Welcome to the Cybersecurity and Privacy Institute
Canada can be a world leader in cybersecurity and privacy, exploiting a growing need for solutions by exporting innovations in platforms, software and services to the world. Waterloo is Canada’s leader at turning information and communication technology (ICT) research into innovations that create economic advantage.
Waterloo has world-leading research strengths in:
- Privacy enhancing technologies
- Human-computer interaction
- Networks and distributed systems
- Mathematics relevant to cryptography.
Waterloo is uniquely capable of devising effective cybersecurity and privacy tools and technologies, commercializing these tools and technologies, developing the next generation of cybersecurity leaders, and leading an industry-academic collaboration.
Florian Kerschbaum - Executive Director
Cybersecurity and Privacy Institute 519-888-4567 ext. 37746
- July 16, 2018
An affiliate of the University of Waterloo’s Cybersecurity and Privacy Institute (CPI), Bessma Momani, leads the winning submission for the Defense Engagement Program.
The submission, The Future of Canadian Defence and Security: New Challenges, New Perspectives, provides a network of external experts for the Department of National Defence (DND), connects and educates the next generation of experts, and helps to inform Canadians about the importance of defence and security matters.
- June 8, 2018
Popular methods of protecting smartphone personal identification number (PINs) may only be successful in safeguarding your personal information 20 per cent of the time, according to a new study out of the University of Waterloo.
- Feb. 20, 2018
Cryptography done right has become increasingly important as the impacts of poor implementations are being felt by journalists, whistleblowers and political activists around the world.
- July 31, 2018
Vern Paxson, University of California, Berkeley / Corelight, Inc. / International Computer Science Institute
Many of the most costly security compromises that enterprises suffer manifest as tiny trickles of behavior hidden within oceans of other site activity. This talk will examine the problem of developing robust detectors for particular forms of such activity. The process is in some ways a dual to that of adversaries who seek to design algorithms to identify users who employ particular approaches for keeping their network activity private.