top of page


Our Chief Information Security Officer-as-a-Service (CISOaaS) provides access to the capabilities required to respond to the threats of today and plan for those of tomorrow.

For some organisations hiring a Chief Information Security Officer is simply cost prohibitive, and for others attracting and retaining the right talent is challenging. Either way, the impact of a cyber-attack or data breach can still be significant.

Want to know more?

Whilst some organisations may have strong technical capabilities but lack board engagement, others may require an increased focus on understanding their threat landscape or on developing technical standards. During the onboarding process your business strategy, regulatory and threat landscape and existing structures and capabilities are reviewed. This ensures the resulting service is tailored to your specific needs, and delivers relevant business benefit by integrating with your existing capabilities.

Our Approach

Our CISOaaS is delivered through a blend of on-site and remote support, including voice or video calls and email. The service is comprised of a one-off on-boarding process followed by a delivery model designed to meet your specific requirements.

The on-boarding process ensures the service is tailored to your specific requirements. This includes the following:

  • Strategy: Reviewing business strategy, and regulatory and legislative landscape.

  • Threat Management: Reviewing business model and operations to understand the threat landscape

  • Advisory: Identifying in-flight programmes and projects that are impacted by information, cyber and privacy risks.

  • Technology: Reviewing current capabilities and their effectiveness in supporting those needs.


Once the on-boarding process is complete, the scope and objectives of the CISOaaS will be documented in a service description. Using a fixed monthly charge and/or fixed rate you can ensure you have access to the right capabilities.

Your Benefit

The CISOaaS service ensures businesses have access to the right security capabilities, at the right time, through an on-demand model:

  • Lower cost: pay for the support required

  • Address market demand: access the capabilities quickly, reducing time and cost of attracting and retaining talent

  • Improve maturity: deliver effective improvements to security posture through a breadth of experience

  • Existing capability: leverage current investment in expertise and technology to enhance security

Our Engagement

The CISOaaS is based on two elements, the on-boarding process and the ongoing delivery.

  • On-boarding: fixed price engagement. Output of which is the service description and agreed monthly effort.

  • Monthly Service Charge: Based on client requirements, this will include a combination of onsite and remote support

bottom of page