Network breaches happen daily in the digital age, so it is imperative that we stand vigilant in our fight against persistent malware threats, while supporting standards that safeguard data privacy and enhances the effective communication of cyber threat incidents and identified intrusion indicators. Rapid response time is priority.

Read More


Business Permits and Licences Process. BizPaL is a service provided by the Federal, Provincial/Territorial, and Municipal governments for the purpose of providing Canadians with direct access to information about the programs and services offered by the Government of Canada.

Read More


Professional character is evident in the visioneering of such a business development as public-sector-lists.com and in the courage and perseverance it takes to do the right thing. Growing business with professionals of integrity is a given throughout our digital community

Read More

Business to Government in Canada | Supplier Recourse – Part 1

Supplier Recourse – Government of Canada | Part 1 From time to time, small and medium enterprises may feel that they have not been fairly treated by a government department or agency regarding a particular procurement. The federal government maintains the Office of the Procurement Ombudsman with the following mandate: to ensure the fairness, openness

How Governments Buy – Government of Canada | Part 2

In the last issue we briefly discussed how departments buy goods and services, in general terms. We finished with a few points on the example of providing training services to government departments, and on the concept that departments generally provide training services themselves. To elaborate on that same theme, we need to look at what

Bids and Bid Preparation | Government of Canada

Suppliers normally prepare bids in response to a Request for Proposal (RFP)– these can be found on the Merx website. Departments go through PWGSC to use the open bidding process when they can’t get what they need from an existing Standing Offer or Supply Arrangement, and the anticipated contract value exceeds the sole-source limit. RFP’s

Call for Tenders | Government of Canada

Call for Tenders | Government of Canada We left off at the federal governments use of Standing Offers to procure goods and services. The other main approach is to call for tenders in response to a Request for Proposal (RFP) document, and to let a contract. Departments can access suppliers directly under certain circumstances, which

2015 Training Calendar and Speaking Events – Netrunner Inc. – A Canadian Cyber Defence Company

Patrick Malcolm, Digital Forensics and Security, Ottawa, Canada http://netrunner.ca/calendar.html Course Title Duration  Course Fee  Course Date Computer Forensic Analysis 5-Days  $    3,495.00 23-Feb-15 Network Forensic Essentials 2-Days  $    1,095.00 2-Mar-15 Network Security Essentials 3-Days  $    2,395.00 4-Mar-15 Digital Forensic Essentials 2-Days  $    1,095.00 9-Mar-15 Incident Response Essentials 3-Days  $    2,395.00 11-Mar-15 Network Forensic Analysis 5-Days

Computer Forensic Analysis 5 Day Hand on Workshop *

Time is running out to benefit from the 500.00 discount for the upcoming Sept. 9-13 Computer Forensics Workshop. Contact 613-748-6222 ext 2 vyersh@netunner.ca for quotes, details and registration. Experiential learning using our custom problem based learning modules develops your Forensic skills quickly. We offer the only All Canadian Law and Best Practices Computer Forensics workshop


Patrick Malcolm welcomes you to  “Current Challenges of the Digital Forensics Profession” We want everyone who works in the Canadian and Provincial Government to have access to this free 55-minute teleseminar. We admire and appreciate the dedication of IT Security professionals now tasked with addressing the challenges of the emerging and expanding Cyber Threat to

Cyber Security Complimentary Webinar – Why attackers get in

You are invited to attend a complimentary webinar, in our Summer Cyber Security Awareness Series. Wednesday August 7, 2013 at 12:00 pm noon. Here is what it is about. “Current Challenges of the Digital Forensics Profession” The defensive capabilities of traditional security tools have been eclipsed by the capabilities of modern attackers. The evidence is