Cyber Security is part of everything we do and we have spent over 35 years creating secure solutions for our public sector and commercial clients. CGI has designed solutions for some of the world’s toughest security systems in programmes like Galileo – Europe’s satellite navigation system, the UK’s Police National Database and Ministry of Defence’s Medical Information Capability programme.
Our Secure Systems Engineering Approach
CGI has developed this approach based on over 35 years of experience in secure systems engineering. We offer an end-to-end security solution to our clients, addressing people, processes and systems via design, consulting and systems integration through to managed services provision.
We align our client’s information security requirements to their business objectives, protecting information assets, ensuring regulatory compliance and supporting governance.
We design and build cost-effective and secure systems, to protect against internal and external threats, assessing system architecture and implementing controls to secure applications, data and infrastructure. We assess the increasingly advanced cyber threat, manage our client’s threat and risk complexity as well as the technology and process complexity.
We comply with the system development life cycle best practices and adapt V-model and Rapid development approaches to ensure security from requirements to system testing. We adopt risk assessment methodologies and augment this with best practice threat modelling methodologies.
We are securing very large, complex solutions such as Galileo – Europe’s satellite navigation system, the Ministry of Defence’s Medical Information Capability (DMICP) and Skynet 5 programmes, the UK’s Police National Database (PND) and the secure service enabling utility companies to access information on the energy usage of the 53 million smart meters which will be deployed in the UK from 2015.
Our experts are respected in industry as thought leaders, for example, our approach to building secure systems was published in the Institute of Risk Management’s Cyber Risk: Resources for Practioners book.