Successful implementation of cybersecurity into an operational technology (OT) environment demands recognition of its unique physical, cultural and organizational challenges. Only by acknowledging these can you craft a practical, effective approach that OT teams will buy into. Overcoming these hurdles...

Staying ahead of rapidly evolving cybersecurity risks in manufacturing
February 7, 2025 Manufacturing is complex, with many different digital parts, industrial control systems (ICS), the Internet of Things (IoT) and operational technology (OT). This fusion of hardware and software, intended to allow data to flow seamlessly, creates an interconnected environment that requires...
CGI today announced the signature of a share purchase agreement on January 29, 2025, to acquire BJSS, a UK-based technology and engineering consultancy known for its innovative IT solutions, software engineering expertise and delivery excellence.
In recent years, the automotive industry has faced an increasingly complex landscape of regulations focused on safety and environmental impact. These regulations are transformative, driving automotive manufacturers to reassess and fortify the security of their industrial environments, while also rethinking...
In deploying a global privacy protection program, a leading Canadian insurer partnered with CGI to handle change management for this crucial initiative. CGI’s main objective was to ensure the effective implementation of a Personal Information Protection (PIP) program and best...
We have worked with NATO’s Allied Command Transformation (ACT) to develop and implement its first AI-supported modular “knowledge agent” within the scope of a lighthouse project with the BI-SC NATO SECRET (NS) security classification level.

Driving more strategic IT governance, risk and compliance across the enterprise
October 28, 2024 CGI recommends addressing these challenges with minimal impact to resource capacity through automation and optimization such as IT governance, risk and compliance (GRC). IT GRC tools provide software and processes that support an integrated approach for identifying and minimizing cyber...