term relationships with clients, and interacting with all levels of management.
Robert has provided pre-sales support and training for Oracle’s Database security portfolio products, as well as Compuware. He also:
- Regularly lectured with hands-on training of various solutions including Data Privacy/Application Auditing
- Is Certified as a CISSP and CCSP to demonstrate knowledge in the Security realm on premise and in the cloud.
- Is also Certified as a CIPP/C
– Digital Privacy Act’s updates to PIPEDA
– Canada’s Anti-Spam Legislation (CASL)
– Genetic testing
– Health information privacy updates
– Health Information Organizations
– Critical privacy concepts and practices that impact IT
– Consumer privacy expectations and responsibility
- as well as CIPT
– Canada’s Anti-Spam Legislation (CASL)
– How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market
– How to establish privacy practices for data collection and transfer
– How to preempt privacy issues in the Internet of Things
– How to factor privacy into data classification and emerging tech such as cloud computing, facial recognition and surveillance
– How to communicate privacy issues with partners such as management, development, marketing and legal.