'Most people are starting to realise that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don't know it. Therefore, prevention is not sufficient and you're going to have to invest in detection because you're going to want to know what system has been breached as fast as humanly possible so that you can contain and remediate.'

Tes Schlein (Venture Capitalist at Kleiner Perkins Caufield & Byers)




Adversarial Security Risk Review


Maturity Assessment, Audit & Benchmarking – Are you as secure as you think you are?

Strengthening Human Factors


Building Risk Awareness & developing your Security Culture, Executive and Staff training, Education services and learning tools.

Provision of Expertise and Resources


Reviewing and defining Strategy, Policy, Process’s, Procedures. Change & Transformation, Skilled Cyber and Security leadership and interim project and programme staff.

Solutions & Platforms Architectures and Delivery


Optimisation of in-house technologies and security tools and platforms. Tech refresh and gap filling. Partner solutions and Systems Integration.

Federated Managed Security Services


Linking in-house capability to out-sourced managed services and threat management capabilities. Threat Intelligence and sharing. Threat Mitigation and resolution.

It is generally accepted that there is no perfectly secure Cyber defence solution so the final phase of security assurance is a Managed Security Service. A burglar alarm system if you like. One that alerts you if someone is attempting to steal or compromise the data you have worked so hard to build impenetrable layers to protect.

These alarm solutions are called Security Operations Centres (SOC) and they don't need to be either complex or unnecessarily expensive. However they do need to be smartly designed to be effective.

A SOC is a department into which all of the available real-time data (that is security related) is streamed, then digitally analysed using a variety of purpose built applications before being presented to experienced analysts who know what to look for and how to respond to alert situations.

It's a triage of People, Technology and Process:

ABG support two options:
BUILD YOUR OWN SOC: ABG design and build smart, simple and cost effective SOC's for our clients using best of breed software and we usually staff them.
SUBSCRIBE TO A FEDERATED SOC: ABG have formal association with a number of large established federated SOC's worldwide.

Macbook Pro
* Intel Core i7 (3.8GHz, 6MB cache)
* Retina Display (2880 x 1880 px)
* NVIDIA GeForce GT 750M (Iris)
* 802.11ac Wi-Fi and Bluetooth 4.0
* Thunderbolt 2 (up to 20Gb/s)
* Faster All-Flash Storage (X1)
* Long Lasting Battery (9 hours)
Yes I'm interested in gamification
and keen to learn more about Quartermaster
so please keep me posted
Your Information will never be shared with any third party.