Working closely with technical leads, we ran in-depth workshops to map end-to-end architectures, operating processes and security controls. Using the National Cyber Security Centre’s CAF, we held frank, constructive discussions that surfaced strengths, gaps and planned investments across each organisation.