07/10/2025
A Cyber Security Career Path Success Story
At SEP2, we’re passionate about nurturing new talent and helping individuals discover their potential in the cyber security field.
Published: 01/10/25
It’s no secret that we live in an ultra-connected world, where every person, every device and every system is linked together in ways that we could not have imagined even 10 years ago.
We opened the doors to a haunted house, and now we’re living in it. Every integration, every convenience, every shortcut has created new corridors and crawlspaces in our digital environment. Once those doors are open, there’s only one way to stay safe: know what’s lurking in the dark, and be ready to face it.
More connected and complicated systems, means more complex protections being put in place to try to keep the monsters from our doors. It’s become commonplace to bring in third-party providers to run parts, or even all, of your security platforms. A dedicated cyber security team can be cost-prohibitive to maintain, which is why companies like SEP2 exist: to make industry-leading expertise accessible to every organisation.
But this shift has opened the door to one of the most chilling threats facing organisations today…
*Cue thunder and lightning*
Just so we are on the same page – what do we mean by ‘supply chain attack’ exactly?
Supply chain attacks are a type of cyber attack that targets a less secure third-party vendor or partner to gain unauthorised access to a larger, more secure organisation. It leverages the inherent trust between the primary company and its suppliers to bypass direct security measures that otherwise would be caught.
We’ve seen this happen with Solarwinds, Target and more recently, Salesloft. In the case of Salesloft, the attack exploited an integration with a supplier used by multiple customers, highlighting just how interconnected these platforms are, and how dangerous these attacks can be.
The same can happen in reverse. Jaguar Land Rover was recently taken down, and the knock-on effect is hitting their suppliers, some of whom are no longer receiving orders and may be forced to close down.
It’s us. SEP2 is also part of your supply chain.
For existing customers, and hopefully soon prospective customers, SEP2 forms part of the supply chain and, in some cases, has access to deep parts of your networks and systems.
There’s only so much silver bullets and cloves of garlic can do, so what do we do to protect ourselves and by extension, our customers, against this current trend of supply chain attacks?
We don’t rely on luck, charms, or wishful thinking. We rely on three things: technology, policies, and procedures.
Step one for us has always been to have the right technology in place.
We eat our own dog food, so to speak. SEP2 was our first customer. By treating ourselves like a customer, we ensure that we are putting the same protections in place that we would recommend to anyone else. If it’s good enough for our customers, it’s good enough for us.
We enforce what we see as best-practice policies wherever we can. Here are a few examples:
None of this is a magic potion. It’s not new. Putting it into practice, and sticking to it, takes time, effort, and discipline. Where we see so many people fall over is where they fail to adhere to some of these basic principles.
Even with the best technology and policies in place, you still have ghoulish humans involved in using and maintaining your systems.
We need to make sure we put in detailed plans and procedures to reduce the risk of human error. Some examples we follow:
Let’s not forget that our primary purpose is to help users do their jobs. We can’t lock our systems in the dungeon and let security get in the way of productivity, otherwise a user will find a workaround. They always do.
This is especially true in a tech company, filled with very technically savvy people. When these little devils are involved, you can guarantee you will lose the battle of wills against them if you try to block how they want to work.
There unfortunately is no witches brew to magically make people experts and it’s no secret that there is a shortage of people in this industry. Building expertise takes time, investment, and a genuine willingness to nurture people into the roles they need to grow into and that’s something most organisations are not willing to do.
At SEP2 we invest heavily in our people because we know that even the best technology and policies are only as strong as the humans behind them. That means:
Our internal training is designed to boost the overall skillset of our teams, while also increasing their awareness of emerging threats that could affect both our organisation and our customers. Emerging threats such as supply chain phishing are becoming more prevalent, so we make sure our teams know what to spot before those threats ever become a problem.
Risks come in all sorts of shapes and sizes. Some are obvious, others hide in the shadows. By preparing for risks before they happen, we can reduce both the chances of them occurring and the impact if they do.
At SEP2, we identify risks across our people, processes, and technology. However, even with all the right protections, sometimes things still go bump in the night. That’s why we’ve created incident response playbooks for every risk we’ve recognised. And more importantly, we take a lessons-learned approach. If something does go wrong, we ask: how can we do better next time? Because the real horror story is repeating the same mistake twice.
I hope after reading through this, you feel more confident about how seriously SEP2 takes threats (hopefully all the Halloween jokes don’t make you think otherwise!), especially the ones that don’t always announce themselves.
Here’s the real question: are all of your other partners doing the same?
I think everyone should be challenging their supply chain to prove they’re trustworthy and not just a villain in disguise.
Anyone with access to your organisation’s systems or data should be held to a few basic tenets:
The supply chain apocalypse is not guaranteed. We’re not doomed to live in this haunted house forever. Together, we can push back against these latest threats. Not with silver bullets, but with smart decisions, strong partnerships, and a shared commitment to doing better.
07/10/2025
At SEP2, we’re passionate about nurturing new talent and helping individuals discover their potential in the cyber security field.
17/09/2025
Cyber security work experience is more than just a week in the office. It’s a chance to explore the real-world…
05/09/2025
Discover how SEP2’s ESG Committee is driving impactful change for a sustainable future through ethical practices and governance.