CGI supports UK Ministry of Defence's digitization of healthcareLONDON , Nov. 16, 2020 - The UK Ministry of Defence and CGI (NYSE: GIB) (TSX: GIB. A) have reached a strategic milestone in defining the migration of services to the MOD secure cloud as part of ...
Using gamification to teach children cybersecurity skillsCGI consultants created a game called Spoofy to teach young students valuable cybersecurity skills.
As digital maturity rises, so does cybersecurity risk
Cybersecurity is firmly on the critical path for digital enterprises, with board-level accountability. As reflected in the CGI Client Global Insights, there is a strong link between digital transformation and protecting the organization. This year, 80% of client executives we interviewed report their formal security policy covers the use of cloud-based solutions. Read about CGI’s balanced cloud approach.
Global insight, local understanding
CGI has a 40 year heritage of creating and securing critical business systems in complex, environments across the globe, including the defense and intelligence sectors. We have invested heavily in establishing our credentials, working closely with international security associations and standards bodies. While cyber threats are global, we know that requirements vary locally and challenges are unique to each organization. Through our expert talent, deep technical and business knowledge, security operations centers, best practices and frameworks, we work to ensure controls are baked in, not bolted on.
Cybersecurity is part of everything we do
How we support a client's journey to secure the enterprise.
Assess the risk
- Cybersecurity strategic validation
Conduct a comprehensive assessment to identify, quantify and prioritize cyber risks.
- Cybersecurity information classification
Conduct comprehensive data/information discovery and classification activities (baseline, policy, governance, etc.).
Protect the business
- Cybersecurity strategy
Develop a comprehensive cybersecurity strategy covering IT, operational technology (OT), industrial control systems (ICS), cloud, mobile, social, internal, regulations, etc.
- Cybersecurity policies and standards
Implement policies, standards and governance frameworks to ensure compliance (including regulatory).
- Build secure outcomes
Design and build secure outcomes through secure systems engineering and design, secure software life cycle, security by design, secure digital labs, DevSecOps, etc.
Operate with confidence
- Cybersecurity managed detection and response
Operate with comprehensive advanced managed security services, e.g., monitor, detect, hunt, respond, intelligent security operations center (SOC), etc.