Cybersecurity

Resource center

CGI, one of the largest independent IT and business consulting services firms in the world, today announced the signature of an exclusivity agreement to acquire Apside, a France-based leading digital and engineering services firm. The agreement was signed with Apside’s...

EPZ Nuclear Power Plant Borssele, a nuclear power plant in the Netherlands originally built in the 1970s, collaborated with CGI to address cybersecurity vulnerabilities and enhance operational efficiency. Operating in a highly regulated industry, the plant faces considerable security and...

Successful implementation of cybersecurity into an operational technology (OT) environment demands recognition of its unique physical, cultural and organizational challenges. Only by acknowledging these can you craft a practical, effective approach that OT teams will buy into. Overcoming these hurdles...

Jennie Hagman
Jennie Hagman

Staying ahead of rapidly evolving cybersecurity risks in manufacturing

February 7, 2025 Manufacturing is complex, with many different digital parts, industrial control systems (ICS), the Internet of Things (IoT) and operational technology (OT). This fusion of hardware and software, intended to allow data to flow seamlessly, creates an interconnected environment that requires...

CGI today announced the signature of a share purchase agreement on January 29, 2025, to acquire BJSS, a UK-based technology and engineering consultancy known for its innovative IT solutions, software engineering expertise and delivery excellence.

In recent years, the automotive industry has faced an increasingly complex landscape of regulations focused on safety and environmental impact. These regulations are transformative, driving automotive manufacturers to reassess and fortify the security of their industrial environments, while also rethinking...

In deploying a global privacy protection program, a leading Canadian insurer partnered with CGI to handle change management for this crucial initiative. CGI’s main objective was to ensure the effective implementation of a Personal Information Protection (PIP) program and best...