The energy transition is driving a shift toward the increasing use of distributed energy resources (DERs). DERs are smaller power-generation resources, usually located on the consumer side, that provide energy...
This CGI blog post discusses current challenges and opportunities in protecting the bank.
This blog discusses the need for a single, end-to-end solution that provides a holistic approach to fighting financial crime
How a policy of privacy by design sets your business up for the long term While for some, compliance with the General Data Protection Regulation (GDPR) was business as usual...
The aim of cyber attacks traditionally has been to either disrupt the target’s web service or to steal important information and other assets. A new and quickly spreading phenomenon is...

The impact of a cyber breach on public sector organizations

2017-06-22 Recently, CGI commissioned research from Oxford Economics— The Cyber-Value Connection —to explore the link between a cyber incident and company value. Specifically, we wanted to develop an analytical methodology to...

Securing the electricity network: Understanding the unique ICS environment of a utility

2017-06-22 In January this year, what was believed to be a switching mistake at a high-voltage station near Amsterdam in the Netherlands, caused a complete blackout in the capital and a...

Challenging your organization: 11 cybersecurity questions CEOs need to ask

2017-06-14 It is increasingly clear that cybersecurity is a key factor in a company’s performance, reputation and valuation. This point is brought home in The Cyber-Value Connection report published by CGI...

OT-IT convergence brings opportunities and risk

2017-06-01 Operational technology (OT) or industrial control systems (ICS) are responsible for keeping the power on and water and gas flowing to support essential services for consumers, industry and governments. As...

When IoT means Internet of Threats

2017-03-15 This new world of the Internet of Things (IoT) is transforming organizations as well as personal homes and even individual consumers into “data centers” where information technology is used for...