Government security consists of four areas
Explore each area by clicking on the tiles below.

Cyber
Protecting information systems, the data on them and the services they provide, from unauthorised access, harm or misuse:

Personnel
Mitigating the risk of our trusted people exploiting their legitimate access to an organisation’s assets for unauthorised purposes:

Physical
Protecting physical assets, including people, services, infrastructure, systems, places, equipment and networks:

Technical
Holistically protecting sensitive information and technology from close access acquisition by hostile threat actors, as well as from any other form of technical manipulation.
Next Event
GSP bitesize session: What’s the difference between threat and risk?
October 14, 2025
This is restricted content. (Sign in required)
