This blog discusses the need for a single, end-to-end solution that provides a holistic approach to fighting financial crime
How a policy of privacy by design sets your business up for the long term While for some, compliance with the General Data Protection Regulation (GDPR) was business as usual...
The aim of cyber attacks traditionally has been to either disrupt the target’s web service or to steal important information and other assets. A new and quickly spreading phenomenon is...
Recently, CGI commissioned research from Oxford Economics— The Cyber-Value Connection —to explore the link between a cyber incident and company value. Specifically, we wanted to develop an analytical methodology to...
In January this year, what was believed to be a switching mistake at a high-voltage station near Amsterdam in the Netherlands, caused a complete blackout in the capital and a...

Challenging your organization: 11 cybersecurity questions CEOs need to ask

cybersecurity practice CGI’s Cybersecurity Practice

2017-06-14 It is increasingly clear that cybersecurity is a key factor in a company’s performance, reputation and valuation. This point is brought home in The Cyber-Value Connection report published by CGI...

OT-IT convergence brings opportunities and risk

Jim Menendez Jim Menendez

2017-06-01 Operational technology (OT) or industrial control systems (ICS) are responsible for keeping the power on and water and gas flowing to support essential services for consumers, industry and governments. As...

When IoT means Internet of Threats

Jim Menendez Jim Menendez

2017-03-15 This new world of the Internet of Things (IoT) is transforming organizations as well as personal homes and even individual consumers into “data centers” where information technology is used for...

Leave the “running” of cybersecurity to trusted partners to focus on digital transformation

Mika Hållfast Mika Hållfast

2017-03-08 My previous blog discussed how the path to greater cybersecurity maturity requires viewing security as more than just mandatory to running the business, but also as a key enabler of...

10 measures for good IT security governance

Burns MacDonald Burns MacDonald

2017-02-15 The sophistication and persistence of cyber-attacks are driven by the attractiveness of an organization’s role and assets. Often they are conducted by highly skilled international organized crime groups or foreign...