Episode 54: Summary of cyber
- Embedded IT

- Aug 25
- 2 min read
Updated: Dec 16
Closing out the cyber security series
This episode marks the final in the cyber security series, filmed after several hours on an electric boat, complete with unpredictable weather, a low battery warning, and a well-timed stop at a pub. While light-hearted in setting, the discussion brings together everything covered across the series to give a practical overview of cyber security from a procurement perspective.
Cyber security is a huge topic, and this series has only scratched the surface. The aim has been to provide useful context, explain why cyber matters, and highlight the complexity organisations face when making decisions in this space.
A practical view of what cyber security really is
The series explored the background and evolution of cyber security, helping to explain how it has grown into such a broad and critical area. Rather than focusing on fear or headlines, the emphasis has been on understanding cyber as a set of practical controls and decisions that need to be managed sensibly.
This includes recognising that cyber security is not a single product, but a combination of tools, services, and ongoing management.
Understanding different types of cyber security purchases
A key part of the discussion focused on the main categories of cyber security buying, including network security, endpoint security, and related controls. Each type plays a different role, and understanding what they do helps avoid buying overlapping tools or missing important gaps.
The series aimed to demystify these categories so technology and procurement teams can have more informed conversations internally and with suppliers.
Products, services, and who to buy from
Another important theme was the services wrapped around cyber security purchases. This includes deciding whether to buy through a reseller, work with a managed security service provider (MSSP), or manage tools internally.
These decisions have a big impact on cost, capability, and risk, and there is no one-size-fits-all answer. The right approach depends on internal skills, appetite for risk, and how critical the systems are.
Looking ahead to what’s next in cyber
We also briefly touched on future changes in the cyber landscape, including quantum computing and the potential impact on encryption. While still emerging, these developments reinforce why cyber security needs to be treated as an ongoing strategy, not a one-off purchase.
Wrapping up the series
Alongside the technical discussion, the series benefited from additional perspectives, reinforcing the value of bringing expert voices into cyber conversations. Feedback, debate, and shared experience all help improve decision-making in this fast-moving area.
For organisations looking to take a more structured and informed approach to cyber security procurement, get in touch.

