You are here

National Cybersecurity Awareness Month

DLT Cybersecurity Expert, Don Maclean

Headshot of Don Maclean, Chief Cyber Technologist, DLTHave cybersecurity questions, but don't know who to ask? Don Maclean, DLT's Chief Cybersecurity Technologist is here to provide valuable insight into cybersecurity challenges facing the public sector. Don’t let your important cybersecurity questions go unanswered. Ask Don today.

Fill out the form on the right, and get your questions answered.

Learn more about Don.




DLT Cybersecurity Awareness Initiatives

DLT ICIT Briefing

Access the ICIT Briefing 2019 resources: event photos, recordings, presentations, and more.


DLT has officially launched a new online forum focused on cybersecurity that caters to public sector professionals charged with protecting our public institutions and IT systems. We're calling it GovCybersecurityHub. Visit the forum

Don's Blogs

Don Maclean shares his wealth of knowledge in blogs, articles, and whitepapers, all available on Access our vault of cybersecurity knowledge.


In Modernization Requires Leadership: Leading the way to Cloud Security, Zero Trust, and Threat Intelligence, DLT and ICIT experts detail the role of leadership in ensuring the success of three aspects of modernization: the cloud, zero trust, and threat intelligence.

DLT Cybersecurity Portfolio

DLT brings you a portfolio of security offerings to strengthen your current security posture and look ahead to new solutions that make adversaries scramble to keep pace. Explore our expanding portfolio.

Common Cybersecurity Vocabulary

Malicious attempts to damage, disrupt or gain unauthorized access to computer systems, networks or devices, via cyber means.
Find out more...
A security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter.
The protection of data, applications, and infrastructures involved in cloud computing, involves maintaining adequate preventative protections so you: Know that the data and systems are safe.
Explore the hybrid cloud...
Malicious software that makes data or systems unusable until the victim makes a payment.
Don't get held for ransom...
Untargeted, mass emails sent to many people asking for sensitive information (such as bank details) or encouraging them to visit a fake website.
Protect yourself...
A more targeted form of phishing, where the email is designed to look like it's from a person the recipient knows and/or trusts.
Get prepared...