Cyber security basics

You want to comply with basic cyber security best practice to protect your business. You need to demonstrate compliance with standards or legislation to transact with your customers.

Cyber security excellence

You need to handle sensitive or classified information to conduct your business. You want to optimise your business potential by demonstrating cyber security excellence.

Mission critical resilience

You may be involved in national security, CNI or public safety – and be highly attractive to serious threat actors. You may need to protect valuable intellectual property.

Our Success Stories
Cyber security review for nuclear client

This nuclear energy company engaged Ascentor as an independent Design Authority to strengthen cyber security assurance on design projects.

We engaged with a wide group within the business and conducted a cyber security assessment with improvement recommendations in just 20 days.

The client was impressed with our in-depth knowledge of the challenges of delivering cyber security into complex environments and the clarity of our delivery.

Specialist security advisors to MOD programme

This major MOD programme involved development of a complex bespoke system for use in a high threat environment.

Ascentor helped the prime contractor deliver a fully compliant system in accordance with the MOD policy and requirements in just under four months.

The system subsequently achieved full accreditation and Ascentor was asked to support the prime contractor on another project.

Specialist security advisors to MOD delivery team

This MOD delivery team needed security advice and guidance on an operationally important project demanding highly specialised capability.

Ascentor’s advice and guidance were commended by the accreditor and information asset owner (IAO).

The accreditor commented that the Security Assurance Coordinator (SAC) consultant from Ascentor was: “One of the best SACs I have worked with.”

Security consultancy for MOD project

The MOD needed security advice and guidance for this UOR to core project – used to procure equipment to support military needs in an emergency.

Ascentor assigned one of its qualified CESG Certified Professional Security and Information Risk Advisor consultants to support the project, achieving a successful transition in three months.

The accreditor endorsed the deliverables as well as Ascentor’s pragmatic and cost-effective approach.

Information risk management consultancy for Resilient plc

Resilient, a pioneering provider of smart voice services, engaged Ascentor to help guide their security improvement and certification journey.

They needed to reduce risk and also wanted customers to have confidence and trust in Resilient as a safe and secure service provider.

Ascentor’s support steered Resilient down a smooth certification path towards a strong security culture – while avoiding the common pitfalls that can waste time, effort and money.  

Industry Expertise
Public Sector

Public sector organisations and departments hold high value and sensitive information assets. We have a background in government security and specialise in the provision of bespoke public sector advice.

Government Suppliers

Holding government information brings complex security challenges. Our experience with government supplier companies helps protect all types of information and sustains businesses for the future.


Protecting information from risk is a growing priority for any business. We help identify and reduce business information risk, put controls in place and achieve the relevant standards.

Contact us

Your cyber security challenges and our pragmatic approach - we could be the perfect fit. Contact the team at Ascentor for an informal chat.


Featured Article:
The NIST Cybersecurity Framework explained – inc. version 1.1

The NIST Cybersecurity Framework. We look at why you should use it, what it covers and give a brief summary of the main changes in the 1.1 update.

What’s the difference between cyber security and cyber resilience – and why does resilience matter?

What is shadow IT and how do you manage it?

Less rules, more goals. How recent changes in regulatory approaches can enable innovation in information security

Designing & Delivering a Cyber Security Programme 28 September, 2018 This white paper builds on the experience Ascentor has had in designing and delivering a successful Cyber Security Programme for a UK Government body.
The human face of information risk 15 September, 2018 The Ascentor guide to understanding the human face of information risk, and how to manage it.
The HMG supplier's guide to IRM 15 September, 2018 The Information Risk Management Guide for Government Suppliers
Contact us

Your cyber security challenges and our pragmatic approach - we could be the perfect fit. Contact the team at Ascentor for an informal chat.