๐Ÿ“ London ยท Engagements UK & EU-wide
EST. 2020 ยท CYBERSECURITY ยท GRC ยท LONDON

When the regulator asks the question, we've already answered it.

ThePenz is a London-based cybersecurity advisory built by senior practitioners with careers inside FCA-regulated banks, building societies and fintechs. We deliver provable security, defensible compliance and board-ready governance โ€” without the consultancy theatre.

Years in regulated FS 6+
Specialist service lines 11
ISMS document library 54
CE+ first-time pass 100%
Sr. certifications CISSP ยท CISM ยท CISA
โ— ISO 27001:2022 โ— PCI DSS v4.0 โ— NIST CSF 2.0 โ— NCSC Cyber Essentials Plus โ— UK GDPR โ— DORA โ— FCA / PRA โ— SOC 2 Type II โ— NIS2 Directive โ— ISO 27017 / 27018 โ— ISO 27001:2022 โ— PCI DSS v4.0 โ— NIST CSF 2.0 โ— NCSC Cyber Essentials Plus โ— UK GDPR โ— DORA โ— FCA / PRA โ— SOC 2 Type II โ— NIS2 Directive โ— ISO 27017 / 27018
ยง01
Why ThePenz

A specialist firm. Built to the standard our clients are held to.

We're not a generalist tech firm with a security practice bolted on. We are career insiders of FCA-regulated banks, building societies and fintechs โ€” who chose to consult on our own terms. The four principles below are how we run every engagement.

No. 01

Senior delivery, always

Our principals deliver the work themselves. The person who scopes the engagement is the same person you'll meet on day one โ€” and the day after that. You don't pay senior rates for graduate output.

No. 02

Vendor neutrality

We take no referral fees, accept no partner kickbacks, and hold no exclusive vendor reseller agreements. The recommendation we make is the recommendation we believe in.

No. 03

Regulator-aware

Direct experience under FCA, PRA, BoE, ICO and PSR scrutiny. We know what regulators actually look for, what triggers second questions, and how to write evidence that survives both an audit and a Skilled Persons review.

No. 04

Boardroom-fluent

We translate cyber risk into pounds, regulation into priorities, and findings into board narratives. Whether the audience is a CRO, an audit committee or the FCA, we write to that audience โ€” not to a template.

ยง02
Services

Eleven specialist disciplines. One uncompromising standard.

Each service line solves a specific problem regulated firms face. Engage one to address an immediate gap, or layer them into a multi-quarter security programme. Every engagement ships measurable, evidenced artefacts.

No. 01

ISO 27001:2022 Implementation

End-to-end ISMS implementation with our 54-document library. Stage 1 / Stage 2 ready in 14โ€“20 weeks with a UKAS-accredited certification body of your choice.

Read more โ†’
No. 02

PCI DSS v4.0 Compliance

Gap analysis, scoping, evidence rooms and remediation engineering for merchants and service providers across SAQ Aโ€“D and Levels 1โ€“4.

Read more โ†’
No. 03

Cyber Essentials & CE+

IASME-aligned application packs, hardening recommendations, and CE+ on-site assessment readiness โ€” first-time pass rate of 100%.

Read more โ†’
No. 04

Vulnerability Scanning

Authenticated scans, CVE matching, version-fingerprinting and confidence-scored false-positive triage โ€” powered by our in-house VulnScan Pro engine.

Read more โ†’
No. 05

Phishing Simulation

Realistic, sector-tailored campaigns. Behavioural metrics. Adaptive learner journeys. Measurable change quarter-on-quarter โ€” not just an annual click-rate number.

Read more โ†’
No. 06

Risk Assessment

ISO 27005, NIST RMF and FAIR-aligned. Threat modelling with STRIDE and PASTA. Quantified findings expressed in ยฃ loss exposure your CRO can defend.

Read more โ†’
No. 07

CQUEST Reviews

Bank of England baseline reruns. Gap-to-target analysis with proportionality justification. Quick-win roadmaps that don't depend on multi-year infrastructure projects.

Read more โ†’
No. 08

GRC Solutions

Vendor-neutral GRC tooling rationalisation. Control libraries spanning ISO/NIST/PCI/SOC2. Risk registers, evidence automation and management dashboards.

Read more โ†’
No. 09

Policy Creation & Support

Concise, version-controlled policies mapped to ISO Annex A, NIST CSF, FCA SYSC, PRA SS1/21, DORA and UK GDPR. Policies people actually read.

Read more โ†’
No. 10

Report Writing

Board packs, findings reports, regulatory submissions, incident post-mortems. Written to the audience โ€” not to a template. We rescue reports too.

Read more โ†’
No. 11

Cyber Awareness Training

Role-based programmes for executives, developers, finance and frontline staff. Live workshops, micro-learning, in-flow nudges. Behaviour change, not box-ticking.

Read more โ†’
โ†’

Full service catalogue

Detailed service pages with scopes, deliverables, methodologies and sample timelines for each of our eleven disciplines.

Browse all โ†’
โ€” From the field โ€”
"ThePenz delivered our ISO 27001 readiness pack in weeks. Policies that fit the business. Working artefacts, not slide decks. They're the rare consultancy your audit committee wants in the room โ€” and we'll be calling them again."
Head of IT & Change ยท UK Building Society ยท 2026
ยง03
Methodology

Four phases. No surprises.

A consistent, transparent methodology refined over a decade of regulated-industry delivery. Every engagement follows the same four phases โ€” what changes is the depth, not the structure.

i.

Discover

Scoping workshops, asset inventories, stakeholder interviews. We understand your reality before we touch your roadmap.

  • Stakeholder interviews
  • Asset & data inventory
  • Regulatory mapping
  • Existing-control review
ii.

Diagnose

Gap analysis against the relevant standard. Threat modelling. Quantified findings register with severity, owner and remediation effort.

  • Control gap analysis
  • STRIDE / PASTA modelling
  • ยฃ-quantified findings
  • Remediation roadmap
iii.

Deliver

Policy drafting, control engineering, scanner deployment, training rollouts. Executed on a published cadence with weekly checkpoints.

  • Policies & procedures
  • Control implementation
  • Programme management
  • Audit-ready evidence
iv.

Defend

Continuous assurance: managed scans, simulated phishing, regular reviews, board-grade reporting dashboards.

  • Continuous monitoring
  • Quarterly reviews
  • Board reporting
  • Annual recertification
ยง04
Industries

Built for regulated environments.

Most of our work happens where the stakes โ€” and the regulators โ€” are highest. We bring sector-specific frameworks, vocabulary and audit experience to every engagement.

ยง05
Research

Field notes from the front line.

Templates, frameworks, and field-tested guides we use on real engagements. No gated content, no sales follow-up โ€” just useful material, because the security community is better when we share.

Tell us what's on the agenda.

No discovery call gauntlet. No qualification rep. A practitioner will respond within one working day to schedule a 30-minute scoping call โ€” at no cost, with no obligation.