Context Information Security



Address: Context – London
8th Floor Westferry House
11 Westferry Circus
E14 4HD
Context – Cheltenham
Corinth House
117 Bath Road
GL53 7LS
Context – Scotland
24 Canning Street
Telephone: +44 (0)20 7537 7515  +44 (0)20 7537 7515 +44 (0)131 285 1505
Email: [email protected]  [email protected] [email protected]
Contact: Owen Wright  Owen Wright Owen Wright



Address: Context – Germany
Ernst-Ludwig-Ring 2
61231 Bad Nauheim
Context – USA
Suite 5079
9th Floor
25 Broadway
New York
Context – Australia
4th Floor
155 Queen Street
Victoria 3000
Telephone: +49 (0)603 2949 7917 +1 917 880 3130 +61 1300 565 352
Email: [email protected] [email protected]
[email protected]
[email protected]
Contact: Sven Schlueter Max Deighton
Ranulf Green
Terry Swan


Context is a highly skilled cyber security consultancy that supports organisations to meet their ever evolving information security challenges.  We provide specialist consultancy services that include cyber strategy and advisory, penetration testing, incident response and investigations, and technical security research.

Established in 1988, Context has a client base that includes many high profile blue chip companies, alongside public sector and government organisations.  An exceptional level of technical expertise underpins all of our services while a detailed and comprehensive approach helps clients to attain a deeper understanding of security vulnerabilities, threats or incidents.


Penetration Testing

Contact: Owen Wright
+44 (0)20 7537 7515
[email protected]

Context’s security testing services are trusted by our clients – high profile organisations and Government institutions. We provide a full-range of penetration-testing and technical security assessment services; CHECK and CREST-approved application and infrastructure penetration-testing, as well as mobile application and device assessments, device security reviews and bespoke testing; mirroring techniques used by real-world attackers. Context’s capability is delivered by skilled consultants in the UK, Germany, USA and Australia, backed by continual service development and cutting-edge research.

CREST Qualified Consultants:
Practitioner Security Analysts:  Yes
Registered Penetration Testers:  Yes
Certified Web Application Testers:  Yes
Certified Infrastructure Testers:  Yes
Certified Wireless Testers:  No

Simulated Target Attack & Response (STAR) Penetration Testing

Contact: Owen Wright
+44 (0)20 7537 7515
[email protected]

When performing intelligence-led penetration testing, Context use specialist Threat Intelligence and real data about attackers’ tactics and techniques, gathered from our Response team and elsewhere.  We perform focused, realistic exercises mapped to sophisticated attacks.  STAR assessments allow Context to test an organisation’s capability to prevent, detect and respond to targeted attacks.  Context was also privileged to assist with the development of the technical and risk management approaches used for STAR, CBEST and other similar schemes.

CREST Qualified Consultants:
Certified Simulated Attack Managers:  Yes
Certified Simulated Attack Specialists:  Yes

Simulated Target Attack & Response (STAR) Threat Intelligence

Contact: Dave Spence
+44 (0)20 7537 7515
[email protected]

Context’s threat services are focused on providing tailored intelligence that is both actionable and understandable. We pride ourselves on adding value, going beyond simply rehashing open source reporting and our clients span CNI, Government, Engineering, Aerospace and Defence, Financial Services and Technology. We specialise in tracking nation state and sophisticated criminal actors targeting these sectors and their most critical business assets.

CREST Qualified Consultants:
Practitioner Threat Intelligence Analysts:  Yes
Registered Threat Intelligence Analysts: Yes
Certified Threat Intelligence Managers: Yes

Cyber Security Incident Response

Contact: Dave Spence
[email protected]  / [email protected]

Context was a founding member of the UK NCSC CIR Scheme and we have been responding to complex attacks against networks of national significance since 2005. We are technology agnostic, working with clients from diverse industries from space to local government. Our team is comprised of deeply technical analysts with a track record of engineering solutions where others fail.

CREST Qualified Consultants:
Practitioner Intrusion Analysts:  No
Registered Intrusion Analysts:  No
Certified Network Intrusion Analysts:  No
Certified Host Intrusion Analysts:  Yes
Certified Malware Reverse Engineers:  No
Certified Incident Managers:  Yes

Security Architecture

CREST Qualified Consultants:
Registered Technical Security Architects:  Yes

Cyber Essentials

To find out more about our Cyber Essentials service, please click here.