Sign-up for a RiskTree trial >>

What we do

When you mix a fierce intelligence with curiosity and the highest level of cyber security experience you get a team that is able to address the most complex and fast moving cyber risks in new ways. Ways that combine clarity and understanding with a forthright and pragmatic approach towards security architecture, risk management and security monitoring.

We use a mix of tools to achieve this: Risk Analysis, Security Review, Security Architecture and Security Monitoring.

“2T Security took on board my mission and internalised it. Conversations were about what did we need to do, not what I was paying them to do or what they were contracted to do!”

Why 2T Security?

We are the independent experts on your side. We exist to tackle the most complex and critical situations. In the midst of constantly changing risk we bring calm and understanding, solid experience and the safest pair of hands.

CPU 5G Circuit Board Background


RiskTree puts you on the front foot. It is a unique piece of software that distills complex evolving risks into clear components that can be visualised, analysed, and understood by technical and non-technical teams.


Our experience has shaped our expertise. We pride ourselves on turning the most complex critical risks into clear, actionable processes. Much of the high level work we do for government departments isn’t sharable online. Here are a few case studies that we are able to talk about publicly.

NHS Test and Trace kits

Test and Trace

Supporting the Test and Trace Programme.

Department for Work and Pensions

Security programme

Enabling DWP to operate its business and online services securely as part of a multi-million transformation.

Latest Insights

Change is constant in our world. Keeping pace with new thinking and practices is a given. This is a chance to explore a range of different ideas from industry experts.

From Lecture Theatre to Cyber Frontlines: Read about how two of our early careers team managed the transition from Computer Science Graduate to Junior Cybersecurity Consultant.
Probability/impact graphs have been used for a long time to assess risk, especially in spreadsheet-based risk registers. They give a misleading impression of risk levels though and hence organisations should be using alternative, and better approaches.
Tony Badsey-Ellis receiving his chartered cyber security professional certificate
The UK Cyber Security Council ushered in the UK's first cohort of chartered cyber security practitioners this October. This followed the launch of its first pilot schemes last year, with an awards ceremony taking place in London. Tony Badsey-Ellis and Tony Beadle from 2T Security were among the first 40 to gain chartered status.