top of page

Core Cyber Services

We are a passionate cyber and information security risk management consultancy.

Business Team Training Listening Meeting Concept_edited.jpg

Cyber Training

At Layered Defence, we know that training and development are critical to any enterprise. We can provide expert guidance on the most suitable training options and are able to deliver the latest industry recognised courses;

CompTIA

EC-Council

(ISC)2

ISACA

PECB

​

OUR COURSES

Corporate data management system (DMS) and document management system with privacy theme c

Data Security, Discovery & Mapping

We work with enterprises to structure their data effectively as we understand this is often a complex undertaking with a high number of data repositories in play.

​

At Layered Defence we have an in-depth experience of working with enterprises to ensure timely accurate data is not only mapped effectively and is compliant, but is kept securely and is available for critical decision making

The old hard disk drive is disintegrating in space_edited.jpg

Secure IT Disposal

At Layered Defence we can provide expert guidance on the disposal of your legacy hardware including; Network equipment, hard drives, PCs, laptops and servers. Our end-to-end process provides a full and comprehensive disposal for all assets and will cover asset identification and cataloguing, secure collection and transportation, deletion of legacy data, value recovery where possible and secure disposal if not.

​

By using the latest industry leading technologies and processes, we are able to handle the most sensitive of data and equipment to achieve data deletion and secure destruction.

​

We are fully compliant with UK Government NCSC Security Rules and with Waste Electrical and Electronic Equipment Regulations 2013. Furthermore, we are WEEE and UK NCSC/IS5 compliant up to Top Secret.

Close-up Portrait of Female Software Engineer Working on Computer, Program Code Run Aroung

Cyber Due Diligence

Risks from 3rd party suppliers are an emerging trend and its critical for enterprises to fully understand the cyber risks, whether they be financial/ reputational, legal and regulatory or operational particularly when entering into new engagements.

​

    Layered Defence will work with you to illuminate and address threats to your network that a third-party supplier/ partner may introduce to ensure comprehensive, informed risk outcomes can be made.

_edited_edited.jpg

Cyber Risk Analysis

Cyber risk issues are a constant in today's programmes and decision making. We will work with you through a structured approach that aligns to common frameworks such as NIST 800-30, ISO27005, ISO3100.

 

  We will be thorough and step through 1.) Risk Tolerance 2.) Risk Identification 3.) Risk Analysis 4.) Risk Evaluation 5.) Risk  Treatment       

​

The continual management of Cyber risk is critical and here at Layered Defence we are committed to working long-term to support your needs, whether through coaching, additional risk analysis across the enterprise, or advisory input on your risk management programme.

Cyber security concept. Encryption._edited.jpg

Cyber Assurance

We will work with you to avoid common enterprise pitfalls relating to Cyber risks including compliance concerns. There are many frameworks and standards that enterprises may need to be compliant to and we can advise and tailor bespoke offerings to suit all needs.

​

We can develop and implement an effective enterprise-wide Information Security Management System (ISMS) to achieve ISO27001 compliance.

​

Furthermore, our team can provide guidance and help to implement compliance to Cyber Essentials +.

​

At Layered Defence, we have significant experience in providing assurance activities, risk analysis, information asset management and delivering high quality cyber training.

Cloud transferring data storage, on online  server technology and cloud icons that are cur

Cloud Security

At Layered Defence we can provide expert advice and guidance on hybrid cloud deployments, including design and architecture reviews, secure by design assessments and support, security operations integration and GDPR assessments for cloud. We are proficient in multiple cloud offerings and ensure we harness the latest industry cloud security advice and guidance in our engagements.

bottom of page