Persistent privacy powers professional businesses
How a policy of privacy by design sets your business up for the long term While for some, compliance with the General Data Protection Regulation (GDPR) was business as usual...
How a policy of privacy by design sets your business up for the long term While for some, compliance with the General Data Protection Regulation (GDPR) was business as usual...
Taking measures to protect employees from workplace accidents seems like an obvious need today, but that was not always the case. Less than half a century ago, there was no...
The aim of cyber attacks traditionally has been to either disrupt the target’s web service or to steal important information and other assets. A new and quickly spreading phenomenon is...
Recently, CGI commissioned research from Oxford Economics— The Cyber-Value Connection—to explore the link between a cyber incident and company value. Specifically, we wanted to develop an analytical methodology to examine...
Utilities and energy delivery systems begin to seek the benefits that the convergence of information technology (IT) and operational technology (OT) offers, they also face the challenge of increased vulnerability...
It is increasingly clear that cybersecurity is a key factor in a company’s performance, reputation and valuation. This point is brought home in The Cyber-Value Connection report published by CGI...
Operational technology (OT) or industrial control systems (ICS) are responsible for keeping the power on and water and gas flowing to support essential services for consumers, industry and governments. As...
This new world of the Internet of Things (IoT) is transforming organizations as well as personal homes and even individual consumers into “data centers” where information technology is used for...
My previous blog discussed how the path to greater cybersecurity maturity requires viewing security as more than just mandatory to running the business, but also as a key enabler of...
The sophistication and persistence of cyber-attacks are driven by the attractiveness of an organization’s role and assets. Often they are conducted by highly skilled international organized crime groups or foreign...