Cybersecurity

Resource center

Federal agencies implementing zero trust frameworks must grapple with a broad range of factors that can influence plans and initiatives. Your application portfolio is a significant aspect of successfully implementing zero trust, and many agencies are at the starting line...

David Crawford, CGI Federal
David Crawford

Achieving operational efficiency through portfolio rationalization, IT modernization and zero trust implementations

April 23, 2025 A seemingly endless number of moving parts face federal chief information officers and other IT leaders every day, and it can be tempting to approach initiatives as isolated efforts, just for the sake of simplicity. However, nothing happens in a...

Stephanie Ackman, CGI Federal
Stephanie Ackman

Enhancing security through IT modernization

April 21, 2025 Zero trust implementation and IT modernization are interconnected concepts that enhance cybersecurity and operational efficiency, respectively. When organizations undertake them together, as a coordinated initiative, the benefits can multiply well beyond what either one alone can do. IT modernization goals...

David Crawford, CGI Federal
David Crawford

Bridging the gap: Aligning cybersecurity and financial strategy for government

October 25, 2024 In today's complex threat landscape, federal agencies must prioritize cybersecurity while navigating financial constraints. By effectively aligning cybersecurity and financial strategies, agencies can enhance their resilience, protect sensitive data and ensure compliance with regulations. Read on to discover key strategies...

David Crawford, CGI Federal
David Crawford

Protecting the crown jewels: safeguarding your data from cyber threats

October 18, 2024 Data is the primary target of cyber adversaries, By adopting a Zero Trust architecture, closely monitoring your systems, and managing access control are all vital steps in ensuring the confidentiality, integrity, and availability of your data.

David Crawford, CGI Federal
David Crawford

The key pillars of zero trust: Beyond identity, device, network, application, and data

October 3, 2024 Visibility and Analytics, Automation and Orchestration and Governance are the three pillars form the foundation of a robust Zero Trust architecture.

Jennifer Ricker professional photo
Jennifer Ricker

Insights from the 2024 NASACT Annual Conference

September 19, 2024 Today’s state leaders seek opportunities to safely leverage new technology, combat cyberattacks and comply with new governing rules and regulations. This was evident at the National Association of State Auditors, Comptrollers, and Treasurers (NASACT) annual conference, where finance leaders met...