Cybersecurity

Resource center

Hervé  Ysnel
Hervé Ysnel

Driving more strategic IT governance, risk and compliance across the enterprise

2024-10-28 CGI recommends addressing these challenges with minimal impact to resource capacity through automation and optimization such as IT governance, risk and compliance (GRC). IT GRC tools provide software and processes that support an integrated approach for identifying and minimizing cyber...

Diane Gutiw
Diane Gutiw

Guardrails for data protection in the age of GenAI

2023-11-13 To mitigate the risks of data exposure, major AI and cloud technology vendors provide responsible use frameworks and the ability to use GenAI tools in secure environments without risking data leakage to the public models. However, in a multi-model AI...

Lucille Bonenfant
Lucille Bonenfant

Investing in data privacy to protect your stakeholders as you accelerate your digital transformation

2023-01-25 As we enter 2023, never has technology played a more critical role across our clients’ industries and geographies in satisfying the needs of their customers and citizens. In fact, the insights from the 1,700 business and IT executives interviewed for...

Lucille Bonenfant
Lucille Bonenfant

Building data privacy and protection into your daily operations

2022-01-28 Every year on January 28, the international community celebrates Data Privacy Day (known in Europe as “Data Protection Day”). The objective of this day is to raise awareness about the importance of respecting privacy, safeguarding data, and promoting data protection...

Kathryn Ashton
Kathryn Ashton

Using blockchain to combat counterfeiting in manufacturing

2021-05-06 Product authenticity plays a huge role in assuring consumer confidence for B2B and B2C businesses. Whether it’s COVID-19 vaccines, industrial goods, car parts or fair-trade chocolate, today consumers want assurance that the product they’ve purchased is genuine. Correspondingly, for manufacturers...

Richard Lush
Richard Lush

Helping defend against increases in phishing attacks related to COVID-19 scams

2020-10-20 In the new normal, education is key to helping people understand emerging cyber threats. While they juggle work and life at home, we need to support individuals by providing the best possible environment. Organizations that implement phishing training stand a...

Lakshminarayanan Nandakumar
Lakshminarayanan Nandakumar

A potential solution for protecting customer privacy when sharing smart meter data

2019-11-15 By 2020, the European Union (EU) aims to replace 80% of household electricity meters with smart meters. This is because smart meters are widely regarded as a key to reducing both energy consumption and emission levels. Along with smart meter...

Burns MacDonald
Burns MacDonald

Setting the standards in cybersecurity, part I: governance

2019-07-23 Cybersecurity is firmly on the critical path for digital enterprises, with board-level accountability. As reflected in the CGI Client Global Insights, there is a strong link between digital transformation and protecting the organization, as greater use of digital technology in...

Richard Lush
Richard Lush

Considerations when buying managed security services

2019-07-02 The trend for organizations of all shapes and sizes in buying managed security services continues to increase, and we’re seeing a rise in interest from all sectors. Is it any wonder? Access to the best cybersecurity talent, products and intelligence...