Penetration Testing & Red Team
Authorised simulation of real-world attacks to expose vulnerabilities before adversaries do. Our CREST-aligned penetration testing covers web applications, internal and external networks, cloud environments, APIs, mobile applications, and social engineering, delivering actionable remediation guidance and executive-level reporting. Red team exercises simulate advanced persistent threat (APT) actors to test your detection and response capabilities under realistic conditions.
Vulnerability Assessment & Management
Continuous identification, prioritisation, and remediation of security vulnerabilities across your entire digital estate. We deploy leading scanning platforms, Tenable, Qualys, Rapid7, and integrate findings with your IT asset register to produce risk-scored remediation programmes. Our consultants manage the full vulnerability lifecycle, from discovery through patch validation, providing ongoing visibility through dashboards and regular reporting.
Incident Response & Crisis Management
When a security incident occurs, the speed and quality of your response determines the outcome. Arthur J Goldman provides retained and on-demand incident response services, supporting containment, forensic investigation, evidence preservation, regulatory notification (ICO, FCA), and stakeholder communication. We also develop and test Incident Response Plans and playbooks, ensuring your team is rehearsed and confident before a real event occurs.
Virtual CISO (vCISO)
Board-level security leadership without the cost of a full-time hire. Our vCISO service provides organisations with a senior, experienced Chief Information Security Officer on a fractional or project basis, owning your security strategy, programme, and regulatory relationships. Our vCISOs bring proven experience from FTSE 100 security programmes, FCA advisory roles, and NCSC engagement, delivering immediate credibility to boards, investors, and regulators.
Cloud Security
As organisations migrate critical workloads to AWS, Azure, and Google Cloud Platform, securing cloud environments demands specialist expertise. We deliver cloud security assessments, architecture reviews, Identity and Access Management (IAM) design, data classification and encryption strategy, and compliance mapping against CIS Benchmarks and CSA STAR. Our consultants also assess containerised environments (Kubernetes, Docker) and serverless architectures.
Identity & Access Management
Compromised credentials remain the leading initial access vector in cyber attacks. Our IAM practice designs and implements zero-trust identity architectures, covering Multi-Factor Authentication (MFA), Privileged Access Management (PAM), Single Sign-On (SSO), Role-Based Access Control (RBAC), and directory services hardening. We review your joiner/mover/leaver processes and implement the principle of least privilege across your technology estate.
Security Operations & SOC Advisory
A Security Operations Centre is only as effective as the processes and technology behind it. We advise on SOC design, SIEM platform selection (Splunk, Microsoft Sentinel, IBM QRadar), detection rule development, and alert triage procedures. For organisations without an internal SOC, we provide managed detection and response (MDR) advisory, selecting and overseeing third-party providers on your behalf to ensure SLAs and quality standards are met.
Data Protection & Privacy
Protecting personal and sensitive data is both a legal obligation and a commercial imperative. Our data protection practice supports UK GDPR and Data Protection Act 2018 compliance, conducting Data Protection Impact Assessments (DPIAs), Records of Processing Activity (RoPA) reviews, subject access request procedures, data breach response planning, and Privacy by Design integration into product development. We also advise on cross-border data transfer mechanisms post-Brexit.
Supply Chain & Third Party Risk
Your security is only as strong as your weakest supplier. We design and implement third-party risk management programmes, vendor security questionnaires, onboarding assessments, contractual security obligations, and ongoing assurance monitoring. Drawing on NCSC supply chain guidance and ISO 27036, we help organisations understand and manage the cyber risks introduced through their supply chain, particularly in regulated sectors where supplier risk is subject to regulatory scrutiny.
Security Awareness & Training
People remain both the greatest security risk and the most powerful defence. Our security awareness programmes are tailored to your organisation's culture, threat profile, and regulatory obligations, covering phishing simulation, e-learning modules, targeted role-based training for high-risk user groups, board-level cyber briefings, and tabletop exercises. All programmes are measurable, with pre- and post-assessment reporting to demonstrate effectiveness to auditors and regulators.
Business Continuity & Resilience
Organisations must demonstrate the ability to withstand and recover from cyber incidents. We develop Business Continuity Plans (BCPs), Disaster Recovery Plans (DRPs), and Cyber Resilience Frameworks aligned to ISO 22301 and NCSC guidance. Our consultants design recovery time objectives (RTOs) and recovery point objectives (RPOs) that are tested through realistic exercises, ensuring that when disruption occurs, your organisation responds with confidence and minimal impact.
OT & Industrial Cybersecurity
Operational technology (OT) and industrial control systems (ICS) present unique security challenges, combining legacy infrastructure, safety-critical processes, and increasing connectivity with IT networks. Our OT security practice conducts ICS/SCADA assessments, network segmentation design, and incident response planning for energy, utilities, manufacturing, and transport operators, drawing on IEC 62443 and NCSC CNI guidance to protect critical systems without disrupting operations.