Est. 2026 · London
Senior security advisory hello@lodestarcyber.co.uk
How we work

Security that serves the business.

We have spent our careers watching security teams create friction — building empires of policy, blocking products, and presenting boards with threat landscapes designed to alarm rather than inform. That is not what we do.

Good security is quiet.

When security is working, nothing happens. There is no breach, no regulatory notice, no difficult conversation with a customer. The absence of incident is the success metric. We design programmes that are robust enough to hold and unobtrusive enough to let people do their jobs.

That means right-sizing controls to actual risk, not theoretical worst cases. It means policies your staff will read, not documents written to satisfy an auditor.

We stay commercially aware.

Security cannot be assessed in isolation from the business. A control that costs £200,000 a year to maintain while protecting an asset worth £50,000 is not good security — it is poor judgement dressed up as diligence.

We understand how businesses operate, how deals work and how investors think. Our recommendations are proportionate, commercially framed, and designed to accelerate the business rather than slow it down.

We write and speak plainly.

The security industry has a language problem. Acronyms, vendor jargon and manufactured urgency have made it difficult for non-technical leaders to make informed decisions. That is not an accident — complexity favours the supplier.

Every report we write, every board presentation we give, is designed to be understood by a founder or CEO with no security background. If we cannot explain a risk in plain language, we have not understood it well enough ourselves.

We remain accountable.

Consultants who parachute in, present findings and disappear bear no responsibility for what happens next. We stay in the engagement. If a recommendation does not land, we adapt it. If circumstances change, we respond.

On a fractional CISO retainer, we own the outcome. We do not outsource the uncomfortable conversations or the difficult trade-offs. We are the security leader, for as long as the engagement runs.

How an engagement begins

i.

Discovery call

Thirty minutes, no slides. We want to understand your business, your current security posture and what you are trying to solve. You want to understand whether we are the right fit. It is a conversation, not a pitch.

ii.

Scope & proposal

We produce a short, plain-language proposal: what we will do, how we will do it, and what it will cost. No lengthy statements of work. No hidden escalation paths. The price is the price.

iii.

Engagement begins

We move quickly. On a fractional retainer, you typically have a strategy session and a first deliverable within the first fortnight. On a programme review, we are in the environment within a week of signature.

“Security advice that cannot be understood cannot be acted on. That is not the client’s problem.”
— A working principle

Interested in working together?

The first conversation costs nothing and commits you to nothing.

Arrange a call