-
2018-2024 Procurement - Awarded Contracts and Indigenous Businesses
This dataset contains a quarterly breakdown of contracting activities performed by CSE over the past four fiscal years. Information is provided about the number of contracts... -
Cloud network security zones - ITSP.80.023
Cyber security guidance -
Developing your business continuity plan (ITSAP.10.005)
Guidance on creating a structured plan to ensure essential operations continue during and after a disruption. -
Cyber Security Awareness Month - Get Cyber Safe 2021
This campaign helps Canadians stay secure online by teaching them simple steps to protect themselves and their devices. In 2021, Cyber Security Awareness Month in Canada takes... -
Cyber security guide for campaign teams
Cyber security guidance -
IT Security Risk Management: A Lifecycle Approach (ITSG-33)
With today’s dynamic threat environment and Government of Canada (GC) fiscal constraints, information technology (IT) security can no longer be an afterthought, but rather needs... -
Protect how you connect
Assessing possible risk before using social media platforms and apps -
Cyber threats to Canada's democratic process : July 2021 update
This document provides an update to the 2017 Cyber threats to Canada’s democratic process reports and 2019 Cyber threats to Canada’s democratic process reports released by CSE.... -
Top 10 IT security action items: No. 10 Implement application allow lists -...
This document outlines several best practices for controlling permitted applications on your systems. -
Security considerations for electronic poll book systems (ITSM.10.101)
This document provides guidance on cyber security considerations required to securely design, deploy, and operate electronic poll book systems. The document highlights... -
Communications Security Establishment Annual Report 2020-2021
CSE's unclassified, public Annual Report 2020-2021 -
Guidance on Securely Configuring Network Protocols (ITSP.40.062)
The information in this publication identifies and describes acceptable security protocols and their appropriate methods of use to ensure continued protection of UNCLASSIFIED,... -
Keeping our Information Secure
o Instant Messaging Security Risks o Spotting Malicious Emails o GC CIRT Pointer: Exploit Kits o Securing your GC SECRET Network o Sharing Information across Different Security... -
Secure your accounts and devices with multi-factor authentication (ITSAP.30.030)
Cyber security guidance -
Cyber threat bulletin: Cyber threat to operational technology
Table of contents Introduction The digital dransformation of OT OT cybersecurity vs. IT cybersecurity OT exposure in Canada: A snapshot The OT of the future: Cyber-physical... -
Cryptographic Algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B...
The information in this publication identifies and describes approved cryptographic algorithms and appropriate methods of use to protect the confidentiality of PROTECTED A and... -
Protecting information while using remote technologies: Tips for academic...
Cyber security guidance -
Search engine optimization poisoning (ITSAP.00.013)
Cyber security guidance -
The threat from large language model text generators
Cyber security guidance -
Protecting your organization from software supply chain threats – ITSM.10.071
Cyber security guidance