{"id":567309,"date":"2022-07-05T08:53:02","date_gmt":"2022-07-05T08:53:02","guid":{"rendered":"https:\/\/www.capgemini.com\/?page_id=517768"},"modified":"2025-04-03T07:54:54","modified_gmt":"2025-04-03T11:54:54","slug":"define","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/","title":{"rendered":"Define"},"content":{"rendered":"\n<div class=\"wp-block-cg-blocks-hero-picture-card undefined  heroPictureCard\"><div class=\"heroPictureCardBgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg\" class=\"desktopImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 37%\" loading=\"eager\"\/><\/picture><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg\" class=\"mobileImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 37%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-8 col-lg-6\"><div class=\"heroPictureCardBox\"><div class=\"heroPictureCardBoxTitle\"><h1 data-maxlength=\"144\">Define<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"small-device\"><div class=\"brandLogoWrapper\"> <\/div><\/div><\/div>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">You can depend on Capgemini for cybersecurity services. We\u2019ll define your business priorities, assess your current maturity levels, and implement a risk mitigation strategy that is both continuous and effective.<\/h2><p class=\"intro-para-content\">Our Define services portfolio includes both strategic and operational consulting services, and a wide range of assessment and testing capabilities. Working closely with your key stakeholders, we tailor a strategy and roadmap that aligns with your business objectives to help you be resilient and reduce cyber risk.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video\"><div class=\"bg-color video-align-left\"><div class=\"container\"><div class=\"row video-align-right\"><div class=\"col-md-12\"><div class=\"video-align-right row box box--4 box--mini\"><div class=\"col-md-1\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/MmKOmZ6hVjI\" frameborder=\"0\" rel=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div><\/div><\/div><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Global threat intelligence<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">We can help eliminate threats swiftly &#8211; and before it&#8217;s too late.<\/p><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>As a result, we empower your business to become a digital disruptor without fear of being disrupted, safely explore security automation, AI, analytics, and cloud security, and modernize your current security practices. We&#8217;ll also help you meet compliance requirements and security regulations, and drive higher ROI from your security investments.<\/p>\n\n\n\n<p><em><strong>Understand where you are today, where you want to be tomorrow, and how to get there<\/strong>.<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video\"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Cybersecurity experience center<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">A physical space that brings together our capabilities and partners.<\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/n21DLrQ5I1Y\" frameborder=\"0\" rel=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-wrapper-client-stories section-client-stories\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"clientblock-title\"><\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"slider-nav-wrapper smallDevice\"><div class=\"slider-nav\"><button class=\"slider-prev  inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><button class=\"slider-next \" aria-label=\"Slider next\"><\/button><\/div><\/div><div class=\"slider-list\"><div class=\"slide active\">\n\t\t\t<div class=\"slide-bg-wrapper\">\n\t\t\t\t<picture><source srcset=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg?w=2880&amp;quality=70 2x\"\n\t\t\t\tmedia=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg?w=2880&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg?w=2048&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg?w=480&amp;quality=70 1x, https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg?w=960&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 0)\"\/><img decoding=\"async\" loading=\"lazy\" class=\"slide-bg\" src=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2019\/08\/Capgemini_Client-stories_Cybersecurity-assessment-of-a-multinational-bank.jpg\" alt=\"\"\n\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\"\n\t\t\/><\/picture><div class=\"slide-reveal\"><\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"slide-info-wrapper\">\n\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t<div class=\"col-12 col-lg-6\">\n\t\t\t\t\t\t\t<div class=\"slide-info\">\n\t\t\t\t\t\t\t\t<a aria-label=\"Cybersecurity assessment of a multinational bank\"\n\t\t\t\t\t\t\t\t   href=\"https:\/\/www.capgemini.com\/ca-en\/news\/client-stories\/cybersecurity-assessment-of-a-multinational-bank\/\">\n\t\t\t\t\t\t\t\t\t<div class=\"box\">\n\t\t\t\t\t\t\t\t\t\t<h3 class=\"client-subtitle\">Cybersecurity assessment of a multinational bank<\/h3>\n\t\t\t\t\t\t\t\t\t\t<p>We helped one of the world\u2019s largest banks measure its cybersecurity progress against multiple benchmarks in one of the most complex cybersecurity assessments ever<\/p>\n\t\t\t\t\t\t\t\t\t<\/div><!-- End of box-->\n\t\t\t\t\t\t\t\t<\/a><div class=\"slide-info-footer\">\n                                <div class=\"brand-logo-wrapper\"><\/div>\n\t\t\t<div class=\"content-more\">\n\t\t\t\t<a class=\"cta-button\" href=\"https:\/\/www.capgemini.com\/ca-en\/news\/client-stories\/cybersecurity-assessment-of-a-multinational-bank\/\" aria-label=\"Read more about Cybersecurity assessment of a multinational bank\"><span>Read more<\/span><\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div><!-- End of slide info-->\n<\/div>\n<\/div>\n<\/div>\n<\/div><!-- End of container-->\n\n<\/div><!-- End of slide active -->\n<\/div><div class=\"slider-nav-wrapper largeDevice\"><div class=\"slider-nav\"><button class=\"slider-prev  inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-how-we-do-it section section--howwedoit block-howwedoit\"><div class=\"container\"><div><div class=\"content-title\"><h2 data-maxlength=\"72\" class=\"expandable-heading-tag\">What we do<\/h2><\/div><p><\/p><\/div><div class=\"section-content\">\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Strategic, advisory and transformation<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Cybersecurity isn\u2019t just an obligatory response to risk &#8211; it can also be a business enabler.<\/p><\/div><div class=\"expander-content\"><p>We can help you define the right strategy and transformation program; experience a breach before it happens; and protect your sensitive data and assets.<br><br>Use the links below to find out more about how CxOs address cybersecurity and data privacy to build digital trust and resilience; to read about how our Cybersecurity experience center \u2013 the epicenter for cybersecurity simulations \u2013 can help you experience a breach before it happens; and to find out more about our compliance-as-a-Service offering.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Cyber consulting link\" href=\"\/wp-content\/uploads\/2021\/05\/Cybersecurity-Consulting_brochure.pdf \" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Cyber consulting<\/a><a class=\"more2\" aria-label=\"Cyber experience center link\" href=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/30\/2022\/05\/Brochure-Cyber-Experience-Center.pdf\" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Cyber experience center<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-pressed=\"false\" aria-expanded=\"false\"><h4>Assessment and testing<\/h4><\/div><div class=\"expander-subtitle\"><h5>Measure the maturity and effectiveness of your security posture so you can develop plans to increase effectiveness across the entire enterprise.<\/h5><\/div><div class=\"expander-content\"><p>Our portfolio of assessment and testing services \u2013 maturity assessments, attack simulation and Pen testing services \u2013 will give you the understanding of where you are today and provide a foundation to build your roadmap going forward.<br>\u00a0\u00a0<br>Use the links below to see how secure you are with our maturity assessments, and to find out about our cyber attack simulation services and Pen Testing Services.<\/p><div class=\"content-more\"><a class=\"more2\" aria-label=\"Cyber defense maturity link\" href=\"\/wp-content\/uploads\/2021\/05\/CSNA.19.04.24.L001.R-CDME_Brochure.pdf \" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Cyber defense maturity<\/a><a class=\"more2\" aria-label=\"Cyberattack simulation link\" href=\"\/wp-content\/uploads\/2021\/05\/Brochure_CyberAttackSimulation.pdf \" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Cyberattack simulation<\/a><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 9c093682-31d6-4555-8234-8a366807db4b\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"slider prev\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"slider next\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cyber defense centers powered by Microsoft Sentinel \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCyber defense centers powered by Microsoft Sentinel \t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"We help our clients keep their systems, applications and data protected, day and night. \"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWe help our clients keep their systems, applications and data protected, day and night. \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"See our brochure about Cyber defense centers powered by Microsoft Sentinel \"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/01\/CDC-Brochure.pdf\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSee our brochure\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/05\/Capgemini_Cyber-defense-centers-powered-by-Microsoft-Sentinel.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Define the right strategy\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDefine the right strategy\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"How CxOs can address cybersecurity and data privacy to build digital trust and resilience.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tHow CxOs can address cybersecurity and data privacy to build digital trust and resilience.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"See our brochure about Define the right strategy\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"\/wp-content\/uploads\/2021\/05\/Cybersecurity-Consulting_brochure.pdf\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSee our brochure\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/11\/Capgemini_Research_CxO-cybersecurity.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"slider prev\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"slider next\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t\n\n\n<section class=\"wp-block-cg-blocks-wrapper-partners undefined section section--partners-small\"><div class=\"container\"><div class=\"content-title\"><h2 class=\"partner-heading\">Partners<\/h2><\/div><div class=\"row\">\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/ca-en\/about-us\/technology-partners\/ibm\/\" class=\"partner-box-title\" aria-label=\"IBM puts smart to work. Capgemini helps you make the most of it.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2025\/10\/Partners-ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/ca-en\/about-us\/technology-partners\/microsoft\/\" class=\"partner-box-title\" aria-label=\"Working together to help companies boost business value with cloud-powered solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2025\/10\/Partners-microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/ca-en\/about-us\/technology-partners\/oracle\/\" class=\"partner-box-title\" aria-label=\"Business with imagination. We shape powerful Oracle technology to create winning solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2025\/10\/Partners-oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/ca-en\/about-us\/technology-partners\/sap\/\" class=\"partner-box-title\" aria-label=\"Unlock growth, agility and value with a proven partner. 40+ years of SAP expertise.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/ca-en\/wp-content\/uploads\/sites\/17\/2025\/10\/Partners-sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n<\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":119,"featured_media":0,"parent":567315,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[],"industry":[],"partners":[],"page-type":[231],"content-group":[],"class_list":["post-567309","page","type-page","status-publish","hentry","page-type-service"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Consulting And Risk Assessment Services | Capgemini<\/title>\n<meta name=\"description\" content=\"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Define\" \/>\n<meta property=\"og:description\" content=\"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Canada - English\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T11:54:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/\",\"url\":\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/\",\"name\":\"Cybersecurity Consulting And Risk Assessment Services | Capgemini\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/ca-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg\",\"datePublished\":\"2022-07-05T08:53:02+00:00\",\"dateModified\":\"2025-04-03T11:54:54+00:00\",\"description\":\"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/ca-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/www.capgemini.com\/ca-en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Define\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/ca-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/ca-en\/\",\"name\":\"Capgemini Canada - English\",\"description\":\"Capgemini Canada - English\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/ca-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Consulting And Risk Assessment Services | Capgemini","description":"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/","og_locale":"en_US","og_type":"article","og_title":"Define","og_description":"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.","og_url":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/","og_site_name":"Capgemini Canada - English","article_modified_time":"2025-04-03T11:54:54+00:00","og_image":[{"url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/","url":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/","name":"Cybersecurity Consulting And Risk Assessment Services | Capgemini","isPartOf":{"@id":"https:\/\/www.capgemini.com\/ca-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg","datePublished":"2022-07-05T08:53:02+00:00","dateModified":"2025-04-03T11:54:54+00:00","description":"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#primaryimage","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg","contentUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/ca-en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.capgemini.com\/ca-en\/services\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Define"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/ca-en\/#website","url":"https:\/\/www.capgemini.com\/ca-en\/","name":"Capgemini Canada - English","description":"Capgemini Canada - English","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/ca-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/ca-en\/services\/cybersecurity\/define\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Define","url":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Canada - English","logo":""},"keywords":[],"dateCreated":"2022-07-05T08:53:02Z","datePublished":"2022-07-05T08:53:02Z","dateModified":"2025-04-03T11:54:54Z"},"rendered":"<meta name=\"parsely-title\" content=\"Define\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/ca-en\/services\/cybersecurity\/define\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-07-05T08:53:02Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/ca-en\/wp-content\/themes\/capgemini2025\/assets\/images\/mockup.png","featured_image_alt":false,"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Canada - English","distributor_original_site_url":"https:\/\/www.capgemini.com\/ca-en","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/pages\/567309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/comments?post=567309"}],"version-history":[{"count":20,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/pages\/567309\/revisions"}],"predecessor-version":[{"id":676883,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/pages\/567309\/revisions\/676883"}],"up":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/pages\/567315"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/media?parent=567309"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/brand?post=567309"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/partner_type?post=567309"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/service?post=567309"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/industry?post=567309"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/partners?post=567309"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/page-type?post=567309"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-en\/wp-json\/wp\/v2\/content-group?post=567309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}