Cybersecurity Consults

Cybersecurity consults provide expert guidance from UBC’s skilled cybersecurity professionals.  The consult team bridges the gap between security theory and technical implementation to ensure alignment with UBC Information Security Standards in real-world environments.

With experience spanning system administration, network engineering, cloud services, identity management, and more, our consultants deliver tailored, actionable advice to meet the diverse needs of the UBC community.

Features and Benefits

 

FeatureBenefits
Multiple Engagement Types
UBC ISS ALL

Offers flexibility to meet the requirements of projects and initiatives.

Ad-Hoc Security Consults – Provides rapid, informal support to address emerging security concerns or clarify the application of UBC Information Security Standards.

Security Assessments / System Security Plans – Ideal for planned deployments, security evaluations, or enhancing existing systems with improved controls and documentation.

Integrated Cybersecurity Specialists for Projects – Sustained security collaboration, advice, and oversight for complex, high-impact projects.

Service AvailabilityRegular business hours.  Engagements are handled by request.  Response times vary based on consultant availability and project priority.
Support Availabilityn/a
CostNone

Requirements and Eligibility

Audience

Any member of the UBC community may request this service.

Learn More

Getting Started

Requests for a Cybersecurity consult can be submitted through the Cybersecurity Services section of the UBC Self Service Portal.  Once your request is submitted, a Cybersecurity Architect will review it and contact you within 5 business days to discuss your needs and determine the appropriate engagement type.

Further Information

Ad-Hoc Security Consults 
Use this option when you need rapid, informal support to address emerging security concerns or clarify the practical application of UBC Information Security Standards.

  • Fast, Flexible Support – Short, informal engagements designed for quick expert input on specific security issues or processes.
  • Tailored Advice – Personalized recommendations from seasoned cybersecurity professionals.
  • Minimal Formalities – Peer-to-peer style consultation for immediate needs without extensive documentation.

Security Assessments / System Security Plans 
Ideal for planned deployments, security evaluations, or enhancing existing systems with improved controls and documentation.

  • Comprehensive Reviews – Deep-dive evaluations of systems, infrastructure, or applications based on UBC Information Security Standards.
  • Formal Documentation – Deliverables include risk assessments and tailored security plans.
  • Clear Engagement Boundaries – Defined timelines, outputs, and expectations ensure efficiency and focus.

Integrated Cybersecurity Specialists for Projects 
Perfect for complex, high-impact projects requiring sustained security oversight and hands-on collaboration.

  • Embedded Expertise – Ongoing involvement from a Cybersecurity specialist throughout your project lifecycle—from planning to post-launch.
  • Consistent Oversight – Continuously assess and improve security practices as the project evolves.
  • Best Practices, Realized – Achieve stronger outcomes by proactively addressing risks and aligning with UBC Information Security Standards.

Get Help

For support or more information about this service, please submit a ticket under Submit a Support Request in the Cybersecurity Services section of the UBC Self Service Portal. Support is provided during regular business hours.

Page last updated on July 15, 2025


UBC Crest The official logo of the University of British Columbia. Urgent Message An exclamation mark in a speech bubble. Bluesky The logo for the Bluesky social media service. Bookmark A bookmark in a book. Browser A web browser window. Caret An arrowhead indicating direction. Arrow An arrow indicating direction. Arrow in Circle An arrow indicating direction. Arrow in Circle An arrow indicating direction. Time A clock. Chats Two speech clouds. E-commerce Cart A shopping cart. Facebook The logo for the Facebook social media service. Help A question mark in a circle. Home A house in silhouette. Information The letter 'i' in a circle. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Location Pin A map location pin. Mail An envelope. Menu Three horizontal lines indicating a menu. Minus A minus sign. Pencil A pencil indicating that this is editable. Telephone An antique telephone. Play A media play button. Plus A plus symbol indicating more or the ability to add. Search A magnifying glass. Settings A single gear. Arrow indicating share action A directional arrow. Speech Bubble A speech bubble. Star An outline of a star. Twitter / X The logo for the X (aka, Twitter) social media service. User A silhouette of a person. Vimeo The logo for the Vimeo video sharing service. Youtube The logo for the YouTube video sharing service.