BRINGING THE POWER OF INFORMATION SECURITY TO PEOPLE


Data exploitation and theft is everywhere. It shouldn’t be, it doesn’t need to be. There is a better way.

C2 Cyber Ltd exists to solve complex cyber and information security challenges, and has extensive experience managing risk across all three sectors in local and central government, healthcare, financial services, retail and not for profit/charity enterprises. Our approaches and methodologies blend a pragmatic mix of technical and human control measures to reduce vulnerability, limit risk, realise resilience and enable businesses to operate efficiently.

Using international standards and industry specific regulations C2 Cyber helps its customers to assess, identify and treat threats to their operations and business. We engage at an executive level with our customers and maintain that culture, leadership, behaviour and education are key factors for success. Even in today’s world of pervasive communications and the Internet of Things, technology is developed to deliver value to people. It is also attacked and targeted by people, and frequently the most challenging vulnerabilities are the people who interact with it.

Our human centric approach to cyber security starts by understanding what the business is trying to achieve, what part people play in realising those objectives, and what risks threaten the vision and aspirations. This enables us to help our clients to define and implement the right processes, prepare the people and organisation, and choose the most appropriate technology so that security becomes an enabler and differentiator; not an obstacle.

C2 Cyber will work side by side with you as your security partner on the journey to see resilience realised, with outcome-focused services that generate value from strategy and governance, through to delivering capability into operations.

Our Services


A HUMAN-CENTRIC APPROACH TO CYBER SECURITY

 

Our services have been developed in response to shared problems that we have solved with our clients.

Consultancy

We apply experience, standards and expertise to deliver innovative outcomes to address the most pressing challenges that our clients are facing



Supply Chain Information Risk Management

Our COBRA managed service delivers continuous monitoring and reporting of information risk in our clients' supply chains, tracking suppliers' remediation actions.



Secure Cloud Infrastructure

The cloud promises many advantages but poor settings can create significant weaknesses. We manage our clients' Microsoft Office 365 accounts and apply our proven templates, configurations and processes to give them the confidence that they will be secure.



Secure Communications

Sometimes business needs greater assurance that the most important telephone calls wont be interecepted by malcious organisations. We offer communications capabilities that provide government levels of protection within your personal smart phone.



Data Protection as a Service

We act as outsourced Data Protection Officer (DPO), providing an understanding of the data you need, how to handle it and how to deal with breaches. Review, implementation and maintenance of policies, with documented roles and responsibilities. Data request response mechanisms and staff awareness and training.



Why C2 Cyber?

Consultancy


Our services range from risk definition and board advisory, through to the implementation of efficient controls and defences that don't interrupt the business. We focus on delivering the outcomes that the business needs, and to leave our clients confident that they can manage the capability they have acquired

 

• Risk assessment

• Data discovery

• Security strategy, roadmap and programme development

• People roles and responsibilities

• Awareness and training

• Designing and building security operations for detection and response

• Security sourcing strategy, RFP development and procurement support

• Compliance to ISO 27000 standards

 

With the implementation of the General Data Protection Regulations (GDPR) that sets guidelines for data protection across the EU, click here to see how we can help.

 

Read the white paper that describes our proven approach to delivering exceptional value in Security Operations.

 

Click here to contact us

 

Supply Chain Information Risk Management


You may have looked at your own organisation carefully, but it’s important to make sure there isn’t a weakness in your supply chain. Regulations such as the EU GDPR make you responsible for the security of your partners and suppliers, so its best to be sure. Our COBRA managed service will give you that confidence.

 

• Do you know who is in your end-to-end supply chain?

• What is the overall risk in your supply chain, and where is it concentrated?

• Do you know how suppliers use or send your data?

• Are you confident in the maturity of their own security?

• What actions should you be asking the weaker suppliers to take?

• How would you defend your position, if a supplier was breached?

 

Read the service sheet about our COBRA managed service that continuously monitors our client's supply chain risk, or click here to get in touch.

 

Click here to contact us

 

Why C2 Cyber?

Secure Cloud Infrastructure


Cloud services, such as Microsoft Office 365, present great opportunities to get core IT and collaboration capabilities with significantly reduced overheads. However,

 

• Maximise the capabilities and return on investment you get from the Office 365 subscription

• Easily deliver the beneficial business change and transformation from the new services and technologies

• Have confidence that your information is secure despite not being on your own premises

• Receive regular reviews and gain from the collective good practice that is developed

 

Click here to contact us

 

Secure Communications


Our service provides secure collaboration between trusted colleagues wanting to discuss sensitive information. This provides military grade protection that is as relevant to Family Offices as it is to regulated Financial Institutions and Government Departments.

 

• Have confidence that VIP personal details, corporate IP, financial data, and customer information will be protected from eavesdropping

• Easy access to a secure bridge facilities

• Messaging, Voice and Video conference facilities

• Messaging, Voice and Video one-to-one facilities

• Secure file sharing

• Government grade protection from consumer grade mobile phones

• Both content and call meta-data protected from intercept and hacking

 

Click here to contact us

 

Why C2 Cyber?

Data Protection as a Service


Do you want to focus on your business rather than on data protection policies and procedures? We can take the pain out of information security and assurance and help by acting as your outsourced Data Protection Officer.

 

• Data security breach policies and procedures

• Roles and responsibilities framework

• Legal use of data assessment – what do you really need?

• Policy transparency and communication

• Individual data request process and compliance monitoring

• Understanding your obligations if you are a supplier organisation

• Explaining any cross-border or international data transfers

• Awareness and training

 

Click here to contact us

 

Our Team


We bring together a wealth of experience from the military, defence and intelligence domains to field a team of leaders in the industry. Our combined experience over a broad range of public sector and commercial projects allows us to find innovative and cost effective solutions to your problems.

 

Avatar Team Member

Jonathan

CEO
Avatar Team Member

Tom

COO
Avatar Team Member

Henry

CTO
Avatar Team Member

Clive

Client Services Director
Why C2 Cyber?

Data Protection As a Service


Sign up here for the

 

Beta Release of Data Protection As A Service

 

This service can include the following:

 

• An easily accessible platform to understand your data protection maturity, manage Subject Access Requests and your own data inventory

• Site Assessment done by a real person (both web and physical)

• Security Maturity Assessment, both physical and IT

• Data Protection work flow management and world class knowledge base at your fingertips

• Policy Advisory, helping you build practice governance structures and ensuring you stay legal as a data controller.

 

  
  

 
  

 
  


  

 

 

Contact Us


Please fill out the form below and one of our team with contact you. Alternatively, call us 24hrs on +44 20 7965 7596.