Skip to main content

Help us improve the Digital Marketplace - send your feedback

WAVESTONE ADVISORS UK LIMITED

Cyber Security Transition & Optimisation

Our Cyber Security Transformation & Optimisation service ensures that Cyber Security change programmes are delivered effectively, robustly and efficiently. We support the selection and implementation of security tooling to provide a resilient platform. We drive behaviours in the organisation from user awareness programmes, Programme/Project Management and implementation of DevSecOps.

Features

  • Cyber Programme/Project Management (IAM, DLP, Cloud, Segmentation, Encryption, Endpoints/Mobiles)
  • Business Continuity and Disaster Recovery plan implementation (BCP, DRP)
  • Cyber data breach management simulation (operational/regulatory events, cyber-attack)
  • Penetration testing and vulnerability management
  • Incident Response (CERT, Digital Forensics, cyber investigation services)
  • Cyber Security awareness training and behavioural change
  • Security tooling optimisation review

Benefits

  • Deliver Cyber Security programmes to meet security objectives
  • Ensure business and IT continuity in resilient environments
  • Able to execute an effective cyber resilience and recovery plan
  • Reduce attack surface from adverse threat vectors
  • Effectively react,respond, contain, remediate and recover from a cyber attack
  • Raise awareness and improve Cyber Security knowledge and skills
  • Effective implementation of security policies

Pricing

£550 to £1,950 a person a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ukpublicsector@wavestone.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 8 7 5 5 9 4 8 8 5 4 4 5 3 4

Contact

WAVESTONE ADVISORS UK LIMITED Wavestone
Telephone: 020 3002 1760
Email: ukpublicsector@wavestone.com

Planning

Planning service
Yes
How the planning service works
Our Cyber Security Transformation and Optimisation service provides detailed planning for the implementation of the Cyber Security Strategy. Planning takes into account the current state of play, best practice and future proofing around known security, threat and regulatory trends.
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
We provide training for the security components of cloud software and cloud hosting services (e.g. access control, hardening, etc.)
Training is tied to specific services
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
We help buyers before, during and after their migration to the cloud. We support you in the following four different steps: protect and test your critical systems and detect and respond to a cyber-attack. We orchestrate all dependent parties and workstreams, providing direction and control to ensure risks, issues and dependencies are closely managed thus ensuring migration activities can take place as scheduled and without impact to service.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
We organise penetration testing of critical systems to identify vulnerabilities.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
  • Other
Other security services
  • Security crisis management simulation
  • Security awareness
  • Supply chain risk management
  • Resilience and recovery strategy
  • Platforms security and optimisation review
  • Operational Resilience and Recovery
  • Identity & Access Management
  • Security Assurance
  • Security Operations Centre (SOC)
Certified security testers
Yes
Security testing certifications
Other
Other security testing certifications
  • PASSI (as issued by the French national security agency ANSSI)
  • OSCP
  • GPEN

Ongoing support

Ongoing support service
No

Service scope

Service constraints
None

User support

Email or online ticketing support
No
Phone support
No
Web chat support
No
Support levels
N/A

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
LTSI
ISO/IEC 27001 accreditation date
01/02/21
What the ISO/IEC 27001 doesn’t cover
IN OUR ISO/IEC 27001 CERTIFICATION, WE ARE CERTIFIED ONLY FOR THE FOLLOWING: SECURTIY AUDITS INCIDENT RESPONSE SERVICES
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Improved cyber security can help fight climate change through moving to more sustainable facilities. The process of moving to cloud can also identify opportunities to streamline technology needs and reduce the overall hardware requirements, also positively impacting sustainability

Covid-19 recovery

New ways of working driven by covid-19 recovery often deliver improved ways of working for employees or improved contact points for customers, both of which are in support of different working styles and improved mental and physical health. These require an improved approach to cyber security given the fundamental shift from older approached

Tackling economic inequality

Updated cyber security can create new requirements for the organisation based on a shift in the IT operating model, leading to opportunities for skills change and possible new roles. It also supports development of new services and capabilities from cloud providers which can lead to new jobs and skills

Equal opportunity

In support of our equal opportunities policy all of our projects make use of our diverse community of employees. We always look for opportunities to engage with our customers around multiple topics, including where we can share learning and good practice in areas such as equality and equal opportunities

Wellbeing

Improved cyber security supports improved ways of working for employees, supporting different working styles which help with both physical and mental health. In addition, the ability of cloud to enable remote working helps to build more diverse project and organisational communities through equal access to services and communications

Pricing

Price
£550 to £1,950 a person a day
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ukpublicsector@wavestone.com. Tell them what format you need. It will help if you say what assistive technology you use.