Cybersecurity

White papers

CGI- White paper
Title / Abstract Download PDF Number of pages
Canada's Cybersecurity Legislation
In 2015, the Government of Canada introduced a number of legislative amendments and programs in an effort to keep pace with the digital economy and growing cyberthreats to Canadian businesses and citizens. This paper summarizes initiatives to help CGI’s clients keep pace with changing requirements and ensure their customer information is well protected. View summary
Canada's Cybersecurity Legislation 7 / 297 KB
Convergence brings opportunity and risk
The high level preparedness required to mitigate both internal and external threats requires a more holistic approach that ensures cultural and behavioral change, as well as improved control and monitoring of operations. This paper examines recent drivers affecting security for utilities and offers a specific approach across people, process, technology and governance for addressing OT networks and facilities.
Convergence brings opportunity and risk 12 / 6 MB
Cyberprivacy and Cybersecurity for Health Data: Building confidence in health systems
Given that health data provides such a vital resource, but also contains some of the most sensitive information available, this paper offers key considerations for improving privacy and security postures in a continuously evolving landscape.
Cyberprivacy and Cybersecurity for Health Data: Building confidence in health systems 8 / 341 KB
Information Security Continuous Monitoring: Charting the Right Course
This white paper explores strategy selection tips and implementation best practices for U.S. government agencies to consider when moving to continuous diagnostics and mitigation (CDM) compliance. View summary
Information Security Continuous Monitoring: Charting the Right Course 12 / 392 KB
IT Security Governance – A holistic approach
IT security governance binds core elements of cyber defense and risk management—providing organizations with a holistic approach. This paper presents the approaches to help organizations develop effective IT security governance processes. View summary
IT Security Governance – A holistic approach 8 / 1 MB
Securing the mobile enterprise
Enterprise IT security in the “mobile age” is not what it used to be. The evolution from personal computers to personal devices in the workplace creates new and significant vulnerabilities and risks. This paper explores the mobile enterprise ecosystem, discusses key security concerns and shares defense strategies to ensure security in the mobile age.
Securing the mobile enterprise 13 / 435 KB