
TECHNOLOGY
Our Unique Solution
10x10 (UK)

The UK Government’s 10 Point Plan is dependent on innovative technological solutions.
Technological solutions already carry significant amounts of formally accepted risk.
We know this from our specialist experience in this sector, spanning the last 3 decades
If the UK is going to meet its climate change & biodiversity loss targets, a new approach is needed.
Our platform utilises our expertise & skills in systems security and cyber to mitigate our priority risks.
Simple Scenario
Company Z creates a ClimateTech solution.
Company Z claims the purpose of their technology is aligned with:
​
-
Point 8: Investing in Carbon Capture, Usage & Storage.
-
Risk N5 Natural Environment and Assets:
-
Risks and opportunities for natural carbon stores, carbon sequestration from changing climatic conditions, including temperature change and water scarcity.
-
We test, evaluate and validate Company Z's claims that their technology meets Point 8 and Risk N5 and that the product is:
-
Safe
-
Secure and
-
Performs as promised.


10 POINT PLAN
GREEN INDUSTRIAL REVOLUTION
The UK Government’s 10 Point Plan will mobilise £12 billion of government investment with potentially three times as much from the private sector by 2030; create and support up to 250,000 green jobs; plant 30,000 hectares of trees a tear by 2025, rewild 30,000 football pitches worth of countryside and accelerate our path to net zero by 2050

10 POINT PLAN

POINT 1
ADVANCING OFFSHORE WIND

POINT 2
DRIVING THE GROWTH OF LOW CARBON HYDROGEN

POINT 3
DELIVERING NEW AND ADVANCED NUCLEAR POWER

POINT 4
ACCELERATING THE SHIFT TO ZERO EMISSION VEHICLES

POINT 5
GREEN PUBLIC TRANSPORT, CYCLING AND WALKING

POINT 6
JET ZERO AND GREEN SHIPS

POINT 7
GREENER BUILDINGS

POINT 8
INVESTING IN CARBON CAPTURE, USAGE AND STORAGE

POINT 9
PROTECTING OUR NATURAL ENVIRONMENT

POINT 10
GREEN FINANCE AND INNOVATION

10 STEPS
to Cyber Security
UK's Authority on Information Assurance
NCSC | Part of GCHQ
STEP 1
RISK MANAGEMENT
STEP 2
ENGAGEMENT AND TRAINING
STEP 3
ASSET MANAGEMENT
STEP 4
ARCHITECTURE AND CONFIGURATION
STEP 5
VULNERABILITY MANAGEMENT
STEP 6
IDENTITY AND ACCESS MANAGEMENT
STEP 7
DATA SECURITY
STEP 8
LOGGING AND MONITORING
STEP 9
INCIDENT MANAGEMENT
STEP 10
SUPPLY CHAIN SECURITY