Risk and Business Consultants 

For all your cyber security needs 

Our Services

RBC Group has extensive experience in delivering Cyber security advice to customers. Whether it be to Commercial, Public Sector or NHS clients we have the experience and knowledge to provide value added service that can enable your business for the secure digital age. RBC Group consultants are skilled in providing risk advice, security architecture definition and review, auditing, compliance and accreditation services in all elements of ICT, including cloud, off shore, near shore and locally hosted infrastructure. 

We have vast experience within central government, commercial and NHS organisations, securing some of the most important data within the UK. 

RBC Group services can be tailored to meet your requirements. We will always provide a professional, reliable and skilled service to meet and exceed our client’s expectations.


Our Cyber security bundles 

What do you need?

From a small scope security control review and assessment, to producing a detailed risk assessment or supporting an implementation of ISO27001:2013, “Cyber Security Bundles” provide a fixed package solution.

Our packages are: 

  • Platinum
  • Gold
  • Silver 
  • Bronze 
Find out which you need by clicking below

Non-executive director

Robert Briggs, director of RBC Group, is also available to act as a non-executive director to cover all matters associated with governance, risk and compliance 

What i offer 
  • Over 25 years of experience
  • Co-founder of 2 cyber security consultancies
  • Trained in governance, risk and compliance

Security Consultancy

End to End security consultancy - project, threat/risk/compliance, design, implementation – bespoke timescale dependant on requirements.

 

Security and Cyber are intimidating words for any organisation. Understanding the risks, controls and compliance issues before you start any project is key to a successful implementation, as is ensuring any risks that are identified are successfully mitigated or controlled. Furthermore, identifying and implementing a secure design reduces the exposure that you have to any security incidents and ensures you control access to the key data you own and control.