CGI helps clients assess security risk and design and deliver secure systems and infrastructure, so they can operate with confidence. Cybersecurity is part of everything we do.
Contrary
to
popular
opinion,
improving
your
cybersecurity
posture
does
not
have
to
be
an
expensive
investment.
It
is
possible
to
vastly
improve
enterprise
protection
and
monitoring
by
taking
some
very
basic
steps
that
provide
significant
returns.
Based
on
our
...
To
help
quantify
these
impacts,
CGI’s
UK
cybersecurity
leaders
commissioned Oxford
Economics to
create
a
rigorous
econometric
model
that
captures
the
damage
caused
by
a
cyber
breach
to
a
company’s
share
price.
The
model
was
used
to
analyze
publicly
listed
companies
that
...
Protecting sensitive assets and ensuring business continuity is essential to the digital enterprise. Particularly as increased connectivity and data sharing bring new vulnerabilities, customers and citizens need assurance that their personal information is safe when they engage.
CGI has invested heavily in establishing our cybersecurity credentials, working closely with international associations and standards bodies. Our global experience helps us predict and defend against new attacks, and our front-line capabilities reflect this knowledge. While cyber threats are global, we know that requirements vary locally and challenges are unique to each organization.
Key Services
Security consulting – providing strategy and roadmap, risk assessment plans, policies and procedures development, training and organizational change management for building cultural change into ways of working
Security engineering – helping clients implement and operate security systems and tools, including security information and event management (SIEM) systems and continuous diagnostics and monitoring (CDM)
Managed security services/security operations centers(SOCs) – including 24/7 systems monitoring, real-time reporting and immediate action on suspicious activity, whether on client premises or at CGI-managed SOCs, helping clients bridge the gap in security talent
Our independent U.S. IT Security Lab helps clients maximize the value of their systems and software while minimizing time to market. It is accredited by the National Voluntary Laboratory Accreditation Program and approved for National Information Assurance Partnership/Common Criteria Evaluation and Validation Scheme testing.
This paper describes the role of cybersecurity standards in the larger IT context, and offers best practices for establishing a cybersecurity standards framework and managing compliance.
Federal
agencies
have
a
complex
landscape
of
systems
and
data
that
require
a
dynamic
approach
to
managing
cybersecurity
risks
and
vulnerabilities.
Government
IT
enterprise
systems
and
data
are
susceptible
to
...
This future scan provides a big picture view of maturing, scaling and emerging technologies that are helping enterprises drive innovation, change and agility in today’s increasingly competitive marketplace.