Skip to main content

Help us improve the Digital Marketplace - send your feedback

2T Security Ltd

Cyber Risk Reviews

We deliver Cyber Risk Reviews (CRRs) to clients, based around the NCSC’s Cyber Assessment Framework (CAF), especially for Critical National Infrastructure (CNI). Our team of consultants are experienced in IT and OT and will run security architecture and risk analysis workshops that explore the cyber-related risks of key technical platforms.

Features

  • Services led by UK Cyber Security Council Chartered Security Professional
  • Significant experience in Information and Operational Technology (IT and OT)
  • Security architecture and risk analysis workshops to define cyber-related risks
  • Liaise with people across the business, and manage workshop scheduling
  • CRRs are based around the NCSC’s Cyber Assessment Framework (CAF)
  • Ability to map CAF outcomes to existing systems and processes

Benefits

  • Entire CRR engagement process managed by a Project Manager
  • Formal documentation of CRR findings, helping customers justify cyber improvements.
  • Rapid understanding of technical architecture for IT and OT systems
  • Business-focused recommendations can be linked to cyber improvement activities
  • Clear set of recommendations for identified risks and issues
  • Strong report-writing skills to deliver high-value CRR outputs

Pricing

£5,000 an instance

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tony.badsey-ellis@2t-security.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 2 9 7 4 1 7 5 6 1 5 4 9 8 8

Contact

2T Security Ltd Antony Badsey-Ellis
Telephone: 07711 037701
Email: tony.badsey-ellis@2t-security.com

Planning

Planning service
No

Training

Training service provided
Yes
How the training service works
Our philosophy is to provide only the amount of help and support that is required; we are happy to teach our clients how to build and run their solutions to enable in-house management, and should you require support in the technical security space, then we can help. We can support projects of all sizes, across a wide variety of security disciplines.
Training is tied to specific services
No

Setup and migration

Setup or migration service available
No

Quality assurance and performance testing

Quality assurance and performance testing service
No

Security testing

Security services
Yes
Security services type
  • Security risk management
  • Cyber security consultancy
  • Security audit services

Ongoing support

Ongoing support service
No

Service scope

Service constraints
None - CRR workshops are often more effective face-to-face, but that is a delivery preference rather than a necessity or a constraint.

User support

Email or online ticketing support
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Support levels
The CRR service is typically a managed fixed-price service, but phone and email support is offered at each stage of the delivery.
Findings will be fully documented and communicated via email.
A dedicated CRR Account Manager will be made available throughout the assessment process.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

At 2T Security we are fully committed to continuously improving our environmental performance, examples of which include:
1. We assist the development of Science, Technology Engineering, and Maths (STEM) at a grassroots level and are proud to sponsor Harrington Sixth Form School who take part in the GreenPower racing series. This supports our wider sustainability aims to use renewable energy sources.
2. Where practical, travelling via the least impactful method for a given journey e.g., rail versus flying, public transport versus car.
3. Using ecologically friendly solutions to meet our business needs.
4. Managing waste generated from our business operations according to the principles of reduction, re-use, and recycling.
5. Purchasing office consumables that are from a sustainable source, reducing the reliance on single-use items, and by recycling all paper products, ink, or toner cartridges.
6. Becoming a net producer of sustainable energy, and supplement by only purchasing energy from “green” providers.
7. Leased or owned company cars must have zero emissions.
8. Working with suppliers who share our environmental aims.
9. Measuring and making public our energy consumption, generation, and environmental impact, reviewing results, and looking at how we can improve.
10. Complying, as a minimum, with all relevant environmental legislation as well as other environmental requirements.
11. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Covid-19 recovery

2T Security has worked closely with Test & Trace (now UKHSA) programme over the last 3 years, and we continue to take Covid-19 very seriously. We remain committed to the wider Covid-19 recovery and some examples of this include:
1. SMEs were significantly impacted by Covid-19, and this is why we support local businesses and Small to Medium Enterprise (SMEs), where possible, preferring them to larger or global suppliers.
2. Align to the Prompt Payment Code, which ensures that SMEs are paid within 30 days of receipt of an invoice.
3. Taking an approach that doesn't view supply chain partners just as vendors but as collaborators working towards the successful end delivery to customers, behaving responsibly and delivering with mutual respect.
4. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Tackling economic inequality

At 2T Security we are fully committed to tacking economic inequality, examples of which include:
1. Implementing strategies to benefit the lives and wellbeing of those affected by our activities within the localities and communities. We have demonstrated this by assisting the development of Science, Technology Engineering, and Maths (STEM) at a grass roots level. As such, we are proud to sponsor Harrington Sixth Form School who take part in the GreenPower racing series. GreenPower Education trust is a charity organisation seeking to kick start careers in engineering. This also supports our wider sustainability aims to use renewable energy sources.
2. We ensure we offer fair rates of pay, above the national average and minimum requirements.
3. Offering summer placements to university students, helping to inspire future generations.
4. Promote workforce diversity by targeting harder-to-reach and under-represented groups and communities.
5. Provide accessible, entry-level employment and training opportunities for local people and develop future talent.
6. Promote Fairness, Inclusion, and Respect (FIR) principles.
7. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Equal opportunity

At 2T Security we are fully committed to continuously improving equal opportunities, examples of which include:
1. Providing opportunities for those disadvantaged, for example employing a Ukrainian refugee to assist us with our ISO27001 certification.
2. Deliver with transparency, supporting knowledge sharing, improving visibility and efficiency.
3. Value everyone’s voice, regardless of role or where they reside in the supply chain.
4. Respect and welcome diversity, relishing difference, ensuring everyone is treated equally, underpinned by our equal opportunities and diversity policy.
5. Collaborate with people who uphold the same social values, ethical business practices and environmental ambitions.
6. An active participant in the CyberFirst scheme since 2019, providing experience to summer students and year-in-industry students, and recruiting graduates to support their professional cyber security journey.
7. Proudly providing sponsorship of the CyberFirst Girls Competition 2024, supporting, and encouraging woman in Cyber careers.
8. Our resources have experience with job coaching in the community, helping those less fortunate get back into work, something we hope to continue to build on.
9. Providing training and qualification opportunities to our people, supporting future development and progression.
10. Working with charities and making charitable donations, for example our recent support of Osprey Leadership foundation, who work to inspire and enable young conservation leaders.
11. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Wellbeing

At 2T Security we take health and wellbeing very seriously, examples of which include:
1. Taking an integrative approach that doesn't view supply chain partners just as vendors but as collaborators working towards the successful end delivery to customers, behaving responsibly and delivering with mutual respect.
2. Strive to be entrepreneurial in spirit and help new organisations, as well as our people, flourish.
3. We support a healthy work life balance, supporting our employees with families and their wellbeing, focusing on delivery outcomes above the hours spent at a desk.
4. Look to reduce ill health and improve wellbeing, underpinned by our health and wellbeing policy.
5. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Pricing

Price
£5,000 an instance
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tony.badsey-ellis@2t-security.com. Tell them what format you need. It will help if you say what assistive technology you use.