National Retailer
PCI DSS (Tier1)
National retailer with aggressive expansion plans required a successful audit to be completed within an extremely challenging deadline. Having undertaken a gap analysis of existing controls, a detailed plan was formalised to address network segregation, end-user device control, enhanced encryption standards, and revised security policies.
UK Police
BCP / Crisis Management
Approached by a UK University to assist with a business continuity and crisis management review initiated by a UK police force. Responsible for guiding technical and BCP risks, alongside managing the crisis communication reviews. Co-authored the final report for the Regional Gold Command (extracts incorporated into the revised National Digital Policing Strategy).
Retailer / Developer
Well Architected Framework
A national organisation migrated their entire on-premise infrastructure to the Microsoft Azure cloud but failed to address the Reliability, Cost Optimisation, Operational Excellence, Performance Efficiency, and Security benefits. A review established a Critical rating in all areas and a subsequent schedule of work was formulated detailing how architecture, infratsructure and network teams could address the issues over the course of 10 months.
Retailer / Developer
Microsoft Defender Suite
A retailer had migrated their on-premise infrastructure into the Microsoft Azure cloud but retained the incumbent anti-malware software. The lack of integrated security meant overall visibility of their security posture affected their ability to effectively manage their potential threat surface. A program of works was undertaken to implement Defender for Office 365, Defender for Endpoint and Cloud App Security (Defender for Identity was delayed whilst an IAM/PAM review was undertaken) In addition, Azure Defender was implemented for servers and storage, reducing operational costs, simplifying management and improving the reporting capabilities of the platform.
Insurance Company
Data Protection Consultancy
The introduction of GDPR legislation was proving challenging for an insurance company; a lack of awareness regarding where data was stored, coupled with limited controls was determined as an unaccpetable risk. A program of works was created to audit all of the company's data (including initial discovery), determine its utility, categorise it, and establish a robust data processing lifecycle. This included automating PIA and DPIA requirements, managing ROPA, automating DSAR requests and creating an Incident and Breach Response plan.
UK Government (DfT)
SCADA Controls
A UK government department with 158 remote sites required sensitive control systems, located in unmonitored buildings, to be secured against unlawful access. Following configuration audits and sampled penetration tests (including RTU/PLC/IED Firmware, Node Service, Encryption and Application Security), a report containing a technical and managerial overview of findings was provided, together with detailed remediation advice. Furthermore, remediation support was provided to internal teams and external suppliers.
UK University
Guest Lecturer
Guest lecturer for risk, resilience, and crisis management undergraduate and postgraduate courses. Solely responsible for the design, development and management of the crisis management simulation exercises.
Finance / Banking
MDR / Threat Hunting
Following an external audit, the investment subsidiary of an APAC bank required a Managed Detection and Response service to be onboarded within challenging timescales. A review of the core infrastructure established the quantity of collectors, agents and bastion hosts necessary for the intial reporting (audit) phase to function correctly. Encrypted feeds were then configured into an xDR detection platform providing full visibility of user, endpoint, cloud, and network activity.
A Managed Service Provider required a white label SOC service to be integrated into their existing management platform. This process was complicated by the fact the client was part-way through migrating from Kaseya to N-Able and was struggling with resource management. A gap analysis of the migration identified incorrectly defined success criteria, culminating in multiple workstreams, each contributing to unnecessary technical debt. A DevSecOps adoption framework was implemented to formalise activities whilst ensuring the transformation continued at pace.
Security Consultancy
IAM / PAM
A client had initiated an Identity and Access Management / Privilege Access Management program of work across on-premise and Microsoft Azure cloud environments. Work undertaken by internal teams provided minimal gains and the client subsequently sought external assistance with defining a program of works. The initial tranche of consultancy focused upon core technical systems, HR, Finance and the JML process. Once all the processes and entities had been mapped, a 24-month plan was developed to implement the appropriate controls across 72 critical services; this also included significant configuration changes to Active Directory and DNS.
Technical Consultancy
Insider Threat
A client reported puzzling activity on their network; meetings were being cancelled, data was missing and core services were randomnly rebooting. Whilst an initial investigation by the internal technical department failed to identified the cause, there was general consensus that all the issues were caused by a 'random' malicious actor. Further investigation of logs, staff interviews and forensic analysis of AD accounts identified an ex-employee as a possible suspect. Police checks of ISP logs confirmed the identification of the malicious actor was a disgruntled employee who had left the company over eight months ago. A detailed report was compiled for the courts together with expert witness testimony, culminating in a successful prosecution.
Energy Supplier
ISO-27001:2013
An energy supplier required ISO 27001 compliance for all their UK based datacentres. Whilst the physical controls were robust, the company's policies and procedures failed to reflect actual operations and were generic in nature. A six-month program of work identified and remediated the gaps, culminating in a successful audit.
UK Government (DfT)
£300m Tender
The Department for Transport required the creation of a tender document pack for the outsourcing of a 10-year service contract. Working with external authoritative stakeholders, operational cyber security requirements for the fixed/rotary-wing emergency services were defined, culminating with a £300 million award.
Media Company
Attack Surface Management
Following the broadcast of a controversial news story, a renowned global media company was subjected to a significant Distributed Denial of Service Attack (DDoS) that was subsequently determined to have contributed to 12% of European traffic over a 17 hour period. Once the scale of the problem was established, technical measures were implemented to successfully counter the threat. Furthermore, an exercise was undertaken to re-evaluate potential threats and the associated attack surface to identify and mitigate additional risks.
HM Coastguard
EUD Policy Advisor
HM Coastguard sought to adopt the ISO27001 framework and seek accreditation; however, following 18 months of work, the project stalled with only two policies being published. A review was subsequently undertaken, success criteria defined and policies, risk assessments, training, and an ISMS were implemented.
Global Distributor Acquisition
Interim CISO
A Fortune 500 global trading and business investment corporation acquired an international produce company and required tactical security plans to augment existing policies whilst long-term strategic options were considered. Activities of Information Security Officers was coordinated to define and establish a unified approach to address security issues and mitigate information risks. Furthermore, an effective information resource management programme was established and maintained, including the development of a strategic information security plan.
Developer
Building Management System
A national company was seeking to leverage their building portfolio by improving Management Information (MI) reporting regarding capacity, running costs, and green levy metrics. An audit of the existing systems identified where existing security for BMS (IoT) devices required enhanced protective controls. A program of works was developed to implement a 'test' system (encompassing five office buildings) which provided a repeatable process for the remaining 187 commercial buildings within the portfolio.
Global Bank Division
Transformation Program
Responsible for driving the implementation of the organisations strategies the group's business strategies and goals relating to Cyber Security. Also defined roles and responsibilities within the Cyber Security sphere and acted as a dedicated subject matter expert and business partner, providing advice and guidance on all aspects of Cyber Security.