how do you give costs and bene˜ ts processes cybersecurity the€¦ · 1 react 2 comply 3 manage 4...

6
“How do you give cybersecurity the highest priority in your organization?” Cyber Protection & Resilience Solutions from CGI

Upload: others

Post on 31-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How do you give Costs and bene˜ ts processes cybersecurity the€¦ · 1 React 2 Comply 3 Manage 4 Quantify 5 Optimize CGI’s Managed Security Services Developments in cybersecurity

“ How do you give cybersecurity the highest priority in your organization?” Cyber Protection & Resilience Solutions from CGI

cginederland.nl

Experience the commitment

CGI is the world’s � fth largest business and IT service provider, with 68,000 professionals working across 40 countries. We enter into local partnerships with our clients, relying on the almost endless technology know-how within our company. Our focus on Cybersecurity, Big Data and IT Modernization helps our clients align their service offering with customers’ wishes. We can cut costs, make businesses more � exible and to prepare IT environments for the future. We do this with the greatest dedication and care, as a business partner that offers unparalleled experience in working with clients’ mission-critical systems and data.

Would you like to know more about CGI’s Cybersecurity Solutions? Please contact your account manager directly or through CGI:

T: +31 (0)88 564 0000E: [email protected]

www.cginederland.nl/cybersecurity

Complete range: technology, people, products, services and processesCustomer safety requires more than technology alone. Protection and resilience depend on human behavior and processes and the products and services on offer. Therefore, we offer a total solution in the � eld of cybersecurity. We analyze your information, design and develop security and protection measures and implement defensive solutions. We also train your organization, test all system and data security measures and take care of their management and maintenance.

Costs and bene� ts

The development and implementation of security policies involve certain costs. Our goal is always to support our customers as cost-effectively as possible. Therefore, we work closely with client teams. This cooperation is also geared towards helping them make conscious choices which match the level of risk they � nd acceptable and helping them comply with laws and regulations. The investment is offset against speci� c consequences, for example in the area of performance. In this way, clients may � nd a balance between costs and bene� ts and build strong business cases in which security contributes to the business.

CGI’s extensive safety portfolio

Worldwide, CGI offers an extensive portfolio of cybersecurity services, related to the areas Assess the Risk, Protect the Business and Operate with Con� dence. All of these services are also available locally.

Assess the RiskWith Assess the Risk we help you understand cyber threats and vulnerabilities and gauge risks. Together, we determine the ROI on security investments, build business cases for protection and determine the best cyber strategy for your organization.

Protect the BusinessProtect the Business allows us to offer tailored solutions and services, designed to protect the integrity of your business and the availability of your key assets.

Operate with Con� dence Operate with Con� dence is a business-oriented approach, allowing you to manage your complex information security and business environment, from compliance and audits to policies and architecture.

SECURE

APPLICATION

SE

RV

ICE

S

ASSESSMENTS

IDENTIT

Y

INDUSTRIALSECURITY

AND RESPONSE

SECURITY

SE

CU

RIT

Y

AND RISK

AND A

CCESS

CONTROLTESTING

STR

ATEG

Y

INCID

ENT DETECTION

SERVICES

MA

NA

GE

D

SECURITY

SOLUTIONS

SYSTEMSSERVICES

CY

BE

RS

EC

UR

ITY

CO

NFI

DEN

CE

OP

ER

ATE

WITH

THE BUSINESS

ASSESS

PROTECT

THE RIS

K

CGI map Cyber security 3slag_ENG.indd 2 02-04-15 15:48

Page 2: How do you give Costs and bene˜ ts processes cybersecurity the€¦ · 1 React 2 Comply 3 Manage 4 Quantify 5 Optimize CGI’s Managed Security Services Developments in cybersecurity

CGI Cyber Protection & Resilience SolutionsOptimized risk management and protection of your mission critical systems and data

Around the world, the digital transformation is connecting governments, citizens and businesses. Physical boundaries are unknown in our hyper-connected age, where distances are effortlessly bridged. The vast world of the past has � nally been compressed to a global village. This development brings unique opportunities. However, it also introduces challenges to which we must not close our eyes. After all, not all of our neighbors in the global village are friendly. In this new connected world, we need to identify new vulnerabilities and protect ourselves wherever necessary.

-

themselves against cybercrime depends on their cybersecurity maturity level. As a world leader in the � eld of cybersecurity, CGI can ful� ll that supporting role. Thanks to our Cyber Protection & Resilience Solutions, your data and mission critical systems and infrastructures are proactively protected against rapidly increasing external threats, ensuring you are well prepared for cyber incidents.

Practical solutions in three areas of operation

CGI’s Cybersecurity Maturity Model maps the extent to which your organization’s data and business-critical systems are protected from external threats. On the basis of this, it is possible to determine how resilient you are and which measures are needed to strengthen your security policies. For this, we have identi� ed three areas of operation:• Assess the Risk • Protect the Business• Operate with Con� dence

Within these areas, we offer a variety of practical solutions that jointly contribute to your organization’s customized security policies.

React to incident � ndings

• Fix red issues raised by incidents ef� ciently

• React to majorincidents

Comply with given standards

• Enforce laws & regulations

• De� ne & comply withcorporate rules

• Protect networks & systems

Manage proactively

• Carry out risk assessment and manage vulnerabilities

• Implement pro- actively security measures

• Monitor & Control networks & systems

Quantitatively Managed

• Report regularly on evidences & trends

• De� ne security service catalog for projects

• Threat & Vulnerability Analysis

Optimizing to enable business

• Develop security services for innovative business models and new technologies

• Enhanced security services

• Continuous Improvementand predictive analytics

Cybersecurity Maturity Levels

PERFORMED PLANNED MANAGED MEASURED DEFINED / TAILORED

1 React2 Comply

3 Manage4 Quantify

5 Optimize

CGI’s Managed Security Services

Developments in cybersecurity are moving ahead rapidly, but cybercriminals are always coming up with innovative attacks and threats. Staying ahead of cybercriminals is a task for specialists, who can focus on this type of crime 24 hours a day, 365 days a year. After all, your own priorities lie elsewhere: your core business. That’s why CGI Managed Security Services delivers the most speci� c and comprehensive services in the � eld of cybersecurity. Managed Security Services includes the complete management of the complex set of information security requirements and needs, including governance, risk management, data and infrastructure protection. We provide 24/7 end-to-end protection against cyber attacks and immediately take action whenever suspicious events are detected. Managed Security Services provides you with peace of mind, knowing your business is secure, and allows you to stay focused on what really matters: the continuity of your organization, serving your customers and operating with con� dence.

Cybersecurity: central to risk management

Protecting sensitive data and mission-critical systems and infrastructures against cyber attacks are high on the agenda of many public and private organizations. Protection against cyber attacks is part of broader risk management strategies. After all, in business, errors may lead to signi� cant � nancial loss and reputational damage. Governments have no margin for error when it comesto safety and privacy of citizens.

So many questions, but who has the answers?

For directors of public and private organizations, cybersecurity raises many questions. Who is responsible for the protection of vital systems and data, for example? Do all employees see ‘security’ as a shared responsibility? Does the organization know which data is most important, where it is located and how to adequately protect it, now that outsourcing and cloud computing are common practice?

Which risks do the use of mobile devices and social media entail? Can you safely adopt ‘Bring Your Own Device’ (BYOD) policies? Does your organization meet the high expectations of customers and employees in the area of privacy? Are you proactively searching for information leaks or looking for evidence these might be taking place? Do you have an adequate response plan in place, should something or someone infringe on your security? Which measures and investments are necessary and justi� able, taking into account your overall business case? Does a lower risk pro� le warrant lower security performance, higher management costs and reduced accessibility?

CGI’s answer: Cyber Protection & Resilience Solutions

All of these questions demand an appropriate response. An answer that takes your business into account, is suf� ciently cost-effective, and also complies with statutory requirements and industry standards in a transparent way. Not every organization has the knowledge and experience in-house required to provide such answers and anticipate rapid changes in the � eld of cybersecurity. The extent to which governments or companies are able to protect

Cyber Protection & Resilience Solutions: CGI’s total approach

As a result of the emergence of our ‘hyperconnected’ world, cybersecurity has rapidly become more important. For CGI, this is not a new phenomenon. Since the deployment of digitalization, we have been working closely with our global customers to improve safety. Over the years, we have developed a holistic approach, which offers room for policy and technology (infrastructure and applications), business (processes, products and services) and organization (people). Our vision emphasizes proactive protection as well as reactive resilience. Clients in the public and private sector are con� dent that our approach and services will fully protect them against cyber attacks. They can rely on continuity of their primary processes and minimal data loss. We ensure the reliability and availability of commercial organizations’ mission critical systems and help authorities strengthen public safety without compromising on civil liberties and privacy. And we safely bring together public and private parties, developing systems that are essential to the smooth functioning of our societies.

Since our company was founded in 1976, we have been actively operating as ‘Data Guardians’. Over the years, we have helped customers in the � eld of information security. This has resulted in broad as well as highly speci� c services. These range from compliance and audits to determining policies and architecture to protect clients against evolving cyber attacks. Public sector organizations as well as private companies bene� t from our deep expertise and business-oriented approach.

Unique facilities and experts Cybercrime is a global phenomenon, requiring a strong, collaborative response. That’s why we work closely with international information security and standardization organizations.

CGI is one of few providers to offer:• Three accredited security certi� cation

facilities in Canada, the United States and the United Kingdom

• 10 Security Operations Centers that continuously identify the best solutions for infrastructure and deployment and intercept and deal with more than 550 million cyber events every day

• More than 1,400 security professionals worldwide

Unlimited services, extensive local supportCybercriminals do not respect borders, but local markets do have different information security requirements and privacy laws. We act as the local security partner for our customers. We know their environment and culture and quickly respond to incidents. Our global coverage while helping to effectively detect and repel attacks from all countries and continents.

CGI: leading partner in Cybersecurity

“ We provide 24/7, end-to-end protection against cyber attacks.”

CGI map Cyber security 3slag_ENG.indd 1 02-04-15 15:48

Page 3: How do you give Costs and bene˜ ts processes cybersecurity the€¦ · 1 React 2 Comply 3 Manage 4 Quantify 5 Optimize CGI’s Managed Security Services Developments in cybersecurity

CGI Cyber Protection & Resilience SolutionsOptimized risk management and protection of your mission critical systems and data

Around the world, the digital transformation is connecting governments, citizens and businesses. Physical boundaries are unknown in our hyper-connected age, where distances are effortlessly bridged. The vast world of the past has � nally been compressed to a global village. This development brings unique opportunities. However, it also introduces challenges to which we must not close our eyes. After all, not all of our neighbors in the global village are friendly. In this new connected world, we need to identify new vulnerabilities and protect ourselves wherever necessary.

-

themselves against cybercrime depends on their cybersecurity maturity level. As a world leader in the � eld of cybersecurity, CGI can ful� ll that supporting role. Thanks to our Cyber Protection & Resilience Solutions, your data and mission critical systems and infrastructures are proactively protected against rapidly increasing external threats, ensuring you are well prepared for cyber incidents.

Practical solutions in three areas of operation

CGI’s Cybersecurity Maturity Model maps the extent to which your organization’s data and business-critical systems are protected from external threats. On the basis of this, it is possible to determine how resilient you are and which measures are needed to strengthen your security policies. For this, we have identi� ed three areas of operation:• Assess the Risk • Protect the Business• Operate with Con� dence

Within these areas, we offer a variety of practical solutions that jointly contribute to your organization’s customized security policies.

React to incident � ndings

• Fix red issues raised by incidents ef� ciently

• React to majorincidents

Comply with given standards

• Enforce laws & regulations

• De� ne & comply withcorporate rules

• Protect networks & systems

Manage proactively

• Carry out risk assessment and manage vulnerabilities

• Implement pro- actively security measures

• Monitor & Control networks & systems

Quantitatively Managed

• Report regularly on evidences & trends

• De� ne security service catalog for projects

• Threat & Vulnerability Analysis

Optimizing to enable business

• Develop security services for innovative business models and new technologies

• Enhanced security services

• Continuous Improvementand predictive analytics

Cybersecurity Maturity Levels

PERFORMED PLANNED MANAGED MEASURED DEFINED / TAILORED

1 React2 Comply

3 Manage4 Quantify

5 Optimize

CGI’s Managed Security Services

Developments in cybersecurity are moving ahead rapidly, but cybercriminals are always coming up with innovative attacks and threats. Staying ahead of cybercriminals is a task for specialists, who can focus on this type of crime 24 hours a day, 365 days a year. After all, your own priorities lie elsewhere: your core business. That’s why CGI Managed Security Services delivers the most speci� c and comprehensive services in the � eld of cybersecurity. Managed Security Services includes the complete management of the complex set of information security requirements and needs, including governance, risk management, data and infrastructure protection. We provide 24/7 end-to-end protection against cyber attacks and immediately take action whenever suspicious events are detected. Managed Security Services provides you with peace of mind, knowing your business is secure, and allows you to stay focused on what really matters: the continuity of your organization, serving your customers and operating with con� dence.

Cybersecurity: central to risk management

Protecting sensitive data and mission-critical systems and infrastructures against cyber attacks are high on the agenda of many public and private organizations. Protection against cyber attacks is part of broader risk management strategies. After all, in business, errors may lead to signi� cant � nancial loss and reputational damage. Governments have no margin for error when it comesto safety and privacy of citizens.

So many questions, but who has the answers?

For directors of public and private organizations, cybersecurity raises many questions. Who is responsible for the protection of vital systems and data, for example? Do all employees see ‘security’ as a shared responsibility? Does the organization know which data is most important, where it is located and how to adequately protect it, now that outsourcing and cloud computing are common practice?

Which risks do the use of mobile devices and social media entail? Can you safely adopt ‘Bring Your Own Device’ (BYOD) policies? Does your organization meet the high expectations of customers and employees in the area of privacy? Are you proactively searching for information leaks or looking for evidence these might be taking place? Do you have an adequate response plan in place, should something or someone infringe on your security? Which measures and investments are necessary and justi� able, taking into account your overall business case? Does a lower risk pro� le warrant lower security performance, higher management costs and reduced accessibility?

CGI’s answer: Cyber Protection & Resilience Solutions

All of these questions demand an appropriate response. An answer that takes your business into account, is suf� ciently cost-effective, and also complies with statutory requirements and industry standards in a transparent way. Not every organization has the knowledge and experience in-house required to provide such answers and anticipate rapid changes in the � eld of cybersecurity. The extent to which governments or companies are able to protect

Cyber Protection & Resilience Solutions: CGI’s total approach

As a result of the emergence of our ‘hyperconnected’ world, cybersecurity has rapidly become more important. For CGI, this is not a new phenomenon. Since the deployment of digitalization, we have been working closely with our global customers to improve safety. Over the years, we have developed a holistic approach, which offers room for policy and technology (infrastructure and applications), business (processes, products and services) and organization (people). Our vision emphasizes proactive protection as well as reactive resilience. Clients in the public and private sector are con� dent that our approach and services will fully protect them against cyber attacks. They can rely on continuity of their primary processes and minimal data loss. We ensure the reliability and availability of commercial organizations’ mission critical systems and help authorities strengthen public safety without compromising on civil liberties and privacy. And we safely bring together public and private parties, developing systems that are essential to the smooth functioning of our societies.

Since our company was founded in 1976, we have been actively operating as ‘Data Guardians’. Over the years, we have helped customers in the � eld of information security. This has resulted in broad as well as highly speci� c services. These range from compliance and audits to determining policies and architecture to protect clients against evolving cyber attacks. Public sector organizations as well as private companies bene� t from our deep expertise and business-oriented approach.

Unique facilities and experts Cybercrime is a global phenomenon, requiring a strong, collaborative response. That’s why we work closely with international information security and standardization organizations.

CGI is one of few providers to offer:• Three accredited security certi� cation

facilities in Canada, the United States and the United Kingdom

• 10 Security Operations Centers that continuously identify the best solutions for infrastructure and deployment and intercept and deal with more than 550 million cyber events every day

• More than 1,400 security professionals worldwide

Unlimited services, extensive local supportCybercriminals do not respect borders, but local markets do have different information security requirements and privacy laws. We act as the local security partner for our customers. We know their environment and culture and quickly respond to incidents. Our global coverage while helping to effectively detect and repel attacks from all countries and continents.

CGI: leading partner in Cybersecurity

“ We provide 24/7, end-to-end protection against cyber attacks.”

CGI map Cyber security 3slag_ENG.indd 1 02-04-15 15:48

Page 4: How do you give Costs and bene˜ ts processes cybersecurity the€¦ · 1 React 2 Comply 3 Manage 4 Quantify 5 Optimize CGI’s Managed Security Services Developments in cybersecurity

CGI Cyber Protection & Resilience SolutionsOptimized risk management and protection of your mission critical systems and data

Around the world, the digital transformation is connecting governments, citizens and businesses. Physical boundaries are unknown in our hyper-connected age, where distances are effortlessly bridged. The vast world of the past has � nally been compressed to a global village. This development brings unique opportunities. However, it also introduces challenges to which we must not close our eyes. After all, not all of our neighbors in the global village are friendly. In this new connected world, we need to identify new vulnerabilities and protect ourselves wherever necessary.

-

themselves against cybercrime depends on their cybersecurity maturity level. As a world leader in the � eld of cybersecurity, CGI can ful� ll that supporting role. Thanks to our Cyber Protection & Resilience Solutions, your data and mission critical systems and infrastructures are proactively protected against rapidly increasing external threats, ensuring you are well prepared for cyber incidents.

Practical solutions in three areas of operation

CGI’s Cybersecurity Maturity Model maps the extent to which your organization’s data and business-critical systems are protected from external threats. On the basis of this, it is possible to determine how resilient you are and which measures are needed to strengthen your security policies. For this, we have identi� ed three areas of operation:• Assess the Risk • Protect the Business• Operate with Con� dence

Within these areas, we offer a variety of practical solutions that jointly contribute to your organization’s customized security policies.

React to incident � ndings

• Fix red issues raised by incidents ef� ciently

• React to majorincidents

Comply with given standards

• Enforce laws & regulations

• De� ne & comply withcorporate rules

• Protect networks & systems

Manage proactively

• Carry out risk assessment and manage vulnerabilities

• Implement pro- actively security measures

• Monitor & Control networks & systems

Quantitatively Managed

• Report regularly on evidences & trends

• De� ne security service catalog for projects

• Threat & Vulnerability Analysis

Optimizing to enable business

• Develop security services for innovative business models and new technologies

• Enhanced security services

• Continuous Improvementand predictive analytics

Cybersecurity Maturity Levels

PERFORMED PLANNED MANAGED MEASURED DEFINED / TAILORED

1 React2 Comply

3 Manage4 Quantify

5 Optimize

CGI’s Managed Security Services

Developments in cybersecurity are moving ahead rapidly, but cybercriminals are always coming up with innovative attacks and threats. Staying ahead of cybercriminals is a task for specialists, who can focus on this type of crime 24 hours a day, 365 days a year. After all, your own priorities lie elsewhere: your core business. That’s why CGI Managed Security Services delivers the most speci� c and comprehensive services in the � eld of cybersecurity. Managed Security Services includes the complete management of the complex set of information security requirements and needs, including governance, risk management, data and infrastructure protection. We provide 24/7 end-to-end protection against cyber attacks and immediately take action whenever suspicious events are detected. Managed Security Services provides you with peace of mind, knowing your business is secure, and allows you to stay focused on what really matters: the continuity of your organization, serving your customers and operating with con� dence.

Cybersecurity: central to risk management

Protecting sensitive data and mission-critical systems and infrastructures against cyber attacks are high on the agenda of many public and private organizations. Protection against cyber attacks is part of broader risk management strategies. After all, in business, errors may lead to signi� cant � nancial loss and reputational damage. Governments have no margin for error when it comesto safety and privacy of citizens.

So many questions, but who has the answers?

For directors of public and private organizations, cybersecurity raises many questions. Who is responsible for the protection of vital systems and data, for example? Do all employees see ‘security’ as a shared responsibility? Does the organization know which data is most important, where it is located and how to adequately protect it, now that outsourcing and cloud computing are common practice?

Which risks do the use of mobile devices and social media entail? Can you safely adopt ‘Bring Your Own Device’ (BYOD) policies? Does your organization meet the high expectations of customers and employees in the area of privacy? Are you proactively searching for information leaks or looking for evidence these might be taking place? Do you have an adequate response plan in place, should something or someone infringe on your security? Which measures and investments are necessary and justi� able, taking into account your overall business case? Does a lower risk pro� le warrant lower security performance, higher management costs and reduced accessibility?

CGI’s answer: Cyber Protection & Resilience Solutions

All of these questions demand an appropriate response. An answer that takes your business into account, is suf� ciently cost-effective, and also complies with statutory requirements and industry standards in a transparent way. Not every organization has the knowledge and experience in-house required to provide such answers and anticipate rapid changes in the � eld of cybersecurity. The extent to which governments or companies are able to protect

Cyber Protection & Resilience Solutions: CGI’s total approach

As a result of the emergence of our ‘hyperconnected’ world, cybersecurity has rapidly become more important. For CGI, this is not a new phenomenon. Since the deployment of digitalization, we have been working closely with our global customers to improve safety. Over the years, we have developed a holistic approach, which offers room for policy and technology (infrastructure and applications), business (processes, products and services) and organization (people). Our vision emphasizes proactive protection as well as reactive resilience. Clients in the public and private sector are con� dent that our approach and services will fully protect them against cyber attacks. They can rely on continuity of their primary processes and minimal data loss. We ensure the reliability and availability of commercial organizations’ mission critical systems and help authorities strengthen public safety without compromising on civil liberties and privacy. And we safely bring together public and private parties, developing systems that are essential to the smooth functioning of our societies.

Since our company was founded in 1976, we have been actively operating as ‘Data Guardians’. Over the years, we have helped customers in the � eld of information security. This has resulted in broad as well as highly speci� c services. These range from compliance and audits to determining policies and architecture to protect clients against evolving cyber attacks. Public sector organizations as well as private companies bene� t from our deep expertise and business-oriented approach.

Unique facilities and experts Cybercrime is a global phenomenon, requiring a strong, collaborative response. That’s why we work closely with international information security and standardization organizations.

CGI is one of few providers to offer:• Three accredited security certi� cation

facilities in Canada, the United States and the United Kingdom

• 10 Security Operations Centers that continuously identify the best solutions for infrastructure and deployment and intercept and deal with more than 550 million cyber events every day

• More than 1,400 security professionals worldwide

Unlimited services, extensive local supportCybercriminals do not respect borders, but local markets do have different information security requirements and privacy laws. We act as the local security partner for our customers. We know their environment and culture and quickly respond to incidents. Our global coverage while helping to effectively detect and repel attacks from all countries and continents.

CGI: leading partner in Cybersecurity

“ We provide 24/7, end-to-end protection against cyber attacks.”

CGI map Cyber security 3slag_ENG.indd 1 02-04-15 15:48

Page 5: How do you give Costs and bene˜ ts processes cybersecurity the€¦ · 1 React 2 Comply 3 Manage 4 Quantify 5 Optimize CGI’s Managed Security Services Developments in cybersecurity

“ How do you give cybersecurity the highest priority in your organization?” Cyber Protection & Resilience Solutions from CGI

cginederland.nl

Experience the commitment

CGI is the world’s � fth largest business and IT service provider, with 68,000 professionals working across 40 countries. We enter into local partnerships with our clients, relying on the almost endless technology know-how within our company. Our focus on Cybersecurity, Big Data and IT Modernization helps our clients align their service offering with customers’ wishes. We can cut costs, make businesses more � exible and to prepare IT environments for the future. We do this with the greatest dedication and care, as a business partner that offers unparalleled experience in working with clients’ mission-critical systems and data.

Would you like to know more about CGI’s Cybersecurity Solutions? Please contact your account manager directly or through CGI:

T: +31 (0)88 564 0000E: [email protected]

www.cginederland.nl/cybersecurity

Complete range: technology, people, products, services and processesCustomer safety requires more than technology alone. Protection and resilience depend on human behavior and processes and the products and services on offer. Therefore, we offer a total solution in the � eld of cybersecurity. We analyze your information, design and develop security and protection measures and implement defensive solutions. We also train your organization, test all system and data security measures and take care of their management and maintenance.

Costs and bene� ts

The development and implementation of security policies involve certain costs. Our goal is always to support our customers as cost-effectively as possible. Therefore, we work closely with client teams. This cooperation is also geared towards helping them make conscious choices which match the level of risk they � nd acceptable and helping them comply with laws and regulations. The investment is offset against speci� c consequences, for example in the area of performance. In this way, clients may � nd a balance between costs and bene� ts and build strong business cases in which security contributes to the business.

CGI’s extensive safety portfolio

Worldwide, CGI offers an extensive portfolio of cybersecurity services, related to the areas Assess the Risk, Protect the Business and Operate with Con� dence. All of these services are also available locally.

Assess the RiskWith Assess the Risk we help you understand cyber threats and vulnerabilities and gauge risks. Together, we determine the ROI on security investments, build business cases for protection and determine the best cyber strategy for your organization.

Protect the BusinessProtect the Business allows us to offer tailored solutions and services, designed to protect the integrity of your business and the availability of your key assets.

Operate with Con� dence Operate with Con� dence is a business-oriented approach, allowing you to manage your complex information security and business environment, from compliance and audits to policies and architecture.

SECURE

APPLICATION

SE

RV

ICE

S

ASSESSMENTS

IDENTIT

Y

INDUSTRIALSECURITY

AND RESPONSE

SECURITY

SE

CU

RIT

Y

AND RISK

AND A

CCESS

CONTROLTESTING

STR

ATEG

YIN

CIDENT DETECTION

SERVICES

MA

NA

GE

D

SECURITY

SOLUTIONS

SYSTEMSSERVICES

CY

BE

RS

EC

UR

ITY

CO

NFI

DEN

CE

OP

ER

ATE

WITH

THE BUSINESS

ASSESS

PROTECT

THE RIS

K

CGI map Cyber security 3slag_ENG.indd 2 02-04-15 15:48

Page 6: How do you give Costs and bene˜ ts processes cybersecurity the€¦ · 1 React 2 Comply 3 Manage 4 Quantify 5 Optimize CGI’s Managed Security Services Developments in cybersecurity

“ How do you give cybersecurity the highest priority in your organization?” Cyber Protection & Resilience Solutions from CGI

cginederland.nl

Experience the commitment

CGI is the world’s � fth largest business and IT service provider, with 68,000 professionals working across 40 countries. We enter into local partnerships with our clients, relying on the almost endless technology know-how within our company. Our focus on Cybersecurity, Big Data and IT Modernization helps our clients align their service offering with customers’ wishes. We can cut costs, make businesses more � exible and to prepare IT environments for the future. We do this with the greatest dedication and care, as a business partner that offers unparalleled experience in working with clients’ mission-critical systems and data.

Would you like to know more about CGI’s Cybersecurity Solutions? Please contact your account manager directly or through CGI:

T: +31 (0)88 564 0000E: [email protected]

www.cginederland.nl/cybersecurity

Complete range: technology, people, products, services and processesCustomer safety requires more than technology alone. Protection and resilience depend on human behavior and processes and the products and services on offer. Therefore, we offer a total solution in the � eld of cybersecurity. We analyze your information, design and develop security and protection measures and implement defensive solutions. We also train your organization, test all system and data security measures and take care of their management and maintenance.

Costs and bene� ts

The development and implementation of security policies involve certain costs. Our goal is always to support our customers as cost-effectively as possible. Therefore, we work closely with client teams. This cooperation is also geared towards helping them make conscious choices which match the level of risk they � nd acceptable and helping them comply with laws and regulations. The investment is offset against speci� c consequences, for example in the area of performance. In this way, clients may � nd a balance between costs and bene� ts and build strong business cases in which security contributes to the business.

CGI’s extensive safety portfolio

Worldwide, CGI offers an extensive portfolio of cybersecurity services, related to the areas Assess the Risk, Protect the Business and Operate with Con� dence. All of these services are also available locally.

Assess the RiskWith Assess the Risk we help you understand cyber threats and vulnerabilities and gauge risks. Together, we determine the ROI on security investments, build business cases for protection and determine the best cyber strategy for your organization.

Protect the BusinessProtect the Business allows us to offer tailored solutions and services, designed to protect the integrity of your business and the availability of your key assets.

Operate with Con� dence Operate with Con� dence is a business-oriented approach, allowing you to manage your complex information security and business environment, from compliance and audits to policies and architecture.

SECURE

APPLICATION

SE

RV

ICE

S

ASSESSMENTS

IDENTIT

Y

INDUSTRIALSECURITY

AND RESPONSE

SECURITY

SE

CU

RIT

Y

AND RISK

AND A

CCESS

CONTROLTESTING

STR

ATEG

Y

INCID

ENT DETECTION

SERVICES

MA

NA

GE

D

SECURITY

SOLUTIONS

SYSTEMSSERVICES

CY

BE

RS

EC

UR

ITY

CO

NFI

DEN

CE

OP

ER

ATE

WITH

THE BUSINESS

ASSESS

PROTECT

THE RIS

K

CGI map Cyber security 3slag_ENG.indd 2 02-04-15 15:48