Our Capabilities

Our specialist teams are described below. The capabilities work in isolation or within a blended team to reveal and resolve security vulnerabilities.

Attack Card Attack Card

ATTACK

CAPABILITIES

A team of specialists who provide the attacker’s perspective on people, organisations and problems to help you identify what to worry about and why.

WHAT WE DO



  • Attack methodology simulations
  • Human Physical and Digital attack pathways
  • Expert threat advice: states, journalists, criminals
  • Red Teams: Tabletop and real-world
  • Targeted research from open, deep and dark web
  • Threat contextualisation and education

WHO WE ARE



  • Attack Specialists and practitioners (physical, human)
  • Psychologists specialising in Attack
  • Threat Actor Experts
  • Digital pentesters
  • Operational Managers
  • OSINT experts (Online Research Experts)
Tech Card Tech Card

TECH

CAPABILITIES

A rich mix of deep technical experts provide technology and infrastructure advice on how to secure your organisation , and design technology for the future.

WHAT WE DO



  • Digital Security Monitoring; data and log analysis to detect security incidents
  • Vulnerability Identification; Identifying, analysing and assessing vulnerabilities in the organisations digital architecture, processes and working practices
  • Design; secure digital on premises, and cloud environments for organisations
  • Build; secure digital on premises, and cloud environments for organisations

WHO WE ARE



  • Digital Security Analysts
  • Vulnerability Researchers
  • Penetration Testers
  • Digital Security Architects
  • Software Engineers
  • Network Engineers
Train Card Train Card

TRAIN

CAPABILITIES

Learning and development expertise focussed on building the skills and capability necessary for organisations and people to understand security and threats.

WHAT WE DO



  • Bespoke training in advanced human and digital threats
  • Digital/cyber security beginner to advanced practitioner
  • Organisation-wide digital and strategic skills programmes
  • Senior leadership mentoring programmes
  • Role specific: human, cyber, management, leaders
  • Individual 'soft skills' training by psychologists

WHO WE ARE



  • Behavioural psychologists
  • Human factors expert
  • Offensive and defensive cyber experts
  • Analytical and OSINT experts
  • Senior Leadership and Strategic consultants
  • Senior Leadership and Strategic consultants
  • Highly experienced advanced threat investigators
Risk Card Risk Card

RISK

CAPABILITIES

A team of specialists who understand your industry and regulatory environment to help you define your mission-critical assets and how to protect them.

WHAT WE DO



  • Holistic Security Risk Assessment: reveal cyber, personnel and physical security risks
  • Threat and Vulnerability Assessment: pinpoint threats and highlight vulnerabilities
  • Capability Development: build tailored security frameworks, policies and standards
  • Operational Technology Security: technical risk assessments, OT cyber security policy and standards
  • Change Management: architect and deliver security change programmes

WHO WE ARE



  • Information Security Risk Specialist
  • Technical Security Specialist
  • Threat Experts
  • Insider Threat Expert
  • Physical Security Engineers
  • Information Security Governance Specialist
  • Security Architect
  • Cloud Security Specialist
Insider Card Insider Card

INSIDER

CAPABILITIES

Personnel security specialists with experience in helping organisations to identify, prevent, detect and manage the risks posed by people to whom they have entrusted with their critical assets.

WHAT WE DO



  • Leadership briefings, presentations and workshops
  • Insider risk assessments
  • Complex attack simulations and red-teams
  • Insider threat management programmes
  • Advice on Insider data collection and exploitation
  • Vetting and assurance of elite or high risk teams (e.g. For sensitive contract bids).

WHO WE ARE



  • Specialists in security governance
  • Experts in organisational behaviour
  • Vetting consultants
  • Technical monitoring specialists
  • Behavioural scientists
  • Investigators
  • Insider threat programme managers
Great! You've successfully subscribed.
Great! Next, complete checkout for full access.
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.