Cyber Security

Your project, product, and business will benefit from a tailored cyber security (CS) approach to address the problems you are facing. We specialise in human factors (HF) informed CS, operational technology, and pen testing.

Our Offer to You

HF Informed Cyber Security

Our team of specialists in HF, CS, and UX, will tailor a human-centred approach to your CS needs and requirements. You will benefit from our expertise in cyber psychology, digital forensics, and information assurance

Operational Technology

Our experience in the application of cyber security standards and techniques in the operational environment will reduce your risk profile, demonstrate compliance with your requirements, and identify feasible mitigations

Pen Testing

A security exercise where systems vulnerabilities are found and exploited to identify weaknesses in defences before they are leveraged by malicious actors. As part the CS framework, pen testing can be used to reduce risk to your assets

Providing Security

Assessment of the physical infrastructure

  • Identification of physical infrastructure vulnerabilities.

  • Identification of known attack methods.

  • Effective mitigation against intrusion.

Information assurance integration

  • Understanding the company’s informational assets.

  • Provide methods on how to manage risks to critical assets.

  • Implement repeatable risk reduction frameworks.

Operational Technology Cyber Security  

  • Develop bespoke CS management plans tailored to the industry.

  • Methods to identify company assets requiring protection.

  • Application of CS requirements to demonstrate compliance.

Cyber Assurance Cube

Cyber Security Deliverables

  1. Pen testing - Identifying system vulnerabilities using both technical and social engineering techniques and methodologies.

  2. Stakeholder engagement – Explaining why CS resources are required: makes money, saves money, and reduces risk.

  3. Development & Application of CSMP - Training to empower companies to develop and apply a CS management plan.

  4. Operational Technology Security Standards Applying a systematic overview of standards tailored to your industry.

Methods & Mitigations

“Knowledgeable with IEC 62443 standards, CLC/TS 50701, and risk assessment methods.”

Get in Touch

We’d love to hear from you

Ben Smith

Cyber Security & Human Factors