New cybersecurity threats emerge every day. This reality creates significant challenges for state and local officials working to safeguard the integrity, confidentiality and availability of data, networks and systems. Those responsible for protecting sensitive data face a constantly changing regulatory landscape, ongoing budget challenges and a shortage of skilled workers.
Cybersecurity is a huge job that is only getting bigger. Agencies have a large and constantly expanding set of information assets and operations, each representing different levels of risk and vulnerability. Resources may be susceptible to internal threats, such as disgruntled employees, and external threats, such as malware, identity theft rings, hacktivists and more. Cyber experts need to understand the security posture of all of their IT applications and networks.
Security is a part of everything we do at CGI. Since 1976, we have helped clients achieve business objectives securely. We help government at all levels understand cyber threats, build strong security business cases, strengthen resilience and determine the return on their security investments.
CGI cybersecurity offerings for state and local government include:
- Security consulting – providing risk assessment plans for improving security posture, policy and procedure development for internal and external threats, analytics, forensics, recovery and training
- Security systems integration and implementation – helping clients implement and operate security systems and tools, including security information and event management systems, web content filtering tools, and continuous diagnostics and monitoring (CDM) to automatically assess a security posture
- Security operations centers (SOCs) – providing managed security services to include 24/7 systems monitoring, real-time reporting and immediate action on suspicious activity, whether on government client premises or at CGI-managed SOCs
- Application security – drawing on more than a decade of application security experience, from design and test to remediation and deployment, including cryptographic key management for high-value business processes
Additional services include identity and access management (such as biometrics), cloud security and software security testing for common criteria standards via our U.S. IT Security Lab.