Your data is your most valuable asset. We can help you to protect it.
Our Data Privacy and Protection knowledge and tools will help you to safeguard your business.

With Passion & Dedication

Formed in 2005 as a preferred supplier to UK
Ministry of Defence and Government.

Saving your time

Our long-standing experience means that we can provide each
customer, whatever their size, with pragmatic solutions exactly tailored to suit their specific requirements.

Skilled and Experienced Team

Mobile and highly experienced team consists of senior
professionals who are all passionate about IT security

cyber security

Defence

Warrior Networks have worked on numerous projects with the MOD. This section details only a very small amount of projects, one example is that we have provided a Senior Consultant as the Security Assurance Coordinator (SAC) to a Defence innovation project. This delivered innovative, cloud-based, capabilities that are employed in the Firm Base, Overseas, and on Operation.

For all the project systems, our consultant is responsible for:

  • Acting as the single point of contact for all security and assurance
  • Accreditation evidence set generation
  • Technical risk assessments (IS1&2, NIST plus other methodologies)
  • ISO27001 audits of suppliers and systems
  • Accreditor, service provider and project stakeholder liaison and management
Download full Case Study

Telecommunications Company

Warrior Networks was contracted to review and develop an industry set of security controls that all operators should have in place to be considered secure.

The company’s Cyber Security team tasked Warrior Networks to review and develop a Permanent Reference Document (PRD) for its membership to review and publish.
The company wanted their membership to comply with the CIS Controls; a prioritized set of actions that collectively form a defence-in-depth set of best practices that mitigate the most common attacks against systems and networks, NIST Cybersecurity Framework and Secure Controls Framework™.

The PRD document was designed to be consistent with its approach to the security controls and covered the following subcategories:

Download full Case Study Download full Case Study

Defence Contractor

Security projects, ranging from system accreditations, through to providing guidance on embedding security into new corporate governance structures.

Warrior Networks have worked with a Defence contractor to support security projects ranging from system accreditations, obtaining List X approval for pre-production and development environments, project security advice, and guidance on embedding security into new corporate governance structures.

The systems and environments under accreditation cover OFFICIAL to above SECRET and must host complex working arrangements for a mixture of UK and international personnel.

Download full Case Study
Warrior Networks Data Privacy And Protection security service illustration
Warrior Networks Data Privacy And Protection security service illustration

Government Department

Risk analysis, technical security architecture, security controls testing, and supplier assurance support.

Warrior Networks provided a team of consultants to support a Government Dept Security team. Collectively we delivered risk analysis, technical security architecture, and supplier assurance support to the Department.

Consultants had a minimum of SC clearance to work with the team, allowing them to work on OFFICIAL and OFFICIAL SENSITIVE projects and programmes.

Our team worked seamlessly with the client, other suppliers, and key stakeholders including other Government departments and Accreditors, to ensure internal and pan-government programmes were supported effectively.

Our Consultants used their experience and professional expertise to advise on ways to improve the risk management process in order to deliver a sustainable, effective, and streamlined risk management system.

Download full Case Study

Communication Programme

Information Security Management Systems (ISMS), Business Continuity, and Disaster Recovery (BCDR) plans.

We have provided cyber security support to a large Communications Programme. Our team led the initial client phases of establishing both Information Security Management Systems (ISMS) and Business Continuity and Disaster Recovery (BCDR) plans with the main suppliers providing the telecoms network, users services, and handsets.

Our team acted as the focal point for articulating the client requirements for both cyber security and BCDR, and assessing the suppliers’ responses in design and implementation to these requirements.
We represented the client, as the Programme BCDR lead, at the joint BCDR and Security Working Groups, chairing these meetings when appropriate.

Download full Case Study
Warrior Networks Data Privacy And Protection security service illustration