Discussion about this post

User's avatar
Pete Hillier's avatar

Alex — your piece does a good job of describing the symptoms of Canada’s federal cyber challenge: fragmented implementation, committee-heavy governance, and an absence of decisive leadership. Where I think it misses an important dimension is why many departments are structurally resistant to the kind of centralized direction you’re calling for.

That resistance isn’t ignorance or inertia. It’s the product of history and governance design.

In the early-2000s, when I was establishing Managed Security Services at CGI, industry providers were aggregating operational security telemetry on behalf of roughly 45 federal departments. During that period, Communications Security Establishment approached industry requesting access to the aggregated data.

The response was straightforward and non-ideological: we could not provide that data without violating dozens of departmental contracts. Each department was — and remains — the data owner and the risk authority. If CSE wanted access, it needed to seek consent from the participating departments directly.

That did not happen.

What followed were candid discussions across the Canadian security community, many convened under the Standards Council of Canada, where a clear position was established: industry would not bypass departmental authority, contractual obligations, or consent models in response to centrally framed requests, regardless of intent.

That episode matters because it hardened a lesson departments have not forgotten:

Central visibility without explicit authority, consent, and accountability is not leadership — it is unmanaged risk.

This history also aligns directly with how Treasury Board Secretariat security policy actually works — a point often missed in calls for stronger central control.

TBS does not direct departments to implement security in a prescriptive or operational way. It establishes overarching policy objectives, principles, and expectations, and deliberately leaves implementation to departments. That is by design. Departments remain accountable for their own systems, data, and risk decisions, and they are expected to adopt policy in ways that fit their mandate, threat profile, and legal obligations.

In other words, departments are not ignoring leadership; they are operating within the governance model Parliament and Treasury Board have chosen.

This is why arguments that Canada’s cyber posture could be fixed if a central actor simply “took charge” fail to resonate internally. They collide with two enduring realities:

CSE does not have standing authority to compel departmental data sharing, and history has reinforced caution around informal or implied expansion of mandate.

TBS security policy is enabling, not coercive — it defines the what and why, not the how, where, or with whom data is shared.

So yes, the federal cyber system lacks coherence. But the solution is not stronger assertion within existing boundaries. It is clearer authority, explicit consent models, and governance mechanisms that respect departmental ownership by construction rather than by reassurance.

Until that foundation exists, skepticism toward centralization isn’t obstructionism — it’s responsible governance informed by experience.

1 more comment...

No posts

Ready for more?