• Introduction
  • Leadership Obligation 1: People
  • Leadership Obligation 2: Process
  • Leadership Obligation 3: Technology


SBL are a UK based Cyber Security Reseller and Managed Service Provider, entrusted by the UK Government to hold the highest classifications of data in our secure accredited facility. We work with the best global vendors to bring world leading solutions to our customers. We specialise in security as an Eco-System, integrating your existing solutions to create a command and control approach to combating your threats.

SBL have built market ready solutions for healthcare leadership to transition to a cyber-healthy state based on the new 10 Leadership Standards published earlier this year.

SBL have built market ready solutions for healthcare leadership to transition to a cyber-healthy state based on the new 10 Leadership Standards published earlier this year.

Leadership Obligation 1: People

Ensure staff are equipped to handle information respectfully and safely, according to the Caldicott Principles.


•Data Security Standard 1 - All staff ensure that personal confidential data is handled, stored and transmitted securely, whether in electronic or paper form. Personal confidential data is only shared for lawful and appropriate purposes

•Data Security Standard 2 - All staff understand their responsibilities under the National Data Guardian’s Data Security Standards, including their obligation to handle information responsibly and their personal accountability for deliberate or avoidable breaches.

•Data Security Standard 3 - All staff complete appropriate annual data security training and pass a mandatory test, provided through the revised Information Governance Toolkit.

IBM can support health care staff to better understand their responsibilities for handling sensitive data

Evaluation and recommendations for better management of risks, compliance and governance

Risk Management and Compliance Services help you evaluate your existing security practices—including payment card industry (PCI) security, identity and IT regulatory compliance needs and gaps— against your business requirements and objectives. Our skilled security specialists provide recommendations to help you make more informed decisions about allocating your resources to better manage security risks and compliance. We can deliver a wide range of capabilities—from security program development, to regulatory and standards compliance, to security education and training.

Expertise Our security consultants, managed security services, and cloud-based security services offer a broad range of security expertise

Best practices We provide an objective evaluation of your security controls, mechanisms and goals, based on proven best practices

Actionable plans We help you develop an actionable plan for optimizing IT resources and better managing for compliance 

Leadership Obligation 2: Process

Ensure the organisation proactively prevents data security breaches and responds appropriately to incidents or near misses.

•Data Security Standard 4 - Personal confidential data is only accessible to staff who need it for their current role and access is removed as soon as it is no longer required. All access to personal confidential data on IT systems can be attributed to individuals.

•Data Security Standard 5 - Processes are reviewed at least annually to identify and improve processes which have caused breaches or near misses, or which force staff to use workarounds which compromise data security.

•Data Security Standard 6 - Cyber-attacks against services are identified and resisted and CareCERT security advice is responded to. Action is taken immediately following a data breach or a near miss, with a report made to senior management within 12 hours of detection.

•Data Security Standard 7 - A continuity plan is in place to respond to threats to data security, including significant data breaches or near misses, and it is tested once a year as a minimum, with a report to senior management.

IBM can support the health care sector with the improvement of cyber security Processes

Prepare and more quickly respond to security threats and incidents

IBMs Cybersecurity Assessment and Response services are designed to help you prepare for and more rapidly respond to an ever-growing variety of security threats. Our seasoned consultants deliver cybersecurity assessments, planning and response services, with proven expertise from mainframe to mobile.

Helps assure always-current best practices and insight, providing security review and protection for the "Internet of Things"

Delivers on-site response time of less than 24 hours to help stop attacks in progress and reduce potential impact

Enables cost savings by helping to reduce business disruption and facilitating better regulatory compliance management 

Leadership Obligation 3: Technology

Ensure technology is secure and up-to-date

•Data Security Standard 8 - No unsupported operating systems, software or internet browsers are used within the IT estate.

•Data Security Standard 9 - A strategy is in place for protecting IT systems from cyber threats which is based on a proven cyber security framework such as Cyber Essentials. This is reviewed at least annually.

•Data Security Standard 10 - IT suppliers are held accountable via contracts for protecting the personal confidential data they process and meeting the National Data Guardian’s Data Security Standards.

IBM can support the health care sector with proven cyber security technology

Custom security solutions to help protect your data against internal and external threats

Data security services incorporates a risk-balanced strategy along with leading data protection technology to more cost effectively help safeguard your organization's critical data. We help optimize your level of control by providing both consulting services to establish your data protection strategy and implementation and integration services using market-leading loss prevention and encryption technologies.

Streamlined approach Helps optimize your investments in leading security technology by using your existing infrastructure to support collaboration across your enterprise

Data protection strategy Aligns with your risk management objectives and provides insight into where sensitive data resides and how it is used

Risk mitigation Reduce the risk of data loss and better manage regulatory compliance

Find Out More

Get a Quote

Call Me Back

Enquiry Form