Friday, 29 December 2023

International Cyber Cooperation: Reflections on the GFCE & GC3B

I first experienced the frustration inherent in Canada's approach to cybersecurity education last year at the University of Waterloo's CPI conference. There Charles Finlay from the CyberCatalyst talked about how other smaller countries focus on a collaborative approach to cybersecurity that creates a coherent ecosystem of partners who support rather than compete against each other. In the asymmetrical world of cybersecurity where attackers have every advantage in terms of anonymity, it isn't just criminal organizations working the dark end of the internet in 2023, it's authoritarian nation states with fully developed offensive cyber operations. Without collaboration, democracies will dissolve in the chaos of our networked world.

We have the resources,
cooperation is what's missing.
In the year since I've been working to establish connections between the many entities in Canada's cybersecurity industry intent on education and career pathways illumination, but what I've found are siloed organizations (private, public and NFP) fixated on IP and market share whose idea of collaboration is creating partnerships to defeat what they perceive as competition. This isn't collaboration so much as it's combining resources to compete more effectively.

This monopolistic approach is partly the result of how Canada funds cyber-education and industry awareness. By creating competition for funding, potential collaborators are turned into competitors and the possibility of mutual support becomes impossible. A great example are all the competing networks, alliancesconsortiums, catalysts and councils - all of whom claim to be creating a collaborative ecosystem under their leadership. Finding funding and piling onto this chaos seems to be the way in Canada. This has been a great frustration and a repeating theme on Dusty World over the past year:

Creating A Canadian Cybersecurity Ecosystem (Oct '22)

How Cybersecurity Might Become More Diverse, Equitable and Inclusive (Dec '22)

You Want to Teach WHAT?!? Reconfiguring Technology in Schools to Empower Pedagogy (Oct '23)

Cyber Education in Canada is Broken, Here's How to Fix It (Nov '23)


***


The majority of attacks are US focused, but if
you consider Canada has 1/10th the people, we
actually face similar numbers of attacks per capita.
One of the ways I've escaped Canada's siloed approach to, well, pretty much everything, is to look internationally for organizations interested in working collaboratively on the cyber-problem. That would be the one where we put all our critical infrastructure onto a global network that was never designed to be secure and then struggle with wave after wave of increasingly automated cyber-attacks in an environment where the attack surface has become impossibly complicated post COVID.

I started by looking at the World Economic Forum's review of the new US Cyber-Strategy, which is focusing on protecting critical infrastructure and improving collaboration both domestically and internationally to create more effective cyber-defences. Canada's strategy is designed to encourage competition rather than collaboration and has resulted in our being one of the most targeted countries globally

The US strategy seems to be aware of this North American predilection for relentless market dominance fixated competition and is attempting to put resources into a collaborative mindset. That approach became apparent when I attended the Global Conference on Cyber Capacity Building this fall.


***


Through looking into WEF and the UN I came across the Global Forum for Cybersecurity Excellence (GFCE). In June I pitched this proposal on helping cybersecurity practitioners become aware of the coming threats to encryption that quantum computing brings: GFCE Proposal - Cybersecurity in the Age of Quantum Advantage.docx. The elevator pitch is: quantum computing will break most of the encryption standards we depend on for everything from our online financial systems to military communications in the next decade, and likely much sooner.

The GFCE got back to me and said they felt that quantum awareness was an important piece of the puzzle and a good fit with their Global Conference on Cyber Capacity Building (GC3B) happening in Accra, Ghana at the end of November. They invited me to develop the research and present it at the event. I'm currently seconded with both ICTC working on cyber-education outreach and the Quantum Algorithms Institute developing education for quantum readiness. QAI supported this research and I got in touch with Louise Turner, a former student now in the inaugural cohort of cybersecurity at Queens University, and she and I put the paper together.



While doing two jobs I beavered away on the paper in the background and Louise (who was juggling her third year course load) and I managed to get the paper in on time. While all that was going on we were both jumping through the hoops in terms of visas and medical requirements to take what would be both of our first trips to Africa.

It all came together at the end of November and we found ourselves at Pearson Airport in Toronto getting on a plane to Washington and then across the Atlantic to Accra. The entire process felt insurmountable, but I've found that if you chip away at seemingly monumental projects like this you get the pieces in place - just don't expect it to happen all at once and pace yourself.

A particular frustration was all the dead ends I chased in terms of finding support for both the research and going to the event itself. I was disappointed to not get support from organizations I have long relationships with who claim to champion just this sort of digital engagement. I went out of my way to attend academic events, but when I asked those organizations about support I found the doors firmly closed. Every form of federal support is safely locked to academic partnerships in a way that makes it impossible for anyone but an internal PhD to claim them; those Canadian silos are exceptionally good at taking care of themselves. I talked to many professors in a multitude of schools but they all disappeared back into their funded, tenured worlds after making noises about how important this kind of work is. That's ok, we did it ourselves.

***

It was snaining in Toronto when we left, but on the ground in Ghana after 12 hours of misery in a middle seat next to the only guy bigger than me on the plane (why don't airlines use smart tech to arrange seating better?), we found ourselves on the ground in Africa! The VISA support by the Ghanese government had been spectacular in Canada and the hospitality was just as special at the Accra Airport. A senior military officer ushered us through customs in seconds and out to the GC3B desk where we got connected to our hotel and suddenly found ourselves tearing through Accra traffic, stunned by the sights and sounds... and heat (Accra is only 600kms north of the equator)!
 
The conference flags were all around the city. From our anonymity in Canada, we suddenly found ourselves at a very welcoming international event.

The Accra City Hotel was where we'd been put up for the conference and was only a ten minute drive from the very fancy Kempinski Hotel where the conference was taking place. We had lunch and then collapsed in our rooms for the afternoon after over 24 hours on the road.

The week before we'd built a powerpoint: QAI GFCE cyber in the age of quantum research presentation.pptx that was designed to gently introduce cybersecurity policy and technical practitioners to quantum computing. We went over it after our afternoon naps on the pool deck in the sweltering heat and humidity of an Accra evening. Louise helped pioneer women in cybersecurity in our school back in 2018/19 when she was in grade 10 and I've known her ever since, so we knew each other's strengths and felt ready to go with the presentation the next morning. That night we had a fantastic Ghanan buffet and then hit the hay.

Since we were presenting on the periphery of the main conference we got to meet the Global Forum for Cyber Excellence working groups who were the organizers of the research presentations. This gave us 'behind the scenes' access to the conference before the main event kicked off the next day. It quickly became apparent that the research presentations needed more time to do them justice. We heard from researchers from all over the world studying everything from regionally specific cyber challenges to international projects on how cyber is presented in the media - to call it fascinating would be an understatement.

Louise and I stepped up for our presentation and knocked it out of the park. We'd de-tuned the technical details (Louise was happy to get into explaining how lattice based mathematical encryption actually works), but the GFCE was keen to focus on making it an introduction to quantum computing and how it will change cyber practices in the next few years. My being a teacher was considered a benefit in introducing this technology which is often obscured by academics fixating on its technical complexities. To ensure equitable access we focused on ensuring the paper only included publicly available research that would assist readers in further exploring the technology. This is an area where Canada excels - putting publicly available material online for anyone in the world to access, so we made good use of the many Canadian cyber and quantum resources available.

We must have done well because we were the only presentation who was asked questions by the reviewer and we ended up late to lunch because we had a line of attendees wanting to ask further questions. There is a lot of curiosity out there around quantum technologies but not a lot of people developing accessible education for the public. As a result it tends to be an academically isolated subject.

Our reviewer kept referring to me as Doctor King during her analysis of our paper, but I've always been interested in how technology becomes applied rather than working on the academic/theoretical side of things. Applied technology use has been my focus since I migrated decades old paper based engineering paperwork onto Lotus123 back in 1991. I was happy to use my blue collar technician's approach to putting a pin in the idea that you need a PhD to understand quantum computing. When it comes to the technologies that so influence our lives (as quantum certainly will), I think everyone deserves to understand how they work.

The rest of that first day at the Global Conference on Cyber Capacity Building was fascinating because it wasn't really about the conference, but instead about the mechanics of the GFCE. By the time we were heading back to the hotel I felt like I'd found my tribe and was determined to see what else I could do with them. This was the collaboration and mutually supportive approach to cyber that I'd been missing.

We wrapped up day one feeling the burn. I've never felt so good jumping into a pool after a day of sweating through a suit. While in the water I bumped into one of Nigeria's cybersecurity leaders and we had a nice chat while watching the sun go down.

The next morning we were up again at midnight our time for a 6am start, and on our way to the Kempinski for the opening of the main event. The conference had swollen in size since we'd seen early setup the day before. Instead of a hundred of so people, over 800 were coming in from over 100 different countries, all intent on seeing how we might work together to make digital transformation more equitable and accessible.

I use Twitter as a way to bookmark ideas and resources so I can find them later when I'm building one of these blog posts. My feed from the conference probably tells the story better than a summary here, but to say it was engaging and eye opening would be underselling it. The GC3B worked every angle from policy and diplomacy to technical cooperation and regional partnerships all the way through to international collaboration. It changed the way I see cybersecurity because it moved me beyond the veiled, siloed and somewhat paranoid world of Canadian cyber.

At the end of the second day we were bused over to the park where Ghana's first president is interred for an end of conference dinner. Like everything else that week, it fundamentally challenged my preconceptions. If indigenous people had overthrown European colonization and established their own representative democracy in the wake of that oppression in Canada, that's where Ghana is today. The story of Kwame Nkrumah and his efforts to awaken a pan-African culture were fascinating, especially from the perspective of someone living in a resource consumption focused culture where we continue to struggle with our colonial past.

Kwame Nkrumah Mausoleum in Accra - well worth a visit.

On the bus ride over (which was an adventure in itself - African commuter buses have drop down seats so the bus is shoulder to shoulder in every row without an exit aisle), I was at a loss to understand how we appeared to be the only Canadians at an international conference where over 100 countries were in attendance. The US State Department had helped fund the event, as had the EU, and we'd met Australians and many other Commonwealth nationalities, but not a single Canadian. The Australian told us about how her government's local office had picked her up at the airport, taken her out for lunch and made sure she was OK at her hotel. Ours sent us a PDF of things to do in Accra.

All of this prompted me ask the Swede sitting next to me how Canada is seen in the international community. I'd honestly expected to hear nice things and assumed we'd simply not been involved in all the clandestine activities of our government at this event, but that's not what came out. The Swede described Canadian participation in world cyber cooperation to be 'selfish and minimalist', which came as a shock despite what I'd observed (it's a teacher survival mechanism to ignore the worst and assume it's my misunderstanding). The Estonian in front of us chipped in with, "I think Canada asks what the minimum is to look like they are involved in a project, give it and then that's the last we hear from them." Attendees from a dozen other countries all nodded in agreement. I did the most Canadian thing imaginable and apologized for my government and all the organizations that are funded by it - even though they'd all ignored my own requests for support prior to the event.

A wonderful evening with people looking to change the world for the better. Ghana knows how to put on a party too...

***


As I floated into the pool later that night pondering how I'm going to dress for the final day of the conference with a suit jacket soaked through with sweat (I went with just a shirt for the final day), I found that I wasn't cowed by what seems to be an insurmountable cultural problem we face as a country. Internally we have the resources and education to make cybersecurity a viable pathway. Canada should be poised to help solve the world's cyber-skills shortage, but instead our plan is to (as it has been in so many other cases) take that talent from other places that need it for our own ends, and do as little as possible to support international cyber development to ensure an equitable digital transformation for all.

I'm a fan of Paul Theroux's travel books. His trip across Oceania ends in Hawaii where he stays at one of the top resorts that is staggeringly expensive. Over the week he finds it coddling and restful, but he comes to the conclusion that when people have money, they mainly use it to keep other people away. The fancy resort provided privacy and a lack of bother from others - that was its main purpose and where the money got spent. Canada is a wealthy country and it seems we use our wealth in much the same way, to isolate ourselves from others. It's not very flattering.

Over 100 countries in attendance. Didn't see a single Canadian in any of the dozens of presentations and none were presenting. I know for a fact that Canada has some of the top cybersecurity practitioners on the planet, but they don't like to share?



***

I arrived at the last day of the conference with a head full of thoughts. This lack of engagement by my country (at least in person, evidently Canada was one of the first to endorse the Accra Call) suggested that the lack of cooperation I see domestically is reflected in our international engagement too. My background and interest is in educational engagement with cybersecurity and other emerging technologies that I feel are essential to students making smart decisions about their futures, so to end the conference I attended Session 4.26: Thinking out of the box to inspire a new generation of cybersecurity talent:
  

You might not have watched that video, but this sort of brainstorming and mutual support is just what we need if we're going to produce a cybersecure future. This doesn't happen behind closed doors or at a distance. I hear a lot of Canadians talking about the Canadian government as though it's distinct from them. This cool distance creates problems with how Canadians understand their own country and their role in it, but it also freezes out possibilities for international collaboration which must be about more than sending money.

I had a great chat in that session on developing cyber talent with a young man from Ghana who had started off as a hacker before coming over to the defenders. He described that journey, especially in a place where you can't drink the water and social services are often non-existent, as difficult because the payouts for being a bad guy are always going to be better. To hear people who are living in what Canadians would consider poverty talking about how they can work together to create equitable digital transformation that will improve standards of living for all was inspiring. You'd have to be the worst kid of self-serving bureaucratic robot to think otherwise.

***

On the final morning we reconvened at the Kempinski and ended the conference with many promises of future work together. It was inspiring and I couldn't help but get a bit teary, especially when they included the presentation awards for Ghana's Student National Cybersecurity Competition...

An all-female team won Ghana's student cybersecurity challenge

Having been deeply involved in Canada's student cybersecurity competition since its inception, I was interested to see this presentation. Some stats for comparison:

Ghana has 475 high schools, 50 participated in the national student cybersecurity competition, that's an 11% participation rate. You might think that low but Canada is currently at 0.6% of high schools participating nationally in CyberTitan which has been running for six years (the Ghanan CCS is in its third year). The siloed nature of Canada's regionalized education system (we are the only developed country in the world without a national education strategy) has a lot to do with that.

An all-girl team won the 2023 edition of their SCC. No all-girl team in Canada has ever come close, which makes for an interesting comparison on access to STEM education opportunities between the two countries. If money is used to keep people at a distance, male dominance in cybersecurity is certainly operating along similar lines in Canada. There is much to do in terms of gender equity in the Canadian tech ecosystem.

There were two ministers and other members of parliament at the awards celebration for these students. No member of Canadian parliament, minister or not, has ever attended CyberTitan nationals. Another example of our remote/arms-length governing? At the very least it highlighted the lack of value we seem to place on securing our critical infrastructure in a digital future that will increasingly depend upon cyber skills.

***

On the long plane ride home I was reflective. Was it easy doing this thing? Not at all. I spent a lot of time talking myself out of it for various reasons, and burned a lot of cycles trying (unsuccessfully) to find support to get myself and others to it. Without Louise coming on and helping carry the research load I think I may well have talked myself out of going, and what a shame that would have been.

Winnie knows how it feels. Whoever is doing Xmas
decorating at Dulles is a bit... chaotic in their approach,
but I like it!
Doing the research outside of my regular working hours wasn't easy, and managing the many logistical requirements both medical and paperwork wise was also a heavy load to carry, but it's these extras that I always get the most out of in my work. If you look at my LinkedIn you won't see me bragging about the work I'm paid to do, but rather the projects I chase beyond those expectations. At the end of the day I'm mission driven. After twenty-years in the classroom and building one of the most successful digital skilling programs in Canada in the most unlikely of places, I want to take what I've learned and spark opportunities like that nationally so more Canadian students can access emerging technologies and make informed decisions about where to go next. That this is a struggle continues to baffle me, but I'm committed to climbing that mountain.

Regrets? None. This wasn't easy but that's exactly why we need people to put the work in and make this sort of connection happen. Am I frustrated by Canada's approach? Yes, but that too is a challenge, and one that we will overcome with vision and determination. With a renewed commitment we will see a meaningful Canadian presence at the next Global Conference on Cyber Capacity Building taking place in Geneva in two years. I intend to be working with the GFCE by then in their education working group if not elsewhere in the organization. I hope I can bring more Canadians into it too.


Saturday, 25 November 2023

What You Need To Work in Cybersecurity: the secret sauce

I see a lot of rules based 'quick fix' learning opportunities in cybersecurity. These are usually boot camp style condensed programs that promise to turn an accounting or science student into a cybersecurity practitioner in a single semester by showing them how to use tools in a formulaic manner. They treat cybersecurity as though it's an office job: we show you the cybersecurity rules and you follow them. You can see how well this is working by the ongoing shortage Canada faces in finding and retaining cybersecurity professionals.

I got into cybersecurity with my students in 2017 when we started chasing CyberTitan, but I brought something with us that is atypical in the world of STEM: a willingness to hack. I don't like the word hack, it has negative connotations to it in English that have been encouraged by the self appointed masters of STEM (the S&M part), but that willingness to iterate and work outside expected outcomes is the secret sauce in cybersecurity that many ignore, and a major reason for why I've taken to it like I have.

'Necessity is the mother of invention' has been the motivating factor in my relationship with technology since the beginning. I moved quickly from off-the-shelf to customized solutions based on experimentation and need. Within six months of owning my first home computer (a VIC20), I'd figured out how to copy software using a sufficiently low noise audio deck. My first x86 PC was purchased but quickly modified as I came to need more memory and processing power. By the mid-90s I was building my own computers at a time when many people didn't own one.

This process was initially powered by curiosity, which many training programs eclipse with a promise to provide the initiative so you don't have to - something that has never appealed to me and a major reason why I didn't start collecting technical certifications until 2001 (I'd been working in IT for a decade at that point). Schools are bad at nurturing enthusiasm for self-exploration too. Many educators feel that it is their job to impart knowledge in a regimented format (that's why we call them disciplines!) and assess student understanding through a system of providing both the questions and the answers to minimize any frustration. Assessment success is often a measure of compliance rather than cultivating enthusiasm and curiosity.  Many in education call this approach rigorous and disciplined - it's how they demonstrate credibility, and a reason why I haven't continued pursuing academia.

Indians have a term for austere innovation: jugaad (non-conventional, frugal innovation) which doesn't have the pejorative connotations of the English 'hack'. Jugaad celebrates common sense with a solutions focused approach to creative problem solving without needless bureaucracy. It emphasizes an applied approach to making technology work that is especially needed in an industry like cybersecurity where practitioners are often facing edge cases that the people who designed the network never thought of (which is why we're having a cyber problem). WIRED recently did an article on a Ukrainian technologist who demonstrated this start-up/rapid response approach in the war with Russia. There is even an event in cyber that is all about extreme edge cases: the dreaded zero day vulnerability. Jugaad will get you much further than any amount of system think during a zero day attack.

Kintsugi has played a part in my motorcycling.
There is also a term in Japanese that takes the derision found in English out of making old things work. I've long enjoyed the concept of 'kintsugi' or 'golden joinery', which is the repairing of old things using gold to embellish the fix rather than trying to hide it. In typical Japanese fashion it raises what is seen as banal work in the West to an artform. A concept that combines jugaad's celebration of a fix beyond rules based approaches with kintsugi's raising of that fix to an artform is where a good candidate for work in cybersecurity should find themselves inspired. When I started in cyber I found my  IT background helped in terms of understanding the mechanics of what was happening, but my kintsugi powered jugaad approach is what has allowed me to thrive.

This 'secret sauce' is often ignored in education and especially in cybersecurity adult retraining. There are some disciplines that tend to attract rules focused types, but that fixation on systemic order blinds them in the edge cases where cybersecurity often operates. Rather than retraining an accountant or rigorously compliant STEM student, I suspect that those exploring subjects like detective work in policing or creatives in the arts would find the skills they've honed more effective, but that doesn't stop everyone from demanding a computer science degree for any job in cyber.

In 2019 after the Terabytches went to CyberTitan nationals we got invited on the local radio station to talk about the experience. The interviewer asked me a good question about our DIY approach to computer tech. I was annoyed at the lack of resources, but he suggested it might be what gave us an edge. He was right, we'd been jugaading and it made us mighty!

There are many jobs in cybersecurity. People who lean toward the jugaad end where they can problem solve without restrictions can find a comfortable fit in operational cybersecurity where they are monitoring real time threats, penetration testing where they are attempting to exploit a client's system to highlight vulnerabilities, or threat intelligence which focuses on gathering reconnaissance data on threat actors. But even in the policy and compliance work, a willingness to consider and understand threats and solutions that are outside the box is a necessity. The need to nurture and respect those out of the box thinkers working in unexpected end of the cyber-workforce is essential for management. Those industries that thrive on status quo compliance are the ones you see being hacked most often because they don't respect the skillset.

This map of cybersecurity domains gives you an idea of the many specializations that the field offers, though I would argue that in all of them (even those up the compliance end) an ability to work from your own initiative and experience rather a rule book is essential.


Sam Sheepdog & Ralph Wolf know the score.
I sometimes describe cybersecurity types as sheepdogs. I think many in law enforcement also fit this description. You can't send a goat to fend of wolves, but having a wolf of your own will do the trick. Early on in my transition from IT into cybersecurity I found myself leaning on IT administrative habits that don't work in cyber, and came to realize that the jobs are very different, though the technology is the same. If you have an IT person running your cybersecurity you're likely to be constantly surprised by the attacks you face because they tend to see systems in an architectural way rather than as an opportunity to be compromised.


It would be easy to say something silly like, 'there are no rules in cybersecurity!' but that's pointlessly reductive. It would also be easy to describe all the people in it as hackers, but this isn't true either, though a mentality that tackles problems from a place of curiosity and jugaad is far better than a rules compliant myopic who can't see beyond the framework they maintain. At the end of all this I firmly believe that you need a bit of the wolf in you if you want to consider a career in cybersecurity. I wish more cybersecurity training and especially adult retraining would emphasize that when looking for candidates rather than demanding STEM grads often missing these skills. If it's a formulaic job that you're looking for, cyber isn't it.

STEM students are often missing skills which "include teamwork, collaboration, leadership, problem-solving, critical thinking, work ethic, persistence, emotional intelligence, organizational skills, creativity, interpersonal communication, and conflict resolution." Adding an 'A" to STEM doesn't fix this, incorporating an iterative, resilient, interrogative, team-based problem solving mindset into STEM subjects would, but that doesn't tend to be how we teach it.


Another piece of Canada's cybersecurity puzzle came into focus from the last post on how our cybereducation system is broken. In response to that, Francois Guay from the Canadian Cybersecurity Network followed up with the observation that the cybersecurity talent pipeline in Canada is also in tatters.

I've been thinking about that post and believe all of the responses from both new cybersecurity practitioners and veterans are valid. It would appear that when you try to fix a talent shortage with rushed retraining based on incorrect assumptions about the skillsets needed in cybersecurity, no one trusts the results. Problems such as absurd requirements for entry level positions like asking for 5 years of experience on a tool that only came out last year or demands for that vaunted yet irrelevant computer science degree continue to strangle entry level workers coming into the field, even though they have hacked (cough) their way through our broken cyber education system to do it.

Not to sound hopelessly jugaad, but the simple solution would be to introduce cybersecurity apprenticeships that give a more diverse set of potential candidates the opportunity to see if cybersecurity is a field of study that suits them. Those with the right combination of fearless curiosity, critical thinking and tenacity might find their way into it instead of continually opening the doors to STEM grads who are good at being told what to do and enjoyed the privilege growing up of being able to handle the enormous homework loads STEM subjects demand as part of their compliance regime. Students with a background in science and technology might be familiar with the medium that cybersecurity operates in, but that doesn't mean they'll be able to handle the stochastic demands that resonate across cybersecurity work. It's better to find those with the right jugaad mentality; technical familiarity will build quickly powered by enthusiastic initiative and tenacious problem solving.

I've always told my students that if they can bring a willingness to explore, experiment and a fearlessness in breaking things in the process of figuring them out, they don't need to sweat the technicalities, I can teach them those by harnessing the curiosity they bring with them. I've had strong technical students struggle in cyber because they lean on formulaic approaches to computing (they are often maths strong coders) that let them do the bare minimum. If your natural talents in mathematics and computer science have blessed you with a compliance based work ethic, cyber with its changeable success criteria isn't for you. Another favourite adage of mine in the classroom is, 'if you're looking for a way to do less, you'll usually find it.' Those that want to work in a framework often do it so that they can delineate where they can stop; in other words it's used as a way to limit their involvement. That's no way to approach cybersecurity. If solving a problem is a nine to five gig for you, go find work elsewhere.



Much of this comes back to the reductive way we have approached digital skills development (when we're not ignoring them entirely). Cyber Education is the hidden, much larger part of the digital skills iceberg.


Saturday, 18 November 2023

Cyber Education in Canada is Broken, Here's How to Fix It

I've been sitting on this one for some time. What's below is more like brainstorming than a clear solution, but I feel like it's moving in the right direction...

The Problem: Canada's Cyber-education system is broken - or doesn't exist at all

I've been ruminating on this since virtually attending the "How to protect our children in an increasingly digital and online world" meeting by Economic Development Ontario and the Canadian Trade commission a couple of weeks ago. James Hayes from Cyber Legends is a man on a mission. His keynote was both insightful and frustrating - the main point being that Ontario (and by extension Canada)'s cyber-education ecosystem is broken. I'd go so far as to say that in most places it doesn't exist at all; broken implies that there was something there to begin with.

This observation speaks to a cultural challenge that Canada faces. Other countries are able to leverage a collaborative approach to the asymmetrical global threat cyberattacks pose, but Canada's history and the loose confederation it has produced creates many gaps between levels of government. Those gaps are where cybercriminals operate.

The Problem: cybersecurity, cybersafety and online privacy are barely mentioned in Canadian school curriculum and educators are some of the least digitally experienced professionals able to resolve this skills crisis

In Ontario we've mandated mandatory eLearning for all students, but cybersecurity only just got into the computer studies curriculum in this year's rewrite, and what's there is thin (it immediately devolves into personal online data awareness and ignores the many interesting technical specialities in cybersecurity). This optional course doesn't run in most high schools (it was cancelled locally in mine), so this one mention isn't seen by most students.

Many other provinces don't mention cybersecurity at all even as they all depend on it every day with networked education technology delivering material in every classroom. Cyberskills are now essential skills if we want to keep the learning happening, but aren't treated that way in our education systems. New Brunswick is the exception with a full cyber-learning pathway for students interested in heading into the field professionally. Why does that matter? There is a global shortage of cybersecurity professionals, so Canada's usual approach of immigrating in solutions to its education failings won't work in this case.

James mentioned teacher cyber-illiteracy in his keynote as well.
There are solutions like CyberBytes that offer upskilling...
Our oblivious response to cybersecurity awareness is part of a larger problem in public education. When I first came into teaching in 2003 I was surprised to see the education system rocking early 90s information and communication technology. Throughout my career education has dragged its feet at every opportunity in terms of adopting digital transformation and the benefits it delivers. The result of this decades long drag is that people in education tend to be less digitally literate than the general population, even as they are expected to teach students essential digital skills like cyber awareness. 
Teachers are precisely who you want to be raising general cyberawareness and the skills needed to safely navigate our online world, but decades of status quo leadership means educators are missing the digital media literacy necessary to do it.


The Problem: we're happy to make online edtech solutions mandatory (usually as a cost cutting measure) but a surprising percentage of the people doing it don't think they should be held legally responsible for its safe delivery


I spoke on a panel about cybersecurity at the Canadian Edtech Summit the week before. The event had an online component so I started a poll aimed at the education administration and technology companies in attendance. Recently the SEC in the US sued a company for their failure to respond to cybersecurity problems that they were very much aware of that resulted in many clients' data being spilled onto the darkweb. This raises an interesting policy question: should school boards and provincial education ministries be held legally responsible for cybersecurity in Canadian classrooms? Canadian educational ministries and their school boards have increasingly adopted cloud based solutions to reduce costs on what used to be locally managed technology integration, but with internet based 'cloud' solutions come cybersecurity responsibilities. This US decision will likely influence our lax cyber responsibility policies in Canada and I was curious what the people implementing these technologies (often poorly) thought of the potential for liability penalties for failing to protect student data (which often also includes staff and family personal data too).

I expected the people delivering online edtech (school boards, ministries, not-for-profits and private edtech companies) to recognize that cybersecurity is very much their responsibility if their technology is vulnerable online, especially if they are going to demand that students use online learning tools. This should be especially obvious when our 'clients' are vulnerable sector children whose safety should be a primary concern.

Most did recognize the importance of taking responsibility for their technology delivery, but I'd love to have a chat with the quarter or so who thought they should be putting student learning online while bearing no legal responsibility for it. One of those people could well be managing your local school board's technology department.

If we've got a problem with the people delivering online edtech understanding that they are responsible for cybersecurity, we need to back the bus up and clarify those responsibilities with policy - legally binding policy.  I recently saw a memo which said data privacy wasn't even a paid job in the school board and is done outside of regular work responsibilities by IT staff, most of whom have no cybersecurity experience. Until we begin taking public sector cybersecurity seriously we will continue to see our public services being disrupted by breaches and system failures.

NIST's cybersecurity framework offers a technical policy approach to cybersecurity that clarifies what organizations need to do to provide viable online security. ISED has a Canadian version called ITSG-33 which is more policy focused.  This isn't an all or nothing thing with a solution for every problem. Any time you put data online you risk being hacked, but by following these best practices you can at least know you've taken reasonable steps towards preventing abuse. What you want to do is get up to Tier Four of the NIST framework where you're proactively defending against threats, but public education in Canada can't get out of Tier Two because "implementation is still piecemeal", and no one has "the proper resources needed to protect themselves." Our cyber failures in Canadian education are the result of poor policy and the resultant lack of funding. I'd hope that we'd follow best practices in protecting student data, but that ship sailed years ago. If that carrot isn't available, then a legal policy stick might be the only thing left that prompts ministries and schools to make student data privacy a priority.


The Problem: Public services in Canada are siloed bureaucracies that are difficult to work with


This isn't just an education problem, it's a
CANADA problem. Canada's history hasn't
produced a culture that can collaborate
against asymmetrical global threats.
During the panel talk at the EdTech summit one of the speakers said, "working with public school boards is very difficult. It can take years just to find the right person to talk to. Even if you can find that person, they'll tell you there are no resources." I talked to Kyle Bokyo, another of the panelists, after the event and we commiserated on this point.

There are not for profits and businesses in Canada who are attempting to provide solutions to Canada's ongoing cyber-education failures, but attempting to engage with any public service in Canada is a a difficult prospect. If you talk to the ministries they hold up their hands and say they only manage the funding and not the implementation of cybersecurity solutions. If you talk to the regional school boards they say that they aren't provided resources to do it.

In Canada's uncoordinated cyber policy landscape I suspect it's easier to play victim even as you assume greater cyber risk pushing user data into the cloud than it is to develop a coordinated response to this very asymmetrical problem. These gaps in responsibility make it easy for the people paid to protect student data to point the finger at each other rather than solve the problem, even as breach after breach occurs.

Canada's failure to
coordinate cyber response
is recognized as an
problem globally
.
What I learned through COVID as a classroom teacher is that the people running public education will ask all manner or ridiculousness just to maintain the illusion of a functional system. It's what got them into their offices and they aren't about to jeopardize that. Public education, along with other public services, are insular industries with generational employees and tightly knit networks of political operatives managing them. This might sound like immigrant complaining (and it is), but the best way to get into education 'leadership' is to have had family who did it, or marry into one. The next best way is to be willing to maintain the status quo at all costs. Agility and responsiveness aren't words often applied to this sector.

Cybersecurity in public education is dangerously under-prioritized even as we continue the rush to cloud based edtech solutions in an attempt to save money. On top of that a surprising percentage of the people delivering these solutions don't think they should be held legally responsible for its safe delivery. This deadlock suggests that we need policy that not only enforces best cybersecurity practices in education, but also makes resources for it a requirement rather than a politically motivated shell game.

But the fix needs to go further in education because we also have a responsibility for providing graduates with opportunities to learn the skills they need to survive in a rapidly changing world; something we're not doing as many jurisdictions continue to studiously ignore cyber education and digital skills in general. The key piece to this puzzle is policy that creates a responsive, responsible Canadian cybereducation system. In aligning resources to create cybersecure online learning we might also usher in a new era of relevant, richer digital skills development.


The Solution: A Viable 21st Century Canadian Digital Education Ecosystem

As both James and Kyle mentioned in their talks, technology moves so quickly that large public services are always going to struggle to keep up, but an agile edtech sector could help with that. Startups and small businesses can pivot to keep up with technology emergence in a way that larger organizations struggle with - that's why Google and the rest buy agility rather than trying to produce it in-house. The problem has been Canada's pigeon hole approach which doesn't aim to produce a coherent ecosystem of interrelated programs that provide a comprehensive Canadian shield.

As mentioned previously, the issue of regional school boards and provincial ministries making it difficult for anyone outside of these insular systems from collaborating with them is a key problem. We can't leverage digitally literate industry partners if they have no way to effectively communicate with education delivery systems.

The solution is to connect the federal government with the Council of Ministers of Education, Canada and The Insurance Bureau of Canada and design a centralized approval process that connects Canadian not for profits and industry edtech expertise with provincial ministries and clears the way for access to credible cybereducation materials through direct internal communications channels with education systems. Instead of individual boards doing cyber badly, a national partnership with a wide range of technology specializations and strengths would work together to build solutions at scale while also ensuring that these solutions are prioritized with mandatory funding. This relationship would also prompt meaningful updates to curriculum instead of the current 'in a bubble' approach that produces material well short of what is needed to prepare graduates for our technically challenging future.

I made this graphic after last year's CPI conference
at University of Waterloo
, where I first met James,
Cheryl and Cyber Legends.
In such an environment a startup like James' Cyber Legends, or an internationally partnered and long running national competition like CyberTitan would pass NIST levels of cyber-review nationally and then be welcomed into a Canada-wide edtech ecosystem that works through each provincial and territorial education ministry directly into school boards. Any edtech company working outside of this framework would find itself where we all do now: on the outside unable to make any significant change. But those who meet this national standard would be considered trusted internal partners with access to federal funding and direct internal access to provincial education at both the ministry and district levels. No more trying for years to find a person who may (or most likely doesn't) exist in a local school board who is in charge of cybereducation.

This ecosystem would reward collaboration. Members would only be accepted if they are producing complementary resources that create a full range of learning opportunities to all aspects of our increasingly digital world across all subjects, including cybersecurity. This nationally curated resource allows teachers from all corners of the country to develop meaningful digital skills, including the difficult ones to deliver like cybersecurity. This equity of access to resources would end nationally embarrassing PISA results that prevent smaller provincial education systems who lack resources from producing results below the world average.  Members of Canada's edtech program would find funding easier and be able to work with partners who ensure that their programs are successfully integrated and in a constant state of improvement in order to keep up with the impressive rate of technological change we're all dealing with. This would also give those providing federal funding clear guidelines for who they should be supporting.

The stick would come through policy changes that are both legal and regulatory. Any school board (and by association ministry) not making use of these secure, partner provided resources for improving student data protection would find themselves both liable for any breaches, and also uninsured. Educational cybersecurity would no longer be a political blame game. Local implementation would still very much remain the purview of school districts, and ministries would remain very much in charge of funding their province or territory, but with focused federal support many of the associated expenses would be reduced through the centralization of resources. These savings would also be a carrot. With national cyber standards and partnerships that leverage the strengths of all members of Canada's education ecosystem (federal government, private industry, national not for profit, education ministries, and local school boards), Canadian students would enjoy access to more Canadian made digital learning opportunities that raise digital fluency in a meaningful way, and they could do this while also exploring cybersecurity in a way that creates a more secure Canada. Imagine what all these cyber-aware students could do for our national security. It's the only solution we have that scales to meet the problem. Those students go home and raise cyberawareness in their families and communities, reducing the main reason for successful cyberattacks.

We have a habit of regionalizing our approaches to government in Canada, but in the face of wildly asymmetrical threats like cybercrime and (increasingly) international cyber espionage, we need to push back against this culture and build a collaborative defence. In doing so we would also create much richer digital learning opportunities in our schools that would make Canada more secure and competitive in the networked, global economy.


The Solution: collaboration doesn't end locally, regionally or even nationally in Canada

I'm attending The Global Forum for Cyber Excellence's inaugural Global Conference on Cyber Capacity Building in Accra, Ghana at the end of November. 

"It is paramount for all nations to have the expertise, knowledge and skills to strengthen their cyber-resilience"

I'm presenting a research paper a former student and CyberTitan (Louise Turner) and I have written about the disruption quantum computing will cause to cybersecurity encryption in the coming years. Doing this research with Louise has been both eye opening and very intellectually satisfying, but after 20+ years in the classroom I'm still very much a cyber-educator first and a cyber researcher second. It's why I invited one of the next generation of cyber professionals to write the paper with me.

Looking at the program for the conference, the lack of talent and focus on developing cyberskills both in the population and in those interested in pursuing work in the industry isn't a Canada only problem, it's a global one. If we can repair Canada's internal cyber-education system, we can then work with international partners to help them do the same. The cyber battlefield inherently favours the anonymity of hackers damaging our systems with impunity for their own gain, but through collaboration the defenders could become mighty. A cyber-aware population would be foundational for reducing cyberattacks in our public services.

As the GFCE so eloquently puts it: "Nations should work together and support each other with these capabilities, so that no country is left behind in their digital evolution. After all, a chain is only as strong as the weakest link."  Look for the Accra Call: a global action framework that supports countries in strengthening their cyber resilience being announced during the conference.