Guiding businesses through testing times

June 2016 Information Security, Security Services & Risk Management

BT announced the launch of Cyber Roadmap Consulting, a new consultancy programme designed to give large organisations a better understanding of their own cyber security risks and implement measures to mitigate these.

The new service uses consultants from BT’s global security consulting team to work with customers to identify risks in existing systems and processes. The BT consultants are in an ideal position to create a bespoke cyber-threat mitigation and defence plan for each customer, providing detailed step-by-step guidance to help them improve security throughout their organisation, covering people, processes and technology.

Guus van Es, BT’s general manager for Security Consulting.
Guus van Es, BT’s general manager for Security Consulting.

Guus van Es, BT’s general manager for Security Consulting, said: “Our approach not only identifies gaps, it takes a broader view on how to help customers stay ahead of the threat curve. Based on our wealth of experience in protecting BT and our customers, it is an integral part of our security portfolio. This includes bespoke design, implementation and operate capabilities as well as delivery of managed services and help with transformation projects. Combined with our vendor-agnostic approach, this ensures we can deliver a set of realistic and cost efficient measures on a global scale while at the same time helping our customers make the most of their existing technology investments and stay closely aligned to their business goals.”

Already delivered to one of the world’s largest financial organisations, BT’s Cyber Roadmap Consulting is fully compliant with ISO 27002, the U.S. Commerce Department’s National Institute of Standards and Technology (NIST) Cyber Security Framework and the U.S. Federal Financial Institutions Examination Council (FFIEC) requirements for the financial services industry.

BT’s global security consulting team consists of 500 highly skilled security specialists with expertise in every cyber area. Key accreditations available in the team include Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor/ Certified Information Security Manager (CISA/CISM), ISO 27001, ISO 27005 and ITIL.

The service is available worldwide.

For more information contact BT, +27 (0)11 798 5000.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
Health, safety, and environmental eLearning
Training & Education Security Services & Risk Management
SHEilds is a global leader in health, safety, and environmental eLearning, delivering internationally recognised qualifications such as NEBOSH, IOSH, IEMA, and ProQual NVQs.

Read more...
See crime stopped in seconds
Products & Solutions Security Services & Risk Management
Fog Bandit, a leader in security fog, is bringing its instant crime-stopping technology to Securex Cape Town 2025. Experience the innovation trusted worldwide to protect retailers, warehouses, and high-value sites.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
SA’s private security industry receives multi-million USD investment
News & Events Security Services & Risk Management
South Africa's private security sector has attracted significant international attention, with the world’s largest tactical flashlight manufacturer, Nextorch, announcing a major investment in its local operations, Nextorch Africa.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.