To provide companies the ability to innovate and transform their processes with speed and confidence to protect and secure people, data, and their networks at all times.
To become cybersecurity market leader helping customers navigate cyber threat landscape and take a broader view of cybersecurity and privacy as both protectors and enablers of the business.
To work alongside our customers to create a resilient and trusted digital world, even in the face of evolving threats, by bringing a combination of technological expertise and deep business knowledge that will enable them to reduce risks and costs, as well as increase productivity, efficiency and profits.
Integrity: Integrity is the foundation of our reputation. We believe in doing the right thing, we continuously thrive to deliver our work with honesty and truthfulness. We are committed to be transparent with our customers and each other.
Leadership: With leadership comes courage, vision and empowerment. We have the courage to challenge the status quo, the vision for a safe and protected world, and we are committed to empower our customers to make decisions that will improve their business and the lives of those in their network.
Innovation: We lead by innovating. We are focused on artfully applying cybersecurity and governance practices into scalable solutions to the connected world, dramatically influencing the sustainable transformation through innovation.
We value your privacy, please click on the link below to review our
PRIVACY POLICYOur cybersecurity consulting small business services start with identifying the threats, vulnerabilities, and impact of cybersecurity risks to your organization.
Let our cybersecurity consultants’ help you determine if your business’s cybersecurity controls are in compliance with current requirements through a gap assessment.
Instead of searching for a generic cybersecurity template let our Cybersecurity Consulting Small Business Team help you develop custom policies and plans that will best protect your organization.
Empower your people to protect themselves from cyber attacks. Cybersecurity Awareness Training makes it easy to launch training by providing a pre-built curriculum and automated phishing program so IT can focus on engaging users instead of administering training tools.
Our vCISO services are designed to augment security teams by bringing technical knowledge, compliance and governance expertise to your organization. The result is a security program with a direct focus on confidentiality, integrity and availability while mitigating risks.
Project management teams are an asset to your organization’s cyber security plan. Our experienced team, can help ensure that your projects are easily executed within a specific budget and completed on time.
Last updated
Thank you for choosing to be part of our community at CYSEC Consulting Inc. We are committed to protecting your personal information and your right to privacy. If you have any questions or concerns about this privacy notice, or our practices with regards to your personal information, please contact us at privacy@cysecconsulting.ca.
When you visit our website www.cysecconsulting.ca (the "*Website*"), and more generally, use any of our services (the "*Services*", which include the Website), we appreciate that you are trusting us with your personal information. We take your privacy very seriously. In this privacy notice, we seek to explain to you in the clearest way possible what information we collect, how we use it and what rights you have in relation to it. We hope you take some time to read it carefully. If there are any terms in this privacy notice that you do not agree with, please discontinue the use of our Services immediately.
This privacy notice applies to all information collected through our Services (which, as described above, includes our Website), as well as, any related services, sales, marketing or events.
Please read this privacy notice carefully as it will help you understand what we do with the information that we collect.
TABLE OF CONTENTS:
1. Cookie policy
2. How do we use your information?
3. Will your information be shared with anyone?
4. How long do we keep your information?
We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy notice, unless a longer retention period is required or permitted by law (such as tax, accounting or other legal requirements). No purpose in this notice will require us keeping your personal information for longer than 1 year.
5. How do we keep your information safe?
We have implemented appropriate technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, and as we follow generally accepted standards to protect Personal Information submitted to us, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure. Therefore, we cannot guarantee its absolute security.
6. Do we collect information from minors?
We do not knowingly solicit data from or market to children under 18 years of age. By using the Website, you represent that you are at least 18 or that you are the parent or guardian of such a minor and consent to such minor dependent’s use of the Website. If we learn that personal information from users less than 18 years of age has been collected, we will take reasonable measures to promptly delete such data from our records. If you become aware of any data, we may have collected from children under age 18, please contact us at privacy@cysecconsulting.ca.
7. What are your privacy rights?
If we are relying on your consent to process your personal information, you have the right to withdraw your consent at any time. Please note however that this will not affect the lawfulness of the processing before its withdrawal, nor will it affect the processing of your personal information conducted in reliance on lawful processing grounds other than consent.
8. Controls for do-not-track features
Most web browsers and some mobile operating systems and mobile applications include a Do-Not-Track feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. At this stage, no uniform technology standard for recognizing and implementing Do-Not-Track signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online.
9. Do we make updates to this Privacy Policy?
We may update this privacy notice from time to time to stay compliant with relevant laws. The updated version will be indicated by an updated "revised date” and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy notice, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to periodically review this page for the latest information on our privacy practices.
10. How can you contact us about this Privacy Policy?
If you have questions or comments about this notice, you may: