Nick is a Cyber Security Consultant, CISSP qualified, combining over five years of Cyber Security experience in a variety of sectors, including three in the Smart Energy space. Nick is involved in delivering cyber security implementation projects to many clients across multiple sectors, including Critical National Infrastructure. He provides recommendations on both information and cyber security as well as providing executive risk management support from initial asset discovery to deploying risk treatment strategies and controls. Nick works with clients to strengthen their organisational cyber security processes and procedures. Furthermore, he is an expert practitioner in ISO27001 implementation, performing ISO27005 aligned risk assessments and governance.
Nick previously led the Security team for the Smart Energy Code Administrator and Secretariat (overseeing the parties in GB’s Smart Metering roll out), which established standards and processes for smart data sharing. A key part of this role included managing relationships with senior stakeholders within the energy industry, and benchmarking against industry best practice.
Share this page
Latest Thoughts By Nick Blake
Why does your cyber security strategy need to include OT?
Good Password Management: Why should you care?
Stop the count! Cyber risk delays Conservative leadership vote
Deep Fakes are real. How Art and Music are having an impact on Data Protection and Cyber Security
The NCSC is calling on British organisations to bolster their online defences
Manage Cookie Consent
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.