Formed in 2005 as a preferred supplier to UK Ministry of Defence and Government.
Saving your time
Our long-standing experience means that we can provide each customer, whatever their size, with pragmatic solutions exactly tailored to suit their specific requirements.
Skilled and Experienced Team
Mobile and highly experienced team consists of senior professionals who are all passionate about IT security
Warrior Networks have worked on numerous projects with the MOD. This section details only a very small amount of projects, one example is that we have provided a Senior Consultant as the Security Assurance Coordinator (SAC) to a Defence innovation project. This delivered innovative, cloud-based, capabilities that are employed in the Firm Base, Overseas, and on Operation.
For all the project systems, our consultant is responsible for:
Acting as the single point of contact for all security and assurance
Accreditation evidence set generation
Technical risk assessments (IS1&2, NIST plus other methodologies)
ISO27001 audits of suppliers and systems
Accreditor, service provider and project stakeholder liaison and management
JSP604 compliance evidence generation
CoCos/ISMS, SyOPs, BDAs, DPIAs, DCPP submissions and TSIs
Reacting and coordinating responses to ISNs, DIANs and MODCERTs
Chairing of SWGs and Security Surgeries
Integration activities onto Defence Core Networks
Compliance with relevant legislation
Compliance with HMG and MOD policy such as JSPs 440, 441, 490, 604 and 740
Creating and managing DART, IAR and DAR entries
Supporting innovation test and trial activities to ensure all use is legal, compliant and does not present risk to the MOD’s information
Maintenance of the project Security Risk Register
Security training to system and service consumers
Security and assurance advice for all aspects of wider work undertaken by the project.
Warrior Networks was contracted to review and develop an industry set of security controls that all operators should have in place to be considered secure.
The company’s Cyber Security team tasked Warrior Networks to review and develop a Permanent Reference Document (PRD) for its membership to review and publish. The company wanted their membership to comply with the CIS Controls; a prioritized set of actions that collectively form a defence-in-depth set of best practices that mitigate the most common attacks against systems and networks, NIST Cybersecurity Framework and Secure Controls Framework™.
The PRD document was designed to be consistent with its approach to the security controls and covered the following subcategories:
Radio Access Network (RAN)
Network Operations including Operational Suppler Service/Business Support Services.
Security projects, ranging from system accreditations, through to providing guidance on embedding security into new corporate governance structures.
Warrior Networks have worked with a Defence contractor to support security projects ranging from system accreditations, obtaining List X approval for pre-production and development environments, project security advice, and guidance on embedding security into new corporate governance structures.
The systems and environments under accreditation cover OFFICIAL to above SECRET and must host complex working arrangements for a mixture of UK and international personnel.
Warrior Networks provided a team of consultants to support a Government Dept Security team. Collectively we delivered risk analysis, technical security architecture, and supplier assurance support to the Department.
Consultants had a minimum of SC clearance to work with the team, allowing them to work on OFFICIAL and OFFICIAL SENSITIVE projects and programmes.
Our team worked seamlessly with the client, other suppliers, and key stakeholders including other Government departments and Accreditors, to ensure internal and pan-government programmes were supported effectively.
Our Consultants used their experience and professional expertise to advise on ways to improve the risk management process in order to deliver a sustainable, effective, and streamlined risk management system.
In addition, as consultants, we provide value-added support over and above their assigned role. Such support included:
The production of a fact sheet for PMs, so they understand how to incorporate risk management into their job role
Suggested amendments to the project triage and allocation process to assist risk analysts
Further development of the induction process and training regime
Information Security Management Systems (ISMS), Business Continuity, and Disaster Recovery (BCDR) plans.
We have provided cyber security support to a large Communications Programme. Our team led the initial client phases of establishing both Information Security Management Systems (ISMS) and Business Continuity and Disaster Recovery (BCDR) plans with the main suppliers providing the telecoms network, users services, and handsets.
Our team acted as the focal point for articulating the client requirements for both cyber security and BCDR, and assessing the suppliers’ responses in design and implementation to these requirements. We represented the client, as the Programme BCDR lead, at the joint BCDR and Security Working Groups, chairing these meetings when appropriate.