News

What is so wrong with accreditation? 
chloe sawyers chloe sawyers

What is so wrong with accreditation? 

As a senior Programme Manager, you've been used to asking specialists to advise you on whether the capability is secure and achieve milestones like accreditation. What is wrong with that?

Read More
Business Objectives – why you should care! 
chloe sawyers chloe sawyers

Business Objectives – why you should care! 

Security Managers often try to apply as many controls as they can. This is to ensure that the capability is secure as possible, regardless of the success or failure of the capability achieving its objectives.

Read More
Resourcing Secure By Design
George Bathurst George Bathurst

Resourcing Secure By Design

We can’t do Secure by Design; we don’t have the resources.

This is something we often hear. There is some truth to this statement. But what is the right resource? Surely, you need someone who is very technical, understands technology, networks and can fix complicated security issues – right?

Read More
MOD gets red rating for cyber security
George Bathurst George Bathurst

MOD gets red rating for cyber security

The Ministry of Defence (MOD) has the most vulnerable IT security in Whitehall, it can be revealed, with 11 "redrated" systems exposed to "critical" levels of risk.

Watch George Bathurst explain how Secure By Design is the pathway to securing this threat.

Read More
Accountability
George Bathurst George Bathurst

Accountability

In today's interconnected world, where digital landscapes continuously evolve, the importance of cybersecurity cannot be overstated. It’s not just about firewalls and encryption; it's about fostering a culture of accountability — a cornerstone in safeguarding sensitive information and maintaining trust.

Read More
Shift Right or Shift Left?
George Bathurst George Bathurst

Shift Right or Shift Left?

‘There’s no need to start security yet, we’re not ready for that. When we are, we’ll just call the security team. We’ll shift everything to the right a bit.’

Imagine the security team in this project. Asked to tackle complicated technical issues, supplier risks, demanding stakeholders and often some confusion.

Read More
Stop doing so much cyber security
George Bathurst George Bathurst

Stop doing so much cyber security

We’ve all heard about the increasing importance of cyber security but do you really need it?

A big mistake I’ve seen many projects make is spending too much on cyber security. This means less money for the capability they’re developing. The weapon system doesn’t get the range its users wanted. The ship misses having the weapon system altogether. There are fewer ships in total.

Read More
Free training in Secure By Design
George Bathurst George Bathurst

Free training in Secure By Design

Heard about Secure By Design but unsure how to implement it in your project?

Checkout our free online training events.

Choose a time that suits you.

Read More
Secure By Design - Quick Reference Guide
George Bathurst George Bathurst

Secure By Design - Quick Reference Guide

Want to learn about Secure By Design but short of time?

Download our Quick Reference Guide.

Quickly answer questions like whether you need additional security resource or who signs off security approval

Read More
Do you really need more security people?
George Bathurst George Bathurst

Do you really need more security people?

Secure by Design is a key component of how cyber security will be improved within the MOD.

The culture and approach to how cyber security is addressed in capability programmes across MOD is changing. Cyber security is often bolted on at the end of a programme lifecycle after an accreditation process and this does not provide MOD with the best chance of delivering secure capabilities into our operational user’s hands.

Read More
Empowering your stakeholders through the Cyber Design Accelerator
George Bathurst George Bathurst

Empowering your stakeholders through the Cyber Design Accelerator

Secure by Design demands that thorough preparation for risk management is conducted. Here, cyber security consultants are often asked to identify and list stakeholders. But why should we do this if it isn’t useful? How can a list of people contribute to good risk management? Having a list of interested parties is a great start but through secure by design we want to take this to a more practical level.

Read More