Category Archives: Uncategorized

An introduction to Building Information Modelling (BIM) – Part 1 of 2

Building Information Modelling

 

 

 

 

 

 

 

 

If you run your own construction business or manage large building projects, you will know about the many professions and trades that need to come together to contribute to a modern building or refurbishment. But does information risk and cyber security come into your thinking? If not, it should.

Such projects require detailed information to be transferred between partners such as designers and architects at the planning stage, followed by the construction teams.  A variety of software tools are available to support this process such as 3D modelling packages, CAD software and project management tools.

All of this generates large volumes of data that must be accurate and which has to get to the right people on time. What’s more, it has to be safe from threats – and remain that way. Continue reading “An introduction to Building Information Modelling (BIM) – Part 1 of 2” »

avatar

Steve Maddison

Director and Principal Consultant

More Posts

Share

How to deliver digital transformation – without the security risk

 

Digital transformation is a major programme for many organisations. The motivation for it varies, but there are some common aspects, namely adopting new technologies to maintain an efficient and effective workforce and engaging with customers to improve the bottom line.

Likewise in the public sector, digital transformation programmes create opportunities for efficiency savings and economies of scale, with new and imaginative ways to deliver services to citizens. But the stakes are high. Get the security wrong and the programme could be the cause of a very public, and very expensive, loss of confidence. Continue reading “How to deliver digital transformation – without the security risk” »

avatar

Dave James

Information Risk Management expert and Managing Director of Ascentor

More Posts

Follow Me:
Twitter

Share

Supply Chain Cyber Security – defeating the weakest link (Part 2)

Cyber chain 2

 

 

 

 

 

 

 

 

In the first part of this blog we created a scenario of just how easy it is to cause a cyber security breach. ‘Brian’ was a contractor with access to the server room. In moments he’d been able to gain access and steal his client’s intellectual property – all without trace. There was a weak link in their supply chain cyber security which he’d found no trouble to exploit.

In Part 2 we introduce a 4 step supply chain cyber security process – and provide links to guidance on supply chain risks and methodologies for assessing an organisation’s security. We also discuss how far down the supply chain you need to manage. Continue reading “Supply Chain Cyber Security – defeating the weakest link (Part 2)” »

avatar

Steve Maddison

Director and Principal Consultant

More Posts

Share

Defence as a Platform will transform MOD procurement – but who will champion Information Assurance?

Screen Shot 2015-07-30 at 10.41.37The MOD Chief Digital and Information Officer (CDIO), Mike Stone chose the recent inaugural Defence CIO Symposium to introduce ‘Defence as a Platform’ (DaaP) – a complete transformation of the ICT procurement and provision process – and Ascentor’s Steve Penny was in the audience with 600 attendees from the MOD and industry. Continue reading “Defence as a Platform will transform MOD procurement – but who will champion Information Assurance?” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

Latest Insights

Recent Comments

    • Barry Harvey: It is perhaps surprising to hear that a generation we think of as being tech savvy is anything but....
    • David Conway: I can imagine that, even at this stage, many businesses will still be blissfully unaware of this...
    • Sonja Jefferson: Are you going to be offering that training for ‘normal, non-techie people that now have...
    • Dave James: @Colin Robbins: Yes, Its really illumintaing isnt’t it. Provides a bit of context to the recent...
    • Colin Robbins: Very interesting report. I find it staggering that 26% of companies had not briefed their boards on...
  •  
    Buy Cialis in UK