Developing Cyber Security peace of mind

If you think technology can solve your security problems , then you don't understand the problems and you don't understand the technology.
-Bruce Schneier
6391-59e4baee5f619

Since 2017

Our story 

We focus on Risk Assessment relationships

The Cyber Risk Profile Review illustrates posture and status

Our team works with your team as a “Virtual CISO”

We can prepare you for your Audit and Certification (ISO 27002)

This is a journey!

History and Experience are great teachers 

  • Never underestimate the amount of money, time, and effort someone will expend to thwart a security system.


  • It's always better to assume the worst. Assume your adversaries are better than they are.

  • Assume science and technology will soon be able to do things they cannot yet.


  • Give yourself a margin for error. Give yourself more security than you need today. When the unexpected happens, you'll be glad you did.


  • Only amateurs attack machines; professionals target people

  • You can never be 100% protected, you will be hacked!!
  • ...But you can be 100% ready


Hacker-Thumb-a1
  • Mitigate risk via a tailored aproach

  • Focus on the highest priorities- then move on, grounded in Data and Analytics

  • Step by step process, with Flexibility and Evaluation Planning

  • Stakeholder visibility and engagement - strategic counselling

  • Preparation, reputation management and quicker recovery
  • Digital Evidence Registry 
What does mature cyber security look like?
How to assess your cyber security practices & maturity?
Where to begin developing your Cyber Security Roadmap?
                              Cyber security is proactive and not reactive
                              Cyber security is unobtrustive 


                   Cyber security processes are documented and repeatable 
                              There is a sound risk management mindset & an embedded culture     

WHY Us?

6391-59e4baee5f619
We offer AN independent View 
6391-59e4baee5f619
WE have the insight and experience to deliver structured cyber risk management solutions
6391-59e4baee5f619
WE can Show a measurable impact - we measure what matters
6391-59e4baee5f619
WE offer ongoing contiguous monitoring of progress and related risk posture

OUR PARTNERS IN CONSULTING AND TOOL SETS 

Contact Us
  • All the hype around Cyber Risk 
  • Daily disruptions and breach events 
  • Posture and risk are not technical discussions
  • ISO/IEC 27001 & 27002: 2013
  • Cyber Security and the related risk is a Board responsibility