Dave James

Managing Director

An advocate of pragmatic, benefits-based cyber risk management, Dave’s hands-on experience as an accreditor and information assurance practitioner helped shape Ascentor’s values and principles. A co-founder of Ascentor back in 2004, Dave leads and inspires the team.


Simon Jones

Business Development Manager

With over fifteen years’ experience in the information security sector, Simon is a well-known face in the corridors of our defence and security customers. His military roots mean he understands the critical role information risk management and cyber security play in keeping organisations safe. 



Company Accreditations

  • IS09001:2015
  • Cyber Essentials +
  • IASME Gold
  • Crown Commercial Service Supplier

Consultant Qualifications

  • NCSC (CESG) Certified Professionals CCP
  • Certified Information System Security Professional CISSP
  • CE/CE+/IASME Auditors
  • Certified Information Security Auditor CISA
  • Certified Information Security Manager CISM
  • ISO27001
  • ISO22301
  • Certified Ethical Hackers
  • Cisco and Microsoft Certified Engineers
  • PRINCE2 and APMP Practitioners



  • NDI (Board Advisor)
  • Team Defence Information
  • techUK


  • Armed Forces Communications and Electronics Association AFCEA
  • Defence Industry Security Association DISA
  • Institute of Information Security Professionals IISP
  • International Information System Security Certification Consortium ISC2


Direct frameworks:

  • G-Cloud 12
  • Serapis

Frameworks via partners:

  • Aurora (EDP)
  • CCSC
Our Success Stories
Cyber security at The Houses of Parliament
Assuring information in the Houses of Parliament

The Houses of Parliament engaged Ascentor to provide experienced guidance to implement a cloud information assurance process from scratch.

We quickly introduced a risk appetite statement for both Houses that reflected the concerns of the two SIROs and laid the groundwork for how information risks were to be treated.

The assurance process is now well-established. Risks are regularly reappraised and managed to ensure they stay consistent with the risk appetite statement and continually improve.

Independent assurance for SeeByte UK's approach to security

SeeByte UK engaged Ascentor to provide independent guidance to form a centralised approach to security that satisfied customer expectations in meeting multiple standards.

SeeByte UK and Ascentor worked together to develop a strategy to simplify and demonstrate its existing alignment with complex and varied cyber security and information assurance requirements.

Based on Ascentor’s advice and guidance, SeeByte UK was able to make informed decisions about the most pragmatic approach to take.

Regulatory oversight support for the Office for Nuclear Regulation (ONR)

The Office for Nuclear Regulation (ONR) engaged Ascentor to help develop a risk-based assessment methodology for CS&IA inspections of List N facilities.

The findings of our inspections built a risk-informed picture of the maturity of CS&IA arrangements across 26 List N facilities.

The client commented on Ascentor’s “proportionate, pragmatic and flexible approach” which has significantly accelerated ONR’s ability to improve CS&IA-focused regulatory oversight across List N facilities.

Cyber security review for nuclear client

This nuclear energy company engaged Ascentor as an independent Design Authority to strengthen cyber security assurance on design projects.

We engaged with a wide group within the business and conducted a cyber security assessment with improvement recommendations in just 20 days.

The client was impressed with our in-depth knowledge of the challenges of delivering cyber security into complex environments and the clarity of our delivery.

Specialist security advisors to MOD programme

This major MOD programme involved development of a complex bespoke system for use in a high threat environment.

Ascentor helped the prime contractor deliver a fully compliant system in accordance with the MOD policy and requirements in just under four months.

The system subsequently achieved full accreditation and Ascentor was asked to support the prime contractor on another project.

Specialist security advisors to MOD delivery team

This MOD delivery team needed security advice and guidance on an operationally important project demanding highly specialised capability.

Ascentor’s advice and guidance were commended by the accreditor and information asset owner (IAO).

The accreditor commented that the Security Assurance Coordinator (SAC) consultant from Ascentor was: “One of the best SACs I have worked with.”

Security consultancy for MOD project

The MOD needed security advice and guidance for this UOR to core project – used to procure equipment to support military needs in an emergency.

Ascentor assigned one of its qualified CESG Certified Professional Security and Information Risk Advisor consultants to support the project, achieving a successful transition in three months.

The accreditor endorsed the deliverables as well as Ascentor’s pragmatic and cost-effective approach.

Information risk management consultancy for Resilient plc

Resilient, a pioneering provider of smart voice services, engaged Ascentor to help guide their security improvement and certification journey.

They needed to reduce risk and also wanted customers to have confidence and trust in Resilient as a safe and secure service provider.

Ascentor’s support steered Resilient down a smooth certification path towards a strong security culture – while avoiding the common pitfalls that can waste time, effort and money.  


Ascentor helps organisations stay safe through information risk management – and equips suppliers to deliver projects and bid for contracts more successfully.

Whatever your level of information risk, our pragmatic and business focused approach will help you build the appropriate level of response to your cyber security challenges.

Discover our full range of services:

Our Resources
Cyber Security Vulnerability Assessments 10 September, 2021 In this guide we look at why you need to carry out vulnerability assessments, the threats they identify and why they are so important to your customers Download
Becoming a List X Company 27 March, 2020 Ascentor's 5 tips to get up and running as a List X Company Download
Ascentor’s guide to the Cyber Essentials Scheme 26 February, 2020 Our guide to protecting your business from cyber threats with the Cyber Essentials Scheme. Download
Practical Cyber Security Guide for Business 07 July, 2021 Further your understanding of the cyber security issues facing businesses and improve your cyber defences going forward. Download
Cyber Security Maturity Assessment 30 September, 2019 Download a sample Cyber Security Maturity Assessment report, based on the C2M2 model. Download
Cyber Security Maturity Assessment White Paper 30 September, 2019 Ascentor’s new white paper explores our approach to measuring and managing maturity assessments for cyber security. Download your free copy. Download
Designing & Delivering a Cyber Security Programme 15 June, 2021 This white paper builds on the experience Ascentor has had in designing and delivering a successful Cyber Security Programme for a UK Government body. Download
Convince your board - how to prepare your business for List X 15 September, 2018 Pragmatic steps to quickly get you up and running as a List X company Download
The board's guide to information risk 15 September, 2018 Learn more about information security and how you can protect your information. Download
Convince your board - cyber attack prevention is better than cure 15 September, 2018 Why an ounce of prevention could be worth a ton of cyber attack cure Download
Top tips for every government security lead 15 September, 2018 Guidance on the core aspects to be considered in the role of a Government Security Lead. Download
The HMG supplier's guide to IRM 15 September, 2018 The Information Risk Management Guide for Government Suppliers Download
The human face of information risk 15 September, 2018 The Ascentor guide to understanding the human face of information risk, and how to manage it. Download
Ten steps to GDPR – a compliance checklist 20 August, 2018 The essential checklist for every business that retains customer data. Download
Ascentor in the News

October 5, 2021

Ascentor selected as finalists in the inaugural Cyber Outstanding Security Performance Awards

Ascentor’s partnership with the ONR and Leonardo selected as finalists of the inaugural Cyber Outstanding Security Performance Awards.

August 4, 2021

Ascentor joins Amtivo Group

Ascentor have been acquired by Amtivo Group, providers of accredited certification, training and technology-enabled services.

April 13, 2021

Ascentor wins contract to keep UK BOXER military vehicles secure

Ascentor will support ARTEC to develop secure information technology components for the next generation of BOXER Mechanised Infantry Vehicles.
Contact us

Your cyber security challenges and our pragmatic approach – we could be the perfect fit. Contact Dave James, MD at Ascentor for an informal chat.