top of page
Case Study Icon

Defined Control Requirements Enable Targeted Security Investment

i-confidential Security Health Check Offering Logo

“For each of the 80 security improvement projects… we defined the detailed security control requirements.”

In an ever-evolving threat landscape, organisations can struggle to ensure they have effective cyber security controls in place, to both mitigate the risks they face, and protect key information assets from compromise.


It was on this basis that a global financial services client asked i-confidential to conduct a review of its security position. It wanted to use the results to establish a programme to address any significant gaps.

We conducted an assessment of the client’s cyber security controls. Our approach is aligned to industry best practice, including SoGP, NIST, and ISO. It is built on the experience of working with large financial services organisations for many years.


In this case, the control assessment encompassed the entire organisation, including the application and infrastructure estates. The client’s risk and investment appetite was also considered.


With the assessment complete, we then provided a detailed cost and benefit analysis for a series of recommended activities to address the highlighted gaps. This was then structured into a three-year security improvement programme (SIP). For each of the 80 security improvement projects within the SIP, we defined the detailed security control requirements.


A further output from the review was a risk position statement. This detailed the significant gaps discovered by mapping the individual control requirements to a set of top-level security risks we defined for the client. We then summarised the required improvements and costs to move from the current state to an acceptable risk position, showing which control requirements would be met over time.

The Approach

The Problem

The Outcome

The review identified 60 weaknesses across 10 risk areas. The SIP provided a straightforward cost-versus-risk view of the required improvements, showing the progressive risk reduction that would be achieved.


The client’s Head of Cyber Security was able to recommend to the executive the right level of targeted investments to make, based on a clear statement of the control requirements that needed to be met.


The level of detail we provided for the new control requirements gave confidence to the Risk Committee and auditors that the investment proposal was built on a sound foundation. The organisation benefited from the definition of an improved set of cyber security risks that could be easily embedded into their operational risk framework and first-line assurance processes.

bottom of page