Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Central Government

Government security in a changing landscape.

The demands on government, non-governmental bodies and their third party commercial suppliers to prove information is appropriately secured are increasing. Any system carrying, storing or transmitting protectively marked data requires an appropriate technology and information risk management process to be carried out. This is to ensure that proportionate security controls have been applied to safeguard the system’s information assets and provide assurance to Accreditors and other key stakeholders.

In a changing Government security landscape, individuals who create and process data and documents must understand how that data should be marked and protected and implement agile, pragmatic and proportionate risk-managed controls throughout its lifecycle. Wherever there is a need for authoritative, expert advice on implementing risk management methodologies, policy or how to mark, process, handle and dispose of data in line with the GCS, our CESG Certified Professional (CCP) certified Consultants can help. Our deep industry experience and links within Government and Cabinet Office, NCSC and the wider IA community, combined with our full spectrum of independent Accreditation and Risk Management services offers you an unrivaled and compelling proposition for your cyber security needs.

As an established cyber security consultancy, we have years of experience in providing information assurance advice to government and third-party commercial suppliers in line with best practice, GovAssure, HMG Policy and Standards and the Security Policy Framework, and our CCP Consultants have a 100% record in successful system accreditations.

HMG Technology & Information Risk Management and Assurance Consultancy services include:

  • Governance, Risk & Compliance
  • Secure by Design (SbD)
  • GovAssure
  • Digital Transformation projects
  • Specialists in System Assurance (from a CCP)
  • Digital transformation assurance services
  • Range of outsourced roles (contact us for details)
  • Application of current and legacy IA Assurance Methodologies
  • Risk Management, Risk Assessment & Risk Treatment following guidance including ISO27005, ISO31000, ISO27001/2 and IAS1&2 (where still used)
  • Security Architecture System Designs and Reviews
  • Digital and Cloud Security Services
  • IA Audits and Reviews including RMADS (where still used), Security Policy Framework (SPF) Compliance
  • IA Incident Management
  • IA Policy & Standards Advice and Guidance, including policy development and reviews
  • ISO 42001 Artificial Intelligence Management System
  • Advice on Off-shoring Data
  • System Decommissioning Services
  • Codes of Connection Reviews e.g. PSN, PSN(P)
  • Data Protection
  • Privacy Impact Assessments
  • Red Teaming

Discover Our Training Academy

Looking for Contingent Talent?

In addition to our core services, we can provide outsourced specialist individuals or teams to work on an ad-hoc or contractual basis, to see through your cyber and physical security projects on time.

Our outsourced specialist roles include, but are not limited to:

  • Security Consultant / Risk Assessor
  • Information Security Engineer
  • Security Incident Responder
  • Security SIEM Analyst
  • Solutions Designer
  • Software Developers
  • IT Risk Analyst
  • Threat Intelligence Analyst

Related Downloads

Case Study: Dudley Metropolitan Borough Council

Digital Transformation

Secure by Design

GRC Services

SIRO Training

Artificial Intelligence

Find us on G-Cloud 14

What our Central Government clients say

Previous

Provision of cyber risk specialists and security architects to directly support to over 200 individual projects. Through Advent IM Outsource, our Managing Consultant took on responsibility for inducting, project assignment and overseeing their work through to conclusion. The Department found this saved considerable time and effort having had the burden of overseeing the contractors removed and passed to a trusted delivery partner allowing them to focus on other tasks and priorities.

Advent IM Outsource, A large Government Department Advent IM Outsource, A large Government Department
Next

From our Blog

PODCAST: Government Digital Transformation, are we nearly there yet?

We are a decade on from ‘Tell us once’ – the Government service that was supposed to allow users to literally tell Government just once about a change in their lives and that would then be reflected through all the services they use or need. In this episode, we ask the pesky question from from […]

Find out more about our work in the government sector