Category: Blog

  • SaaS or Self-Hosted: What’s the right ServiceNow strategy for your organisation?

    SaaS or Self-Hosted: What’s the right ServiceNow strategy for your organisation?

    ServiceNow has become the go-to platform for organisations seeking to streamline workflows, automate service delivery and drive digital transformation. With its extensive capabilities, the platform presents huge value opportunities but also requires a key consideration – the deployment strategy. Does the organisation and associated infrastructure require a conventional, vendor-hosted SaaS solution or a self-hosted instance?…

  • Defence Cyber Certification: Aligning Risk Profiles with Real Assurance

    Defence Cyber Certification: Aligning Risk Profiles with Real Assurance

    In a previous article, we explored the MOD’s Cyber Security Model version 4 (CSMv4), the framework that introduced structured risk profiles to assess the cyber requirements of defence contracts. Now, we turn our attention to what comes next: Defence Cyber Certification (DCC), the formal mechanism that ensures Defence Suppliers meet the resilience standards required across…

  • The True Cost of a Cyber Attack on the Defence Supply Chain

    The True Cost of a Cyber Attack on the Defence Supply Chain

    In early 2022, a well-regarded UK defence contractor found itself at the centre of a cyber security storm. The company, an SME and key supplier of engineering components for Ministry of Defence (MOD) projects, had built its reputation on precision, reliability, and discretion. But that reputation was shattered almost overnight when a cyber-attack exposed confidential…

  • How ServiceNow ITSM Transforms Defence Services

    How ServiceNow ITSM Transforms Defence Services

    Managing IT services in the defence sector is an unique and often highly complex challenge. Unlike commercial enterprises, where IT disruptions might cause financial setbacks or inconvenience, in defence, an inefficient IT service can compromise national security and expose sensitive data to cyber threats. The ability to maintain seamless, secure and highly responsive IT services…

  • Simplifying Secure Collaboration for MOD Contractors

    Simplifying Secure Collaboration for MOD Contractors

    At a glance, defence projects may appear seamless; multiple organisations working together, each contributing their expertise to deliver advanced capabilities for the Ministry of Defence (MOD). The reality, however, is that collaboration in the defence sector is anything but simple. Consider; a small defence contractor preparing a bid submission for a high-value MOD contract. The…

  • Why Defence Needs Secure ITSM

    Why Defence Needs Secure ITSM

    Managing IT services in the defence sector comes with a unique set of challenges. Unlike in commercial businesses, where IT failures might result in financial loss or reputational damage, in defence, the stakes are far higher. Worst case scenario: disruption that jeopardises operations and ultimately risks lives. To keep these services and systems running efficiently…

  • Cyber Security Risk Management in the Public Sector

    Cyber Security Risk Management in the Public Sector

    Cyber security within government organisations is fundamental to national resilience. The public sector handles vast amounts of highly sensitive information, ranging from personal data to classified intelligence, making it a prime target for cyber threats. Effectively managing cyber risks thus requires a socio-technical approach considering the people and processes, as well as the technology used.…

  • Why Defence Suppliers Need a Managed Security Service

    Why Defence Suppliers Need a Managed Security Service

    When a mid-sized defence supplier landed its first direct contract with the Ministry of Defence (MOD), the leadership team knew security was a priority. They had an IT team in place, firewalls installed, and a cyber awareness programme for employees. On paper, they believed they were covered. Then came the hard truth. As part of…

  • Understanding the MOD’s Cyber Security Model v4

    Understanding the MOD’s Cyber Security Model v4

    Article first published 20/01/2025 and updated 18/07/2025 The Ministry of Defence (MOD) recently introduced version 4 of its Cyber Security Model (CSMv4), an update designed to enhance the cyber resilience of its supply chain. The Cyber Security Model v4 framework embeds a comprehensive approach to organisational resilience, requiring proportionate measures based on risk and reflects…

  • Optimisation and Transformation: The Path to Success

    Optimisation and Transformation: The Path to Success

    Optimisation isn’t just about minor tweaks; it’s about driving continuous improvement through small, strategic changes that deliver true business value. By tackling real challenges incrementally, optimisation achieves transformative benefits whilst realising value early and delivering sustainable improvements. True value lies in a balanced approach: driving continuous optimisation to ensure operations keep improving and delivering impactful…