Meet the Leadership Team

Chief Executive
Andy brings 25 years’ experience safeguarding mission-critical supply chains, including a distinguished military career securing defence networks across EMEA. As Chief Information Security Officer for the Houses of Parliament Restoration Programme and security lead for Rolls Royce SMR’s nuclear programme, he specialises in protecting Britain’s most sensitive infrastructure supply chains. A Chartered Engineer, Certified Information Security Manager and ISMS Lead Auditor, Andy combines operational security expertise with study in AI Security at Oxford.

Chief Operating Officer
As a supply chain commercial management specialist, Matt brings 15 years’ expertise in governing complex Critical National Infrastructure programmes across UK and global supply chains. A Chartered member of the Chartered Institute of Building, he delivers strategic supply chain commercial advice to organisations including Transport for London, Crossrail, the NHS and the Houses of Parliament Restoration Programme. Matt’s commercial oversight spans post-contract audit and delivery of NEC and G-Cloud frameworks, with recent advisory work for Thames Water.

Director of Consulting
Adrian is a supply chain security and digital risk specialist with 40 years’ of IT and cyber security experience. He specialises in developing supply chain assurance frameworks for global enterprises and UK Government departments. His notable clients have included Barclays, UBS, Ministry of Justice, IPCC, and the Houses of Parliament Restoration Programme. A CISSP and ISO 27001 Lead Auditor with HMG Security Clearance, Adrian brings deep expertise in third-party risk management, having previously served as a CESG Listed Specialist Advisor.
Meet our Advisory Board
We recognise that excellence in supply chain security requires diverse perspectives and deep expertise. Our distinguished Advisory Board brings together accomplished leaders from across key business disciplines, providing invaluable strategic guidance to our leadership team. These esteemed advisors contribute their extensive experience and unique insights to shape our vision, challenge our thinking, and strengthen our ability to deliver security solutions for you.
Take the first step toward supply chain confidence—connect with our experts who can help protect your critical assets and reputation.
Supply Chain Security Our Way
Supply Assure Q&A
What is Supply Chain Security Assurance?
The integrity of organisational security now extends far beyond traditional boundaries, making supply chain security a fundamental cornerstone of modern risk management. Each connection point in your supply chain represents not just a business relationship, but a critical security junction requiring rigorous assurance measures to protect your organisation’s data, systems, and reputation.
Today’s business landscape demands an unprecedented level of interconnectivity, with organisations relying on an extensive network of suppliers for everything from cloud services to hardware components and staffing solutions. This intricate web extends further as each supplier maintains their own complex network of sub-suppliers, creating multiple tiers of relationships that require comprehensive security validation and continuous assurance monitoring.
While strategic partnerships fuel innovation and drive operational excellence by providing access to specialised capabilities, they also introduce complex security interdependencies. This necessitates a transformation in how organisations approach security assurance – moving from periodic assessments to continuous monitoring and validation of security controls across the entire supplier ecosystem.
The challenge of maintaining effective security oversight across these sophisticated, globally distributed supply chains cannot be overstated. According to Accenture’s State of Cyber Security Resilience report, 40% of security breaches are now originating through the supply chain, with each third-party relationship representing a potential vulnerability that requires robust assurance measures. Gartner’s research presents an even more concerning figure, predicting that by 2025, 45% of organisations worldwide will have experienced attacks on their software supply chains. The traditional approach of implicit trust in vendor relationships has become obsolete, requiring instead a comprehensive security assurance framework that validates and verifies security controls at every level.
Organisations must now elevate their supply chain security assurance programs to unprecedented levels, implementing rigorous validation processes, continuous monitoring systems, and comprehensive security controls that span their entire supplier ecosystem. This includes:
- Regular security assessments and attestations
- Continuous monitoring of supplier security postures
- Clear security requirements in supplier contracts
- Verified incident response capabilities
- Documented security control validation processes
The imperative for robust supply chain security assurance has never been more critical. As supply chain attacks grow in sophistication and frequency, organisations must move beyond basic vendor assessments to implement comprehensive assurance programs that provide real-time visibility and control across their entire supply chain ecosystem. The cost of inadequate assurance measures extends beyond immediate financial impact to long-term reputational damage and loss of customer trust.
Mind the Gap! What is Lacking - Supply Chain Security Remains a Critical Vulnerability?
The landscape of supply chain security in the UK remains fragmented and inconsistent, despite increasing cyber threats. The National Cyber Security Centre (NCSC) has taken a firm stance on this issue, emphasising in their Supply Chain Security Guidance that organisations must “gain assurance in proportion to the risk” of their supplier relationships. The NCSC specifically warns that supply chain compromises can be devastating, as demonstrated by several high-profile incidents that have affected thousands of organisations simultaneously.
The NCSC’s guidance outlines four key principles that highlight current security gaps:
- Understanding supplier relationships and their associated risks
- Setting and communicating minimum security requirements to suppliers
- Implementing continuous supplier assurance monitoring
- Planning for security incidents and maintaining response plans
According to the UK Government’s 2023 Cyber Security Breaches Survey, conducted by Ipsos MORI, organisations face three fundamental barriers to effective supply chain security: – Limited understanding of complex supplier networks and their associated cyber risks – Poor visibility across multi-tier supply chains, particularly in critical sectors – Insufficient tools and frameworks for conducting thorough supplier security assessments A particularly worrying trend is the persistence of ‘security by assumption’ – a practice the NCSC explicitly warns against. They advocate instead for a principle of “assume breach,” where organisations should operate under the assumption that their supply chain could be compromised at any time. This aligns with modern security principles endorsed by both the NCSC and the UK Government’s Minimum Cyber Security Standard, advocating for a zero-trust architecture where all users, devices, and suppliers require continuous validation.
The NCSC’s Supply Chain Security Guidance specifically recommends that organisations:
- Map their supplier landscape and understand data flows
- Establish clear ownership of supplier relationships
- Implement proportionate security controls based on supplier criticality
- Regularly test incident response plans that include supplier scenarios
- Maintain clear security requirements in supplier contracts
While the UK’s National Security and Investment Act has strengthened some aspects of supply chain oversight, organisations cannot rely solely on regulatory frameworks. Every supplier connection represents a potential vulnerability, and threat actors are increasingly targeting these relationships through sophisticated “island hopping” campaigns. This risk is so significant that both ISO 27001 and the UK Government’s Cyber Assessment Framework emphasise the critical importance of robust supplier security management.
Moving forward requires a fundamental shift from trust-based to evidence-based security assurance. Organisations must implement comprehensive supplier assessment programs that align with the NCSC’s guidance and upcoming UK cyber resilience regulations. The NCSC emphasises that this isn’t just about security – it’s about business resilience and maintaining the trust of customers and partners. Without this transformation, supply chain vulnerabilities will continue to be the weak link in organisational security.
Should an organisation take a one-size-fits-all approach to setting the security requirements of their supply chain?
Taking a one-size-fits-all approach to setting security requirements for a supply chain is generally not advisable. Each organisation within a supply chain faces unique risks and has specific security needs. A standardised approach may overlook these particular vulnerabilities and fail to address the distinct threats faced by different entities.
Tailoring security measures to fit the unique characteristics of each organisation (or Head Contract) ensures that all potential risks are adequately managed. Customised security plans can adapt to the varying levels of risk and compliance requirements across the supply chain, providing a more robust defence against potential threats.
A generic security plan might not cover all the specific risks and security gaps present in each organisation, leading to a higher chance of data breaches or cyber-attacks. Additionally, different regions and industries have varying regulatory requirements. A one-size-fits-all approach may not meet all these diverse compliance standards, potentially resulting in legal and financial repercussions.
Cyber threats are constantly evolving, and a static, one-size-fits-all security plan may not be able to keep up with new and emerging threats. Continuous monitoring and updating of security measures are essential to stay ahead of cyber criminals. Therefore, organisations should focus on developing flexible, customised security strategies that address the specific needs and risks of each part of their supply chain.
What is Digital Assurance and Why Does it Matter?
Digital assurance is crucial when setting security requirements across your supply chain digital infrastructure (inclusive of software and platforms) use for several reasons. Firstly, it helps identify and mitigate risks associated with the digital components of the supply chain. By ensuring that all digital infrastructure meets stringent security standards, organisations can prevent unauthorised access, data breaches, and other cyber threats.
Compliance with regulatory requirements is another key reason for the importance of digital assurance. Many industries have specific regulations for data protection and cyber security. Digital assurance ensures compliance with these regulations, helping organisations avoid potential legal and financial penalties.
Operational continuity is another critical aspect. Ensuring the security of digital tools and platforms helps maintain smooth operations. Cyber-attacks can disrupt supply chain activities, leading to delays, financial losses, and damage to reputation. Digital assurance minimises these risks by ensuring robust security measures are in place.
Implementing a digital assurance plan also builds trust and transparency with partners and customers. Demonstrating a commitment to security and transparency is particularly important in supply chains where sensitive data and critical operations are involved. This trust can enhance business relationships and improve overall supply chain collaboration.
Got a question? Just drop us a line.