Typical Benefits

For progressive Enterprises, change is endemic and the drive to exploit benefits offered from new Cloud and Mobile technologies should be rewarding.

Making data work and be easily accessible by Employees, Contractors and Suppliers is expected; but care is needed to ensure that Systems and Data are protected.
Cyber Security will have to remain a priority for the foreseeable future.

The Cyber Security architecture needed for this new digital transformation is evolving.
Terms such as secure web gateway (SWG), cloud access security broker (CASB), zero trust network access (ZTNA), and remote browser isolation (RBI), federated identity provider (FIP) encapsulating useful available techniques.

Having a rapid review by external eyes is good insurance and should result in increased confidence.
We consult with the Enterprise’s CISO and their team to learn about their concerns and share our knowledge and experience to help shape plans.

We learn from the Enterprise’s C- Suite their business priorities and feedback possible architecture options that minimise cyber security risk as well as providing independent review of current systems.


Our approach comprises interviews with C-Suite personnel after a suitable confidentiality agreement is signed.

We base our investigation on the same principles as those originally outlined in UK NCSC Cyber Assessment Framework (CAF) version 3, September 2019.

This document provides guidance and tools to address the following categories: Managing Security Risk, Defending Systems against Cyber Attack, Detecting Security Events, and Minimising Impact of Security Incidents.

Our key methodology is simple: to encourage the Enterprise to define their “Data Crown Jewels” and who should have access and then to have a plan to protect them.

Our Requirements of You

* Ensuring an executive sponsor from your organisation is allocated to the engagement, communicates the rationale behind it and signs off any ‘Terms of Reference’.
* Assisting in all possible ways to ensure that a contract, (and confidentiality agreement where necessary) is in place, in advance of any work commencing.
* Ensuring all support is in place and access is granted for all and any required data, processes, policies, meeting rooms and nominated resources to enable successful delivery of the engagement.
* Ensuring sponsor availability within the agreed timeline, to resolve any significant issues that may impact the timely completion of the engagement, if not resolved in a timely manner.

Our Commitments to You

* Provide support throughout service delivery using our World Class Professionals and Subject Matter Experts.
* Provide high quality deliverables in a timely manner and in line with agreements upon engagement with the client. (Any changes to this will be mutually agreed in writing, in advance, between all involved parties).
* Provide deep insights and genuine value-add in all possible areas throughout the engagement.
* Provide progress updates and feedback at regular intervals, agreed in advance or at the engagement ‘kick off session’.
* Respect all personal and professional development of client team members throughout the engagement.


Project based engagements operate by agreeing the work and any outcomes or milestones for delivery in advance of commencement of any engagement in a ‘Statement of Work”

  • A report describing our findings and our recommendations along with supporting evidence
  • Availability for a post report interrogation by any interested panel

Available Service Engagement Model

Project Based Engagement

Project based engagements operate on the basis of agreeing work and any outcomes or milestones for delivery in advance of commencement of any engagement in a ‘Statement of Work’. Prices are fixed for the agreed deliverables and should changes be required, these may incur changes to delivery costs. Payment for Project Based Engagements are agreed on a case-by-case basis, giving consideration to risk, contract value, client payment history, relationship longevity and duration.

Relevant Business Perspectives