Industry Spotlight: Focus on Cybersecurity

February 21, 2023

Navigating Industry Challenges with Insights from OECM’s Supplier Partners

Introducing OECM’s Industry Spotlight

OECM Industry Spotlight, Insights and Trends

OECM’s quarterly Industry Spotlight news resource provides customers with access to various supply chain and industry-related insights and trends gathered and analyzed by our Supplier Relationship Management (SRM) team. This includes up-to-date information on the various challenges our supplier partners are navigating, post-pandemic, as well as environmental, social, and economic factors that are impacting our industries, and more. 

In this second installment, we explore industry insights related to a timely and relevant topic that impacts OECM, its customers and its stakeholders – Cybersecurity.

Here, our team looks at rising cybersecurity concerns and threats, and dives deeper into why public sector organizations are more often the target of cyber criminals and identify OECM agreements available to help our customers across the broader public sector navigate these challenges.

Industry Insights: Cyberattacks and the Public Sector

Cyberattacks are more widespread and malevolent than ever before. With the recent wave of high-profile cyberattacks on major Ontario hospitals, school systems and government enterprises, it’s clear that in today’s unpredictable environment, public sector organizations are at particularly high risk. With more complex and volatile attacks, deep-seated cybercriminal networks, and advanced persistent threat (APT) groups that have greater access to technology which enables the development of malware, scripting and other tools used by potential hackers, the threat landscape is tougher than ever to navigate.

PwC Canada graph showing percentages of attacks among the telecom & technology, healthcare and public sectors
Eckert, C., & Abel, J. (n.d.). The emerging cybersecurity risks facing Canada’s public sector. PWC. Retrieved February 7, 2023, from

No organization is out of scope – cyber attacks affect not-for-profits, healthcare, and education, with government and public sector entities squarely in the crosshairs of cybercriminals. According to PwC Canada, only the telecom and technology sector experienced a larger proportion of attacks (14.1%) than the healthcare sector (11.9%) and public sector (11%) in Canada in the last year.

Furthermore, PwC Canada notes that government and public-sector entities are highly attractive targets of cyberattacks for the following reasons:

  • They hold significant volumes of highly coveted data
  • They are perceived to have virtually unlimited financial resources
  • They have often underinvested in cybersecurity, and are struggling to modernize legacy systems as well as attract and retain talented cyber professionals to their organizations

This means that government and public-sector organizations are likely to continue to be among the top targets of cyber criminals seeking financial gain or competitive intelligence in the coming years.

OECM recently collaborated with five of our Information Technology (IT) supplier partners to delve deeper into the dangers of cyberattacks on public sector organizations. Our latest, Warning: You’ve been Infected! features industry-led insights that deconstruct the threat of cyberattacks to the public sector, while highlighting available prevention strategies, cyber resiliency programs and post-attack recovery action plans.


While the cases of cyber threats and the landscape overall are expected to continue to grow exponentially due to increased hybrid cloud adoption and remote/work-from-home models, it’s not all doom and gloom. Organizations can and should plan ahead so that they have both, strong data protection and detection capabilities as well as a robust plan for recovery in place as part of their cyber resiliency and risk management strategies.

Many of OECM’s IT-focused supplier partners offer products and services to assist OECM customers with cybersecurity planning and risk management, including support and resources that can help organizations better prepare to keep cyber threats at bay while protecting their people and businesses for the long term. 

Check out these offerings available through the following agreements and supplier partners:

Cloud Technology and Related Professional Services

View Agreement

Awarded Supplier Partners:

Carahsoft Technology Corp. IBM Canada
Compugen Inc. iVedha Inc.
Computacenter TeraMach Inc.

Support & Resources Offered:

Access to public cloud Infrastructure-as-a-Service (IaaS)

  • Provides the ability to provision processing, storage, networks, and other computing resources
  • Managed network, storage, and server with the managed technology refresh cycle
  • Virtual machines
  • Secure, dual-factor method of remote access
  • Appropriate patch management

Platform-as-a-Service (PaaS), which is a resource that provides the ability to deploy onto cloud infrastructure organization-created and will adhere to Customer’s security policies such as:

  • NIST (National institute of Standards Technology) Cybersecurity Framework
  • CIS (Center for Information Security) Controls v7
  • ISO (International Standards Organization) 27001/27002 Cybersecurity Framework
  • SOC (Systems and Organization Controls) 2/3 Auditing Framework
  • CSA Star level 2 (with certification performed by a CSA- accredited certification body)
  • COBIT (Control objective for information and related technology) Cybersecurity Framework

Electronic Device Disposal and Recycling Services

View Agreement

Awarded Supplier Partners:

Compugen Finance Inc. Greentec International Inc.
eCycle Solutions Inc. Quantum Lifecycle Partners LP
ERS International

Support & Resources Offered:

The agreement will help our customers conveniently and securely manage their electronic device waste through IT asset disposition, secured media destruction, and electronic waste recycling.

Awarded suppliers under the agreement offer pick up, disposal, and recycling services through secure transport, as well as media destruction services by mechanically destroying the data bearing devices securely using appropriate methods.

Electronic Document and Records Management Solutions

View Agreement

Awarded Supplier Partners:

Coginov Inc. Ricoh Canada Inc.
Konica Minolta Business Solutions (Canada) Ltd. ThinkDox Inc.
Levio Conseils Inc.

Support & Resources Offered:

Access to:

  • Electronic Document and Records Management System
  • Annual Maintenance and Licensing
  • Digitization Services to convert physical records into digital-ready records
  • Professional Services
  • Consultation, implementation support and training to ensure solutions are accurately designed using best practices

Supplier will allow customer defined users the ability to control actions performed on records and by whom, including but not limited to:

  • Manage Security groups based on user roles
  • Identify the access and right of users within solution
  • Apply security rules to the content based on user role or assigned classification
  • Add extra level of security to document as required
  • Control what actions can be performed on records
  • Restriction on the ability to modify stored, declared records and their associated metadata

End-User Computing Devices and Services

View Agreement

Awarded Supplier Partners:

CDW Canada
Compugen Inc.
Dell Technologies

Support & Resources Offered:

Scope includes data protection and security where resources related to data backup, protection applications, security solutions, and security applications are provided.

IT Project-Based Professional Services

View Agreement

Awarded Supplier Partners:

01 Millennium Consulting Inc. FlexITy Solutions Inc. Levio Conseils Inc.
A.T. Consulting & Recruiting Inc. Green PI Inc. Procom Consultants Group Ltd.
Bell Canada iVedha Inc. Tech Mahindra Ltd.
Execute Strategy Inc.

Support & Resources Offered:

Support for various IT Projects:

  • Infrastructure Services
  • Network Services
  • System Integration
  • Quality Assurance and Testing
  • Additional IT Project-Based Related Professional Services (e.g., Audit and Compliance, Business Intelligence, Cloud Migration, Data Management, IT Disaster Recovery)

Access to cybersecurity-related professionals:

  • Penetration Tester
  • Security Analyst
  • Security Architect

IT Technical Resource Augmentation Services

View Agreement

Awarded Supplier Partners:

Calian Ltd. Randstad Interim Inc. Tundra Technical Solutions Inc.
David Aplin Group S.i. Systems Partnership Ward Technology Talent Inc.
PlanIT Search Inc. Step by Step Professional Services Inc.

Support & Resources Offered:

Supplier partners offering skilled resources to meet temporary IT needs:

  • Over 20 roles, four different experience levels, and the flexibility to screen, test and replace candidates
  • Access to professionals who can work on-site or from a remote location
  • Dedicated account executive to provide day-to-day administrative support

Access to cybersecurity-related professionals:

  • Vulnerability Assessment Specialist
  • Security Analyst
  • Security Architect
  • Security Specialist
  • Penetration Testing Specialist

Networking Products and Related Services

View Agreement

Awarded Supplier Partners:

Access 2 Networks Inc. Eclipse Technology Solutions Inc. Long View Systems Corp.
Bell Canada FlexITy Solutions Inc. Netagen Communication Technologies Inc.
Calian Ltd. Hypertec Systems Inc. Northern Micro Inc.
CDW Canada IBM Canada OnX Enterprise Solutions Ltd.
Cloud Managed Networks INSA Corp. Secure Links
Compugen Inc. Integra Data Systems Corp. Secure Sense Solutions Inc.
Computacenter TeraMach Inc. ISA Cybersecurity Inc. Softchoice Canada Inc.
Dell Technologies Lanworks Inc.

Support & Resources Offered:

Access to the latest physical and virtual networking products, including license subscriptions.

Products available from 23 supplier partners, including:

  • Access point products
  • Routers
  • Switches
  • Security products
  • Hybrid Networking Products (e.g., SDWAN)
  • Wireless LAN Controller products

Access to OEM products compatible with different IT environments, designs and infrastructure, to meet current established open standards.

Related Services:

  • Technical support services
  • Block resource hours
  • Onsite support services
  • Preventive maintenance and proactive diagnostics
  • Professional resources for network design and planning, installation and implementation and training
  • Software updates and hardware replacement

Software License Products and Related Services

View Agreement

Awarded Supplier Partners:

CDW Canada
Computacenter TeraMach Inc.
Softchoice Canada Inc.

Support & Resources Offered:

Cybersecurity-related software available including, but not limited to:

  • Cisco
  • CrowdStrike
  • Forcepoint
  • Proofpoint
  • Variphy
  • Varonis
  • Arctic Wolf
  • FireEye
  • RSA
  • Palo Alto

Please contact OECM Customer Support or the supplier partner with specific software questions.

Vulnerability Assessment and Penetration Testing Services

View Agreement

Awarded Supplier Partners:

3Tenets Consulting Inc. CDW Canada iVedha Inc.
BDO Canada LLP Computacenter TeraMach Inc.
Bell Canada IBM Canada

Support & Resources Offered:

Vulnerability Assessment Services:

  • Assess current network security measures to identify any vulnerability in the customer’s network
  • Conduct external and/or internal vulnerability scans to identify security vulnerabilities in customer’s assets and resources
  • Web application, website, wireless, and/or personal security awareness assessments and report security issues that post an imminent threat as they are being identified
  • Vulnerability assessment report upon completion, the supplier will confirm detailed reporting requirements with the customer prior to commencement

Penetration Testing Resources

  • Simulated cyberattack in an attempt to breach and exploit IT intentionally security
  • Application penetration
  • Network penetration
  • Social engineering
  • Web application

Optional Resources, including but not limited to:

  • Cloud assessment and penetration testing
  • Compromise assessment
  • Device penetration testing
  • Dynamic application security testing
  • Security awareness training
  • Threat risk assessment

Cybersecurity: What’s the Outlook?

Tight budgets and stretched resources – particularly in today’s ‘always on’ online world – can make it a challenge for organizations to keep up with new threats, as well as defence strategies, that seem to be emerging every day. However, it’s important to note that the threat isn’t going away. According to the World Economic Forum, in their Global Cybersecurity Outlook 2023, 86% of business leaders and 93% of cyber leaders believe that global geopolitical instability is likely to lead to a catastrophic cyber event in the next two years.

So, what should organizations focus on as they prepare?

As highlighted in the Government of Canada’s National Cyber Threat Assessment 2023-2024, “cyber threats can be mitigated through awareness and best practices in cybersecurity and business continuity.” Further, their assessors note that “cyber threats and influence operations continue to succeed today because they exploit deeply rooted human behaviours and social patterns, not merely technological vulnerabilities. Defending against cyber threats and related influence operations requires addressing both the technical and social elements of cyber threat activity.”

Working with a trusted third-party IT expert partner is vital to ensure that both types of vulnerabilities are detected and remediated before they are exploited by malicious threat actors. Using a holistic risk-based cyber approach can help organizations ensure they are supporting compliance and sound governance while cost-effectively addressing real-world risks and balancing those risks against other critical outputs, such as ensuring timely, effective, and efficient services.

OECM continues to work to facilitate opportunities for collaboration, transparency, and the timely exchange of information between suppliers and customers so that we can help you better identify and tackle supply chain and industry challenges and areas of impact.

If you have any questions about cybersecurity support and resources available through OECM agreements, please contact our Customer Support team at:

OECM Customer Support
1-844-OECM-900 (1-844-632-6900)

Check out OECM’s Industry Spotlight: Focus on Cloud Technology and Computing for more great supplier partner insights.

We use cookies on this website to improve functionality and performance, to analyze traffic to the website and to enable social media features. To learn more please see our Privacy Policy for details.