Skip to content


New webinars coming soon!

On-demand webinars

CAN CIOSC 104:2021 Certification

Join us for our CAN CIOSC 104:2021 Certification webinar, an essential program for organizations seeking to bolster their cybersecurity posture. This certification is a critical step towards safeguarding your digital assets in today’s ever-evolving cyber landscape.

Secure Authentication

Have you ever wondered how to effectively manage multiple identities and passwords in today’s increasingly complex digital landscape? Don’t worry, you’re not alone!

Authentification Sécurisée

Joignez-vous à nous le 19 juillet 2023, à 11 h HAE, pour un webinaire intitulé ” La gestion des identités et des accès (GIA) “, présenté par Okta et Cybersécurité Canada. Notre conférencier invité, Louis Migault, expert en GIA chez Okta, vous guidera à travers les tenants et aboutissants de la gestion de l’identité et de l’accès (GIA).

Aftermath of Ransomware

Organizations of all sizes are becoming aware of what the typical ransomware attack means: public shaming, news coverage, extortion and a lot of private data being shared publicly. What we know for certain is, ransomware attacks have significant and negative consequences on businesses, resulting in the loss of sensitive data, as well as causing operational downtime.

Secure Your Portable Devices

Learn more about the most common risks facing USB, smartphones, and other portable devices – and how to mitigate them. Whether you’re an individual or a business, register now and take the first step toward securing your digital future!

Why Are DNS Controls and Filtering Crucial For Your Business?

Ready to level up your cybersecurity game? Watch our webinar on DNS controls and filtering and gain a comprehensive understanding of the critical elements of internet assets, domains, servers, and DNS. Uncover the truth behind DNS misconceptions, learn about the basics of DNS, and who manages and controls it. Find out how checking and validating internet assets can lead to a secure organization, and the importance of secure DNS. 

Anatomy of a Pentest

In this talk we will leave our hoody in the dresser and put on business casual attire to dive into the penetration testing process: from initial client engagement to report writing. We will look more closely at what penetration testing is, the various kinds of it, and how it may assist users in safeguarding, data and IT systems. Whether you’re an aspiring or a seasoned hacker, a manager, or an executive, you will get value in understanding or reviewing how a penetration testing engagement flows.

5 Steps to Prepare Your Company for CyberSecure Canada Certification

In this 30-minute live webinar, we’ll suggest practical steps that you can take to get started (often the most difficult part) on your CyberSecure Canada certification journey.

Get certified

Contact us to get started today.