Process & Methodology
At O Abdelkader Consultant Ltd, our process is designed to deliver clear, credible, and efficient cyber security assessments and certifications, tailored to your business needs and sector requirements. We follow a structured methodology based on the standards set by the National Cyber Security Centre (NCSC) and IASME Consortium, ensuring every engagement is thorough, transparent, and adds genuine value.

Initial Consultation and Scoping

We begin with a consultation to understand your organisation’s structure, business activity, and specific cyber security challenges. This allows us to define the scope of the assessment—whether for Cyber Essentials, IASME Cyber Assurance, or advisory services—and to identify any sector-specific requirements or compliance obligations.

Readiness Assessment and Gap Analysis

Our team conducts a readiness assessment and gap analysis, reviewing your current controls, policies, and technical measures against the relevant certification requirements. We identify any areas that need improvement and provide you with a clear, actionable plan to address gaps. This step ensures you are well-prepared before the formal assessment begins.

Tailored Guidance and Implementation Support

We provide practical, tailored advice to help you implement the required controls. This includes supplying policy and procedure templates customised for your industry, technical recommendations, and staff training materials. Our approach is always business-aligned, ensuring that cyber security measures integrate smoothly with your day-to-day operations.

Self-Assessment and Evidence Submission

For Cyber Essentials and IASME Cyber Assurance Level 1, you complete a self-assessment using our secure branded portal. The portal enables real-time tracking, secure document upload, and transparent communication between your team and our assessors. We review your responses, supporting evidence, and any additional documentation needed for the certification process.

Independent Review and Moderation

Every assessment is independently reviewed and, where required, subject to a moderation process to ensure objectivity, independence, and credibility. This step upholds the integrity of the certification and ensures compliance with IASME and NCSC standards.

Certification and Ongoing Support

Upon successful completion of the assessment, we issue your certification (for Cyber Essentials or IASME Cyber Assurance Level 1). We provide a detailed report, highlight strengths and areas for ongoing improvement, and offer advice on maintaining compliance. Our relationship does not end with certification: we offer annual reviews, regular updates, and ongoing support to help you adapt to new threats and regulatory changes.

Technical Assessment (where applicable)

For services that require technical validation—such as Cyber Essentials Plus preparation or vulnerability scanning—we conduct manual and automated tests to verify the effectiveness of your controls. We provide clear reports outlining any findings, recommended actions, and evidence of compliance.

Continuous Improvement

We are committed to continuous improvement—both for our clients and our own processes. We regularly review and update our methodology in line with evolving industry standards, client feedback, and the latest threat intelligence.

Why Our Methodology Works

User-friendly branded portal for efficient, secure, and transparent assessment

Tailored advice and documentation for your business and sector

Independent moderation for credible, trustworthy certification

Ongoing support and annual reviews to keep your security posture strong

Clear communication at every stage, with prompt notifications and real-time tracking

Our process is designed to make cyber security certification straightforward, valuable, and sustainable—helping your organisation achieve robust protection and regulatory compliance with minimal disruption to your operations.

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.