Consulting & Advisory Service

Cyber Security


Engineering trust through security

Engineering trust through security


Welcome to the world's 3rd biggest economy

A shift in attitude is required to survive the new-age of cyber-crime attacks


As cyber-crime has exploded in size, becoming the third largest economy on the planet, there is a renewed focus on the efficacy of cyber security.


Every organisation in the world, no matter how big or small, is at significant risk from cyber attackers.


Given the scale and variety of attack, complexity is often a liability. Simple, well-understood, and elegantly implemented security measures are more effective and less prone to error than overly complex systems.

“Cybercrime is the number one problem for mankind, and Cyberattacks are a bigger threat to humanity than nuclear weapons”

Warren Buffet

$9.5 trillion


Cybercrime costs projected to reach $9.5 trillion annually by 2024​

$24 billion


Ransomware damage costs predicted to hit $24 billion in 2024​

4.5 billion


records were exposed in the top 10 data breaches alone in 2022​

$4.35 million 


Average cost of a data breach stands at $4.35 million in 2022

Get the basics right first

The six critical security domains that matter


"An ounce of prevention is worth a pound of cure."

 Benjamin Franklin

The majority of data from cyber incidents indicates a consistent under-engineering in six critical security domains. These domains must be at the forefront during the assessment, design, implementation, and operation of all cyber security services. This integration should be deeply embedded in your people and IT processes, forming a 'trust by design' approach that consistently reinforces and enhances your cyber security posture.

2-Factor Authentication

No longer the domain of just web facing resources, extending the implementation of 2FA across all systems and for all access requests delivers significant improvement in systems.

End Points

The explosive growth of sophisticated, interconnected IP endpoints amplifies the pressing need for enhanced protective measures in this domain.

Privileged Access Management

Restricting privilege sprawl ensures that access to critical systems and data is restricted to authorised personnel, mitigating the risk of breaches and unauthorised activities.

Application Layer

The surge in cloud migration and complex API integrations underscores the urgent need for enhanced application layer protection.

Monitoring

The overwhelming volume of output from modern security monitoring has surpassed human manageability, creating an urgent need for a streamlined, IT-integrated approach that balances automation with human oversight.

Offline Back-up

In the face of the escalating threat of cybercrime, offline backup is an essential but often underutilised strategy, providing a crucial safety net for data recovery and restoration.

Speak to one of our experts


How we help our clients

Our team of experts has decades of experience providing Cyber Security assistance to both private and public companies

Board-Level Security Advisory

Bridging the gap between the technical intricacies of cyber security and the strategic decision-making processes at the highest organisational level.

Securing Digital Innovation & Architecture

Construct a secure foundation for digital projects from the ground up, integrating security best practices into their design, development, and deployment.

Secure Data Centre & Cloud Strategy

We believe cloud security must also navigate a legacy to cloud pathway to secure your most critical digital assets wherever they sit, and however they move.

Information Resilience & Protection

Critical information supply chain, a focus on core assets, and associated recovery models, can be the difference between inconvenience or failure.

Managed Security Services (MSS)

Monitoring requires precise end-to-end systems and processes. We focus on refining data inputs and establishing sophisticated correlation techniques.

Secure Strategy Consulting & Go-to-Market Plan

Merging cyber security expertise with business guidance to drive consolidation, optimisation, and service improvement with a cost/risk balance.

Organisation, People & Security Awareness

Our team of experts has decades of experience providing Cyber Security assistance to both private and public companies.

Secure Project & Programme Management

A security-first approach ensures that risk management, compliance, and cyber security best practices are integrated into project management throughout.

Security Audit Maturity Assessment

Identifies gaps and areas for improvement by providing a maturity score or level that reflects how resilient your security practices are.

Our Process


Building and maintaining your dam

1| Upstream Planning


Establishing robust firewalls, encryption methods, access controls, and incident response plans

2| Build & Maintain


Cyber security systems need continuous monitoring, updating, and refining to adapt to new threats

3| Protect Downstream


Good upstream planning protects not just your immediate assets but also your customers, partners & ecosystem

4| Emergency Plans


Proactive measures and an incident response team is akin to opening the floodgates and spillways

Secure By Design

Creating resilient defences is like building and maintaining a dam

If you don't build it securely from the ground up it will fail. If you don't maintain your wall, cracks will appear and eventually it will leak. If you don't monitor your wall vigilantly, you will fail to notice where it has become vulnerable.

This is why we combine a 'secure by design' approach with a process cycle that continually improves your security infrastructure.


Our Cyber Security practice is led by Tom Burton

Partner - Cyber Security

Tom Burton is a cyber professional with over 20 years of experience in business, IT, and security leadership roles. His expertise lies in simplifying complex security problems and enhancing cyber security and efficiency across various industries such as Defence, Aerospace, and Pharmaceuticals. His approach is based on applying engineering principles to deliver sustainable business change.


Tom's career highlights include serving as a Commissioned Officer in the British Army, where he was promoted to CIO. He later joined Detica (now BAE Systems Applied Intelligence) as the Strategic Advisor to the Ministry of Defence CIO, overseeing a multi-billion set of IT-enabled benefits-driven change programmes. He also held the position of Global Head of Managed Security Services, growing the business from sub-£1m to £15m+ orders.


In 2014, Tom moved to KPMG UK as Director for Cyber Security, responsible for selling and delivering business across various sectors. He co-founded Cyhesion in 2017, developing a SaaS platform to disrupt the Third-Party Risk Management market. Most recently, he founded Digility in 2022 to deliver security and digital transformation consultancy and interim management, serving as Interim CISO at a Tier 1 Outsourced Service Provider.

Our team can be your team


Our team of experts have multiple decades  of experience across many different business environments and across various geographies.


We can build you a specialised team with the skillset and expertise required to meet the demands of your industry.


Our combination of expertise and an intelligent methodology is what realises tangible financial benefits for clients.

SPEAK TO THE TEAM

Our Cyber Security Experts

Cyber Case Study

Major UK Academic Institution


A major UK academic institution sought out Cambridge MC to identify their cyber vulnerabilities, assess the overall maturity of its cyber security practices, and recommend strategic improvements. This meant not only highlighting technical deficiencies, but also providing a holistic evaluation of the institution’s security posture, considering the practical realities of defending against threats. This included an assessment of the institution’s risk readiness, infrastructure resilience and staff preparedness.

READ CASE STUDY

"Security will be improved to cope with the continuously evolving threat landscape and the enable Modern Network users to safely perform their activities from any location in the world, with a consistent, hassle-free experience."



—Modern Network design for the University of Bristol


Cyber Security insights


Neon sharks made out of code.
by Simon Crimp 9 March 2026
Cyber Security | Ransomware in 2026 is a board-level resilience issue. Learn the key risks, weak spots and practical questions boards should ask to improve readiness, recovery and response.
Abstract neon hexagons
by Tom Burton 17 September 2025
Delaying cybersecurity puts startups at risk. Discover how early safeguards boost investor confidence, customer trust, and long-term business resilience | READ FULL ARTICLE
Aerial shot of city with a triangle shaped roof terrace in the centre
by John Madelin 17 June 2024
What are NIS2 & DORA? Standing for the Network and Information Security Directive, the NIS Directive is an EU Regulation which details a blanket level of cyber security measures required of all Member States and organisations within them, as well as those with or seeking to establish a footprint in Europe. In 2022, the Official Journal of the European Union published their updates to this Directive in NIS2 , which made their regulations more stringent while broadening the scope of who it applies to. One of these amendments differentiated between entities deemed ‘important’ and ‘essential’, whereby the latter, which includes Banking and Finance, will be subject to closer scrutiny and greater penalties regarding their compliance with NIS2 – or lack thereof . This level of regulated scrutiny will also be heightened by a further EU directive, the Digital Operations Resilience Act ( DORA ). Similar to NIS2, DORA is described as establishing a ‘ comprehensive framework for harmonising digital resilience processes and standards ’. However, where NIS2 applies to all business entities within the EU, DORA is specifically designed to ‘strengthen the resilience of digital operations in the financial sector ’. Thus, though accounting for similar processes and practices, as we shall outline, the emergence of both NIS2 and DORA represent at least two sets of cyber criteria which financial entities must comply with, not only to avoid legal penalty, but to remain robust in an increasingly dangerous digital environment. NIS2 and DORA are scheduled to become national law on the 17 th October 2024 and 17 th January 2025 respectively, and it is important to understand both in order to ensure that your business is compliant with their requirements. NIS2 Requirements Chapter 4 of NIS2 requires that all Member States of the EU ensure that all of their essential and important entities ‘take appropriate and proportionate technical, operational, and organisational measures to manage the risks posed to the security of network and information systems’ . By ‘appropriate and proportionate’, NIS2 directs all such entities to adopt an ‘all-hazards approach’, by which they refer to a baseline set of requirements including: a. Internal Security Policies: Develop and enforce good essential policies that ensure robust internal security practices. b. Incident Handling: Establish tested protocols to effectively respond to and manage security incidents. c. Backup Management & Disaster Recovery: Ensure reliable backup solutions and disaster recovery plans to safeguard data integrity, also ensuring continuity. d. Supply Chain Security: Maintain mutual responsibilities with partners through clear connections and dependencies to avoid the cascade effect of major incidents. e. Information Security Maintenance: Ensure the security of your network, including vulnerability handling and disclosure. f. Ongoing Assessment: Continuously update and monitor information security measures to protect against the ever-changing street smarts of evolving threat actors. g. Cyber Security Hygiene & Training: Regularly assess and adapt security measures to current threat landscapes, which are often basic and repeated. h. Cryptography & Encryption: Provide continuous cyber security training promoting best practices among employees, and ensuring Quantum-ready cryptography, a subject of other evolving regulations. i. Human Resources Security: Implement thorough background checks and enforce security protocols for all personnel. j. Multi-Factor Authentication: Enhance access control through the use of multi-factor authentication, which is always a feature of successful cyber incidents. DORA Requirements DORA is considered a Lex Specialis for financial sector entities, meaning that, where it possesses overlapping or shared regulations and principles with NIS2, DORA takes precedence. Thus, though it is still important to remain aware and informed regarding NIS2 and its requirements, it is more important to be equipped with an acute understanding of DORA. DORA requires that all financial entities be equipped with an ‘ internal governance and control framework ’ designed to strengthen their cyber defences, particularly in regards to the transfer of data, risk of corruption, confidentiality and loss of data, and protection from human error. In order to ensure this, DORA insists upon the implementation of the following processes: a. An information security policy with clearly defined rules to protect the availability, authenticity, integrity, and confidentiality of data. b. A sound infrastructure management structure which makes use of appropriate techniques and mechanisms, such as those which isolate affected assets in the event of a cyber attack. c. Policies which limit the physical access to information assets and ICT assets to what is legitimate and approved. d. Protocols for strong authentication mechanisms based on relevant standards and systems, including the use of encryption. e. Controls for ICT change management in order to ensure that any changes are recorded, tested, assessed, approved, and verified. f. Appropriate policies for patches and updates . Implications for the Finance Sector Both NIS2 and DORA may appear to establish relatively basic levels of cyber security awareness and defence, however it is important that they are properly implemented and strengthened within your operations. This is partly due to the financial and reputational losses that can and will impact your organisation in the event of a cyber security breach. In considering financial entities to be essential, NIS2 makes them liable to a fine of up to €10m or 2% of their annual turnover, whichever is higher. Similarly, DORA penalises any instance of non-compliance with a daily fine of up to 1% of the average daily worldwide turnover of the financial entity until compliance is reimposed. Furthermore, the reporting obligations of both Acts pose significant and specific considerations to financial entities, based on how and when an organisation should bring awareness to a potential or recent cyber security breach. DORA’s Article 10: Detection imposes that financial entities shall ‘have in place mechanisms to promptly detect anomalous activities’, and expands the reporting process in Article 17: ICT-related incident management process to ensure that ‘major’ cyber security incidents are reported to the appropriate management bodies in order to enact mitigation and prevention procedures. Similarly, NIS2’s Article 23: Reporting Obligations requires that all essential and important entities promptly identify and report any ‘significant’ cyber security breach or incident to their representative computer security incident response teams (CSIRTs). There are two main indicators which make an incident ‘significant’ under NIS2: one is that it has affected or caused damage to other entities or persons; the second is that ‘it has caused or is capable of causing severe […] financial loss for the entity concerned’. This is particularly emphatic for organisations which by nature and definition handle and advertise the possession of large amounts of money, a consideration which DORA highlights as an Act specific to the financial sector. In their classifications of ICT-related incidents which financial entities should use to determine their impact, DORA specifies ‘the criticality of services affects, including the financial entity’s transactions’ as well as ‘the economic impact, in particular direct and indirect costs and losses’. Thus, it is crucial for financial organisations to ensure that their operations are properly barricaded against cyber threats, and that they have airtight contingencies and reporting protocols in place in case they are breached. Finally, it is important to internalise clear accountability within your organisation. NIS2 makes it clear that the responsibility for the approval, delivery, and maintenance of an essential entity’s cyber security risk-management measure rests with the management bodies of the entity. This includes coordinating cyber security training and the provision of ‘sufficient knowledge and skills to enable them to identify risks and assess cybersecurity risk-management practices’. DORA is even clearer in this regard, specifying that the management body of the financial entity shall ‘bear the ultimate responsibility for managing the financial entity’s ICT risk’. Thus, the stakes are higher for executives and C-suite professionals to ensure compliance, as they will be the ones held accountable for breaches and attacks. How Cambridge MC can Help Whether your company is based primarily inside or outside the EU, it is crucial that your organisation complies with NIS2 and DORA by the end of the year if you have any entities or subsidiaries, or currently/plan to conduct work in any EU Member States. In any case, NIS2 and DORA represent aspirational sets of guidelines pertaining to the cyber hygiene of your organisation that would only strengthen it to internalise.  This is particularly salient in a regulatory culture which is increasingly prioritising and scrutinising cyber security. As of April this year, the UK Government implemented minimum security standards to protect consumers and businesses from cyber attacks. These include the banning of easily guessable default passwords; regulations which, like NIS2 and DORA, are seemingly basic yet possess higher stakes for non-compliance. At Cambridge Management Consulting, we have a team of experienced Cyber Security professionals with decades of combined practical experience in the field, as well as detailed and up-to-date knowledge on all relevant regulations and principles. To avoid your organisation from being left behind or penalised for a lack of cyber maturity, contact our cyber team to understand your pain points and vulnerabilities—we will work with you to construct, assess, and deliver a comprehensive strategy to resolve them. Contact John Madelin , our Managing Partner for Cyber Security, or learn more about our Cyber Security capability here .
Digital screen with lines and numbers representing a network
by John Madelin 28 February 2024
Introduction The National Counterintelligence & Security Center (NCSC) suggests that universities are particularly vulnerable to cyber crime because they are key contributors to the economy, skills development, and innovation. Cambridge MC was approached to conduct a comprehensive cyber capability maturity assessment for a major UK academic institution, leveraging a team of experts with technical understanding and frontline experience in cyber defence. This team carried out a thorough evaluation through a series of tests, interviews, and artefact examinations. Unlike conventional assessments, our strategy focused on actionable insights which were tailored to the unique operational context of the institution. The assessment was structured around recognised capability categories, informed by the team’s extensive experience defending against cyber attacks. The methodology was particularly effective for its sensitivity to the institution’s risk appetite—balancing cost, risk, and investment to propose solutions that were unique to their situation. Project Overview The primary challenge was the institution’s realisation that its existing cyber hygiene practices and IT discipline might not be sufficiently robust to withstand increasingly advanced tactics employed by cybercriminals and their growing interest in the education sector. The institution sought out Cambridge MC to identify these vulnerabilities, assess the overall maturity of its cybersecurity practices, and recommend strategic improvements. This meant not only highlighting technical deficiencies, but also providing a holistic evaluation of the institution’s security posture, considering the practical realities of defending against threats. This included an assessment of the institution’s risk readiness, infrastructure resilience and staff preparedness. Cambridge MC’s goal was to ensure that the recommendations produced as a result of this assessment were not only technically sound but contextually appropriate and aligned with the institution’s strategic objectives and resources constraints. This personalised approach was crucial in designing a cyber security strategy that was both achievable and sustainable. Strategy What we did Our approach involved a thorough assessment of the institution’s cyber infrastructure, including tests, interviews, and the examination of artefacts to gain a holistic understanding of their cyber maturity. To do this, we engaged experts with significant technical depth and extensive experience in cyber defence and leadership roles; a blend which was crucial in conducting a maturity assessment that focused on pragmatic gap closures. Why we did it this way Our methodology was designed to move beyond mere technical details and address the practical aspects of cyber security. By organising our work into recognised capability categories, we targeted areas that, if weak, would likely lead to vulnerability and a high risk of attack. This approach allowed us to pinpoint critical gaps in the institution’s cyber security practices and propose target improvements. Concepts and methodologies applied We applied a risk-based approach, sensitive to the institution’s risk appetite, to make practical trade-offs between cost, risk, and investment. This ensured that our recommendations were contextually appropriate and aligned with the institution’s strategic objectives. Our assessment framework was grounded in industry-best practices and standards, tailored to the unique needs and challenges of the academic sector. Obstacles encountered and overcoming them One of the main obstacles we encountered was resistance to change, a common challenge for institutions with established routines and cultures. To overcome this, we emphasised the importance of cyber hygiene and IT discipline through clear, evidence-based findings and recommendations. We conducted workshops and discussions to engage stakeholders at all levels, highlighting the tangible benefits of enhancing their cyber security posture and demonstrating how our recommendations could be implemented in a manageable manner. The Team The Cambridge MC cyber security team tasked with supporting on this project was comprised of: A technically adept practitioner specialising in vulnerability testing, equipped with cutting-edge knowledge of tools and techniques for identifying weaknesses in the institution’s cyber defences. This role was crucial for uncovering hidden vulnerabilities that could be exploited by attackers, providing a technical foundation for the assessment. Back-office risk experts with a deep understanding of the broader risk landscape and risk management principles, ensuring that the assessment considered not just technical vulnerabilities but also organisational and procedural risks, aligning the cyber security strategy with the institution’s overall risk appetite. A security leader with 30 years of experience building and running security services, who offered strategic oversight and practical insight into effective cyber defence mechanisms and was vital in ensuring the recommendations were not only theoretically sound but also pragmatically achievable. Together, these professionals ensured a comprehensive, nuanced, and highly practical assessment, underlining the importance of a balanced team in addressing complex cyber security challenges. Outcome & Results Optimised Cyber Resilience We recommended and outlined a robust workflow and identity management system across all of the institution’s systems, emphasising the need for multi-stakeholder cooperation. This highlighted the challenge of managing over tens of thousands of accounts for a community of many fewer staff and students. Longevity We made clear, actionable recommendations describing implementation plans for changes, such as improving the security culture and some operational deliverables associated with SOC efficacy, all of which were agreed upon by the leadership team who assured us that these changes would be in place at this institution for the next three years. Staff Readiness We enhanced the security awareness and training of the staff, postgraduate researchers, and students, including specialised training for the Information Security team. We also made recommendations for improving security posture, such as the adoption of Cloud Access Security Broker (CASB) and Data Leakage Prevention (DLP) solutions, and the development of a quantitative risk forecasting methodology. Forward Planning We also made suggestions for future improvements, including SOC operational activities, creating new initiatives targeting cyber kill chain strategy areas, and planning disaster recovery tests for ICT systems.
SEE MORE INSIGHTS

Get in touch with our Consultants today


We are a highly collaborative team of senior-level executive professionals able to adapt to any challenge, however niche & challenging.

+44 (0)1223 750335

info@cambridgemc.com

Contact Form - Cyber Security

Case Studies


Our team has had the privilege of partnering with a diverse array of clients, from burgeoning startups to FTSE 100 companies. Each case study reflects our commitment to delivering tailored solutions that drive real business results.

CASE STUDIES

A little bit about Cambridge MC


Cambridge Management Consulting is a specialist consultancy drawing on an extensive global network of over 200 senior executives in 22 countries.


Our purpose is to help our clients have a better impact on the world.

ABOUT CAMBRIDGE MC