CAN-TECH Archives - IPOsgoode /osgoode/iposgoode/tag/can-tech/ An Authoritive Leader in IP Wed, 18 Nov 2020 15:53:40 +0000 en-CA hourly 1 https://wordpress.org/?v=6.9.4 COVID-19 & Cybersecurity Risks /osgoode/iposgoode/2020/11/18/covid-19-cybersecurity-risks/ Wed, 18 Nov 2020 15:53:40 +0000 https://www.iposgoode.ca/?p=36153 The post COVID-19 & Cybersecurity Risks appeared first on IPOsgoode.

]]>
On November 2nd and 3rd, I was given the opportunity to attend the Canadian Technology Law Association (CAN-TECH) . , I learned more about the legal aspects of technological COVID-19 responses, proposed frameworks for digital identity, financing and start-ups in the current environment, working from home and its impact on diversity, and the latest legal developments related to privacy, cybersecurity, video games, and artificial intelligence. I particularly enjoyed the plenary session on “Cybersecurity: Shielding Your Clients from Expanding Threats” because of my interests in cybersecurity and privacy law.

In the cybersecurity plenary session, the experts discussed the recent cybersecurity threats in the midst of the COVID-19 pandemic. The global COVID-19 pandemic has been said to add “ to the threat environment leading to a drastic increase in the volume of cyberattacks and breaches during the past 12 months in Canada. In Canada, of businesses experienced a cybersecurity breach that negatively impacted their operations. For instance, refer to hackers infecting a computer or network with viruses that encrypt and hold the data “hostage” until a ransom is paid. Ransomware attacks cost Canadian companies around when downtime costs are factored in.

Moreover, hacking groups, like and , are increasingly conducting attacks where hackers exfiltrate and download sensitive data before launching a ransomware attack. The attackers can maximize their chance of getting the companies to pay the ransom by . Most of these cyber attackers demand the ransom in , making it very difficult for law enforcement agencies to track and investigate the crimes.

The attackers choose different sized businesses and organizations for various reasons. For instance, health care providers, law firms, government organizations and large companies are often targeted by (APT) attacks, which require the attackers to carefully research and choose their victims over a long period. Executing an APT attack usually than other attacks and is typically done by experienced and financially-backed cybercriminals. Cybercriminals might choose to attack to demand greater ransom payments.

Cybercriminals also choose small and medium-sized organizations and businesses because they are seen as soft targets who do not have . Moreover, small and medium-sized companies often outsource their IT needs to third parties, creating another cyber risk level for small-sized companies to mitigate. Consequently, small and medium-sized companies must get which will allow them to access resources that may otherwise not be accessible to them. Cyber insurance may also provide coverage and protection for liability regarding .

Though having cyber insurance is extremely important, cybersecurity risk mitigation and management practices are critical to minimize breaches' harm. It has been said that of successful breaches are initiated through phishing emails, malicious attachments, unpatched systems or “vulnerabilities,” or lack of two-factor authentication systems. To mitigate an attack, best cybersecurity practices, such as having a detection plan, threat intelligence, disaster recovery, training, fire drills and having sufficient back-ups, must be in place prior to the attack. Adopting and applying the best cybersecurity practices is incredibly important during the pandemic for those who in an environment that might not have the same formal cybersecurity protections and processes in place. This is true, especially for who have to meet their professional responsibilities such as the obligation of confidentiality, privilege, and the duty of technological competence. It is very important to know and meet these professional and ethical responsibilities even as a law student. Hence, I am very happy that I was given the opportunity to attend this conference, as it taught me a tremendous amount about the most recent and significant developments in Canadian and international technology law.

Written by Elif Babaoglu. Elif is a contributing IPilogue editor and an avid privacy and tech-law enthusiast with a particular focus on artificial intelligence.

The post COVID-19 & Cybersecurity Risks appeared first on IPOsgoode.

]]>
Am I The Best Person? Reflections on CAN-TECH’s Women in the Tech Webinar /osgoode/iposgoode/2020/07/14/am-i-the-best-person-reflections-on-can-techs-women-in-the-tech-webinar/ Tue, 14 Jul 2020 19:52:44 +0000 https://www.iposgoode.ca/?p=35718 The post Am I The Best Person? Reflections on CAN-TECH’s Women in the Tech Webinar appeared first on IPOsgoode.

]]>
On July 7th, 2020, attendees of the CAN-TECH’s “Women in the Tech Webinar: The Ripples You Create – A workshop on amplifying women’s voices in the media” were taught several strategies to subdue their self-doubt and amplify their voices in the media. The keynote speaker of the event, , is the founder and catalyst . Informed Opinions is a not-for-profit organization that “works to ensure diverse women’s perspectives and priorities are equitably reflected by and integrated into Canadian society.” In other words, Shari’s own words, she trains smart women to speak up.

Why are women’s voices underrepresented in the media?

Statistics show that male voices and perspectives , traditional and otherwise. When you include other identifying factors - such as race, sexuality, and religion - the gap further widens. None of this or new information. While the gender gap is , there is still a lot of work needed be done to help amplify previously invisible voices. As the recent social unrest triggered by the tragic death of George Floyd illustrates, when one group dominates a narrative, it often leads to the or lived realties.

Social scientists suggest that part of the reason why women’s voices are missing from society, even today, is because of the . Males are taught to be and that their voices have value. Females are raised to be quiet and docile. Gender socialization is complex, and anyone that breaks the mold is harassed and bullied.

Recent studies show that women leaders for abuse on social media. Teenage environmental activist, Greta Thunberg, has been repeatedly targeted by men, including . Movie stars, like and , were forced to delete their social media because of relentless harassment. Fear of getting bullied is one of the main reasons women may reject the opportunities they do receive.

How can I add value to this discussion?

Another reason, as was articulated by Shari in the seminar, is the notion of, “am I the best person?” Shari stated that women sometimes have a knee-jerk reaction to reject new opportunities because they believe they are not the best person or authority on the topic. Shari suggested that instead of thinking, “am I the best person?” women should instead ask themselves whether they can add value to a topic by adding their opinion. Naturally, self-doubt is not exclusive to one gender. However, statistics do show that women for positions because they feel that they are .

Admittedly, I wondered whether I was the best person when asked if anyone would like to attend and blog about the event. Even as I write this, I’m trying to change my mindset and think about the value I can add to this piece by incorporating my experiences and perspectives. Among all the wonderful strategies offered, this deceptively simple approach has resonated with me the most.

If you’d like to learn more about Informed Opinions, and attend a workshop to amplify your own voice or someone else’s, click . If you’d like to attend CAN-TECH’s annual law conference in October, .

Nikita Munjal is an IPilogue Editor, Clinic Fellow with the Innovation Clinic, and a JD/MBA Candidate at Osgoode Hall Law School.

The post Am I The Best Person? Reflections on CAN-TECH’s Women in the Tech Webinar appeared first on IPOsgoode.

]]>