Richard Holmes
Richard Holmes

Persistent privacy powers professional businesses

2018-09-25

How a policy of privacy by design sets your business up for the long term While for some, compliance with the General Data Protection Regulation (GDPR) was business as usual...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

Treating cybersecurity like workplace safety

2018-07-06

Taking measures to protect employees from workplace accidents seems like an obvious need today, but that was not always the case. Less than half a century ago, there was no...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

The impact of a cyber breach on public sector organizations

2017-06-22

Recently, CGI commissioned research from Oxford Economics— The Cyber-Value Connection—to explore the link between a cyber incident and company value. Specifically, we wanted to develop an analytical methodology to examine...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

OT-IT convergence brings opportunities and risk

2017-06-01

Operational technology (OT) or industrial control systems (ICS) are responsible for keeping the power on and water and gas flowing to support essential services for consumers, industry and governments. As...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

When IoT means Internet of Threats

2017-03-15

This new world of the Internet of Things (IoT) is transforming organizations as well as personal homes and even individual consumers into “data centers” where information technology is used for...

Burns MacDonald
Burns MacDonald

10 measures for good IT security governance

2017-02-15

The sophistication and persistence of cyber-attacks are driven by the attractiveness of an organization’s role and assets. Often they are conducted by highly skilled international organized crime groups or foreign...