Cybersecurity

Resource center

Willem Jan de Graaff
Willem Jan de Graaff

Why your manufacturing operations may be more vulnerable to cyber attacks than you realize

2025-10-23 Planning for the unexpected, even the unthinkable, allows manufacturers to invest in business continuity and protect themselves. Just as companies invest in workplace safety, cybersecurity should be recognized as a core component of operational resilience.

Kathleen Galvin
Kathleen Galvin

Insights into why cybersecurity and resilience are at the top of the executive agenda

2025-08-12 A dynamic and dangerous landscape Over the last 18 months, in the U.S. alone, we have witnessed cybersecurity breaches of everything from the U.S. Treasury...

Jennie Hagman
Jennie Hagman

Staying ahead of rapidly evolving cybersecurity risks in manufacturing

2025-02-07 Manufacturing is complex, with many different digital parts, industrial control systems (ICS), the Internet of Things (IoT) and operational technology (OT). This fusion of hardware and software, intended to allow data to flow seamlessly, creates an interconnected environment that requires...

Hervé  Ysnel
Hervé Ysnel

Driving more strategic IT governance, risk and compliance across the enterprise

2024-10-28 CGI recommends addressing these challenges with minimal impact to resource capacity through automation and optimization such as IT governance, risk and compliance (GRC). IT GRC tools provide software and processes that support an integrated approach for identifying and minimizing cyber...

Diane Gutiw
Diane Gutiw

Guardrails for data protection in the age of GenAI

2023-11-13 To mitigate the risks of data exposure, major AI and cloud technology vendors provide responsible use frameworks and the ability to use GenAI tools in secure environments without risking data leakage to the public models. However, in a multi-model AI...

Lucille Bonenfant
Lucille Bonenfant

Investing in data privacy to protect your stakeholders as you accelerate your digital transformation

2023-01-25 As we enter 2023, never has technology played a more critical role across our clients’ industries and geographies in satisfying the needs of their customers and citizens. In fact, the insights from the 1,700 business and IT executives interviewed for...

Kathryn Ashton
Kathryn Ashton

Using blockchain to combat counterfeiting in manufacturing

2021-05-06 Product authenticity plays a huge role in assuring consumer confidence for B2B and B2C businesses. Whether it’s COVID-19 vaccines, industrial goods, car parts or fair-trade chocolate, today consumers want assurance that the product they’ve purchased is genuine. Correspondingly, for manufacturers...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

Helping defend against increases in phishing attacks related to COVID-19 scams

2020-10-20 In the new normal, education is key to helping people understand emerging cyber threats. While they juggle work and life at home, we need to support individuals by providing the best possible environment. Organizations that implement phishing training stand a...

utilities industry icon
CGI’s Utilities Practice

A potential solution for protecting customer privacy when sharing smart meter data

2019-11-15 By 2020, the European Union (EU) aims to replace 80% of household electricity meters with smart meters. This is because smart meters are widely regarded as a key to reducing both energy consumption and emission levels. Along with smart meter...