By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: ‘The cyber weather is always bad’: Leaders call for stronger collaboration to face evolving digital threats
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > ‘The cyber weather is always bad’: Leaders call for stronger collaboration to face evolving digital threats
News

‘The cyber weather is always bad’: Leaders call for stronger collaboration to face evolving digital threats

News Room
Last updated: 2025/06/13 at 3:19 PM
News Room Published 13 June 2025
Share
SHARE

A panel discussion at CIO Peer Forum in Ottawa. – Photo by Jennifer Friesen,

By the time MajorGeneral Dave Yarker took the mic at the CIO Association of Canada’s Peer Forum in Ottawa, the tone was already clear: Canada’s digital borders are under siege. 

“The cyber weather is always bad, much worse than Ottawa,” said Yarker, Commander of the Canadian Armed Forces Cyber Command.

He wasn’t being figurative. In cyber defence circles, “cyber weather” is a shorthand for the constant background noise of digital threats. And right now, the skies are stormy. 

According to panellists from the Canadian government and private sector, the threats facing Canada’s digital infrastructure are persistent, global, and increasingly automated. And perhaps most troubling of all, the most dangerous actors are no longer lone hackers or even traditional criminal networks.  

Now, the real threat comes from nationstates with time, resources, and political will.

Bridget Walshe, associate head of the Canadian Centre for Cyber Security at the Communications Security Establishment (CSE) speaks at the CIO Peer Forum.  – Photo by Jennifer Friesen,

A shifting threat landscape

Bridget Walshe, associate head of the Canadian Centre for Cyber Security at the Communications Security Establishment (CSE), laid out the findings from Canada’s latest National Cyber Threat Assessment. 

Among the most consistent and strategic threats, she said, are statesponsored actors, especially from China.

“The largest strategic threat that we see to Canada’s cybersecurity comes from the PRC,” said Walshe. “We’ve had over 20 compromises of Government of Canada networks from PRC actors in the last few years.”

Walshe also cited persistent cyber activity from Russia and statealigned actors targeting critical infrastructure and public events, such as attacks timed with President Zelensky’s visit to Canada. 

She noted that Iran and North Korea pose their own risks, particularly through cyberenabled repression and financially motivated ransomware activity.

On top of this, artificial intelligence is reshaping the threat landscape. 

“It’s used to find vulnerabilities. It’s used to make very convincing phishing emails. It’s used to research targets. It’s used to industrialize and to automate the processes used by the threat actors,” she said. “Artificial intelligence is really reaching that space where we’re starting to see the uptake in the cyber threat sphere.”

Yarker confirmed that the military sees the same list of hostile actors — China, Russia, Iran, North Korea — but explained that Cyber Command evaluates threats through a different lens: deliberate targeting.

“The things that get my attention are things that are deliberately targeted at the Canadian Armed Forces and the Department of National Defence,” he said. “Because those are the things that are going to have second and thirdorder negative impacts.”

Walshe and Yarker emphasized that understanding why attacks occur is just as important as understanding how. This distinction helps identify when an incident is background “cyber weather” or a sign of something more serious.

On the private sector side: Fewer resources, same battlefield

André Boucher, CISO at National Bank of Canada, offered a view from the frontlines of the private sector. He made no attempt to downplay the gap between what national agencies see and what he can access.

“I need what they see. I need their information. I need them to help me out and vector, and help us focus. Because I don’t have unlimited resources,” Boucher said. “These two very lucky people with us today hire the top 5% quality people in Canada… The rest of us, the 95%, we have to take what we have, invest it smartly, and do the best that we can with the tools that we have.”

When it comes to visible threats, Boucher pointed to ransomware as the most consistent risk, especially where it intersects with financial crime. He noted that commercial cyber detection tools often use different naming conventions and labels from those used by government, creating barriers to alignment.

His solution? Collaboration and trusted communities. 

“The analogy I always use is… imagine if we’re all connected and we’re all holding the same bat together, and I’m the one who’s first attacked by something and I swing and I miss, but I tell everybody in my community what just happened,” Boucher said. “They will not swing and miss.” 

But sharing isn’t always easy. 

“Your reputation is at risk,” he explained. “Your clients want to hear about it. Your lawyers are lawyering up. Your public relations team is telling you to zip it up.” 

In those moments, trust becomes currency. Boucher described private, encrypted channels, like Signal and Telegram, where industry peers quietly flag emerging threats to each other. It’s a closed loop, built on experience and discretion.

With a grin, he offered a warning: these are not the kind of spaces that welcome outside scrutiny. 

“So I hope in your single community, don’t bring journalists,” he joked. is still waiting for an invitation. 

André Boucher, CISO at National Bank of Canada, addresses the CIO Peer Forum in Ottawa. – Photo by Jennifer Friesen,

Resilience comes from planning, not improvisation

When moderator Bruno Couillard asked how each panellist’s organization builds cyber resilience, the consensus was that training, not tools, is the foundation.

“In the private sector, at least in publicly traded companies, you have a board,” said Boucher.  “As a CISO, I need my board to tell me what their risk appetite is. How bad can it get? Because I can’t do everything.” 

He stressed the importance of scenario planning and handson training to build resilience. He explained that organizations need to model risks, anticipate failures, and then actively rehearse responses through exercises like tabletop simulations and live attack drills, sometimes even using third parties to launch unannounced tests on their own teams. 

“Practice,” he said. “It’s not perfect, but it works.” 

Yarker agreed, saying, “If you do the basics well, there’s no guarantee, but that really works.”

Walshe expanded the discussion to include the human cost. 

“The fact that when there’s a cyber incident going on, and in this role we observe so many and have those conversations with the organizations and really hear the emotional impact and the toll it takes on people,” she said. “It’s also the ability to respond and understand and be resilient when somebody is coming after them with social engineering.”

Looking beyond AI to the quantum horizon

The panel ended by looking ahead to quantum computing. While AI is a current and active threat vector, Couillard raised concerns about the future risk of quantum computers cracking encrypted data years after it’s stored.

“I need to be very mindful with my next dollar,” Boucher said candidly, explaining that quantum computing is still a future concern (what he called “the day after next”) while AI poses immediate challenges. 

He noted that in boardroom discussions, quantum threats tend to get little traction, with decisionmakers often losing interest and moving on.

Walshe emphasized the importance of planning for quantum readiness through regular upgrade cycles. Organizations should be thinking about longterm resilience now, she said, by asking key questions during procurement and infrastructure decisions.

“What am I life cycling when I’m purchasing new equipment?” she asked. “Is it going to be automatically upgraded? When I’m working in the cloud, is my cloud service provider ready to start providing me with those things in my on prem infrastructure?”

Yarker echoed her caution. 

“Quantum remains a serious threat and a potential challenge,” he said. “But in terms of the things we can do today to mitigate how we guess that threat will materialize, we’re doing.” Still, he warned against tunnel vision. “The thing that worries me is the sort of more black swan bit that we’re not talking about.”

A shared defence with no bench limit

One of the most resonant moments came when Yarker recalled a comment from U.S. Cyber Command’s first leader. 

“Cyber is a team sport, but the best thing about this team sport is it’s got no bench limit,” he said.

It was a fitting close to a conversation that began with bad weather, because in a storm that never lets up, what matters most is who’s standing beside you.

Canada’s digital resilience, the panel agreed, doesn’t come from isolated defences or perfect systems. It comes from people, coordination, and shared responsibility.

Boucher summed it up by saying “Although we think we’re working in technology, we’re really working in the human landscape.”

is the national media partner for the CIO Association of Canada.


This article was created with the assistance of AI. Learn more about our AI ethics policy here.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Intel Begins Preparing Linux For Next-Gen DSA 3.0 Accelerators
Next Article Apple Says iOS 26 Can Reserve Space for Automatic Software Updates
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Answer to Win Your Share of $5,000: How Does GetBlock Simplify Full Node Hosting? | HackerNoon
Computing
I Took the #1 Spot in Mario Kart World’s Knockout Tour. Rule the Race With My Top 5 Tips
News
NetEase’s wuxia game Justice debuts on Steam, global launch expected this year · TechNode
Computing
Cyber Bill at risk of becoming a missed opportunity, say MPs | Computer Weekly
News

You Might also Like

News

I Took the #1 Spot in Mario Kart World’s Knockout Tour. Rule the Race With My Top 5 Tips

7 Min Read
News

Cyber Bill at risk of becoming a missed opportunity, say MPs | Computer Weekly

5 Min Read
News

Secure a lifetime of ad-free browsing for just $16

2 Min Read
News

Nintendo Switch 2 review: exactly good enough

18 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?