Context Information Security

Context v4


Address: 8th Floor Westferry House
11 Westferry Circus
E14 4HD
Haus 9, Eingang 5, Ebene 3
45131 Essen
Ernst-Ludwig-Ring 2
61231 Bad Nauheim
Telephone: +44 (0)20 7537 7515 +49 (0)201 8777 8550 +49 (0)603 2949 7917
Email: [email protected] [email protected] [email protected]
Contact: Victoria Martinelli Sven Schlueter Steve Matthews
Address:  Suite 5079
5th Floor
25 Broadway
New York NY10004
 4/155 Queen Street
Victoria 3000
3 Spring Street
New South Wales 2000
Telephone: +1 917 880 3130 +61 1300 565 352 +61 1300 565 352
Email: [email protected]
[email protected]
[email protected] [email protected]
[email protected]
Contact: Max Deighton
Ranulf Green
 Terry Swan Kirk Stephen
Lukasz Gogolkiewicz

Context is a highly skilled cyber security consultancy that supports organisations to meet their ever evolving information security challenges.  We provide specialist consultancy services that include cyber strategy and advisory, penetration testing, incident response and investigations, and technical security research.

Established in 1988, Context has a client base that includes many high profile blue chip companies, alongside public sector and government organisations.  An exceptional level of technical expertise underpins all of our services while a detailed and comprehensive approach helps clients to attain a deeper understanding of security vulnerabilities, threats or incidents.


Penetration Testing

Contact: Owen Wright
+44 (0)20 7537 7515
[email protected]

Context’s security testing services are trusted by our clients – high profile organisations and Government institutions. We provide a full-range of penetration-testing and technical security assessment services; CHECK and CREST-approved application and infrastructure penetration-testing, as well as mobile application and device assessments, device security reviews and bespoke testing; mirroring techniques used by real-world attackers. Context’s capability is delivered by skilled consultants in the UK, Germany, USA and Australia, backed by continual service development and cutting-edge research.

CREST Qualified Consultants:
Practitioner Security Analysts:  Yes
Registered Penetration Testers:  Yes
Certified Web Application Testers:  Yes
Certified Infrastructure Testers:  Yes
Certified Wireless Testers:  No

Simulated Target Attack & Response (STAR) Penetration Testing

Contact: Owen Wright
+44 (0)20 7537 7515
[email protected]

When performing intelligence-led penetration testing, Context use specialist Threat Intelligence and real data about attackers’ tactics and techniques, gathered from our Response team and elsewhere.  We perform focused, realistic exercises mapped to sophisticated attacks.  STAR assessments allow Context to test an organisation’s capability to prevent, detect and respond to targeted attacks.  Context was also privileged to assist with the development of the technical and risk management approaches used for STAR, CBEST and other similar schemes.

CREST Qualified Consultants:
Certified Simulated Attack Managers:  Yes
Certified Simulated Attack Specialists:  Yes

Simulated Target Attack & Response (STAR) Threat Intelligence

Contact: Dave Spence
+44 (0)7886 753209
[email protected]

Context’s threat services are focused on providing high-end intelligence and assessment for organisations and entities at the most risk from advanced persistent threat groups. We can conduct independent bespoke threat research, malware reverse engineering, provide targeted technical and tactical intelligence, as well as operational and strategic assessments that can be used by clients, responders, investigators, and red teams.

CREST Qualified Consultants:
Registered Threat Intelligence Analysts: No
Certified Threat Intelligence Managers: Yes

Cyber Security Incident Response

Contact: Dave Spence
[email protected]  / [email protected]

Context is a Cyber Incident Response scheme company experienced in providing a full range of threat detection, investigation management, forensics, response and protection services.  Context handles incident response and incident management requirements for organisations of all sizes, from the largest and most complex breaches for FTSE100 organisations, down to SMEs for whom the incident is still of absolute criticality.  Context Response consultants will work with you to fully understand the issues and propose the most appropriate solution.

CREST Qualified Consultants:
Registered Intrusion Analysts:  No
Certified Network Intrusion Analysts:  No
Certified Host Intrusion Analysts:  No
Certified Malware Reverse Engineers:  No
Certified Incident Managers:  No

Security Architecture

CREST Qualified Consultants:
Registered Technical Security Architects:  Yes

Cyber Essentials

To find out more about our Cyber Essentials service, please click here.