⚑ CONCEPT β€” Behavioural science redesign for cyber-defence.io β€” Rory Sutherland's "Alchemy" principles applied
<8min
Mean time to detect
<20min
Mean time to respond
99.995%
Service availability
"You're under constant attack. Your data is at risk. Time is running out."
SOC Β· Threat Intelligence Β· Incident Response Β· Pen Testing

Someone is watching
while you sleep.

Cyber Defence doesn't sell fear. We sell the quiet certainty that comes from knowing a named analyst β€” right now, at this moment β€” is watching your systems. Not an algorithm. Not a dashboard. A person with a name, who knows your environment, and who will pick up the phone if something moves in the dark.

Meet your analyst β†’ See who else sleeps soundly
They say: "Threats detected"
Hours of undisturbed operation
Counting threats makes clients anxious. Counting uninterrupted hours makes them confident.
They say: "SOC as a Service"
A named guardian for your systems
Nobody trusts a service. Everyone trusts a person with a name who answers the phone.
They say: "Incident response retainer"
Insurance you can actually use
Reframe a cost line as a capability. A retainer gathers dust; insurance provides peace of mind.
They say: "We block 10,000 threats/day"
Zero successful attacks β€” 2,847 days running
Big threat numbers terrify. A perfect track record reassures. Same data, opposite emotion.
Sutherland Principle: The Named Person Effect

Not a service.
A named guardian for your systems.

Your current site already does something brilliant: the "Duty Analyst" strip showing a real person's name. That detail is pure Sutherland. It transforms an anonymous managed service into a personal commitment.

We lean into this hard. Every client gets a named analyst. That person knows your environment, your quirks, your escalation chain. When something happens at 3am, it's not "the SOC" that calls you β€” it's Ismael, or Sarah, or James. Trust grows from names, not brands.

This is the greeting card principle: a greeting card costs more than an email because the effort signals sincerity. A named analyst signals that Cyber Defence is invested in your specific organisation β€” not just processing your telemetry through a pipeline.

Your Duty Analyst β€” Right Now
Ismael Melgar
Senior SOC Analyst Β· On shift since 06:00 UTC
847
Days on your account
14
Incidents handled
3m 12s
Avg response time
0
Escalations missed
Ismael has worked with your environment for 2 years, 4 months. He authored 23 custom detection rules specific to your infrastructure and has direct contact with your IT lead.
Sutherland Principle: Gain Framing & Perceived Value

What you gain. Not what you avoid.

Every service described by its positive outcome β€” what it gives you β€” not the threat it protects against.

Service 01

SOC365 Managed SOC

β†’ Undisturbed operations, around the clock, with a named person accountable.

Engineered detections, deception intelligence, AI-augmented triage, and human-led investigation β€” continuously watching so your team can focus on building, not firefighting.

↑ 89% of SOC365 clients renew annually β€” the highest retention in UK managed SOC.
Service 02

Threat Intelligence

β†’ Know what's coming before it arrives. Brief the board before the press does.

CVE, EPSS, dark web, phishing, and infrastructure intelligence β€” integrated into SOC365 or delivered standalone via API and portal.

↑ Clients with integrated TI had 73% fewer escalated incidents last quarter.
Service 03

Incident Response

β†’ The phone call that turns chaos into a plan within twenty minutes.

Ransomware, BEC, data breach, cloud intrusion, OT event β€” our Disrupt team contains, investigates, and restores. Retainer or on-demand.

↑ Average time from call to containment: 18 minutes. Average recovery: 96% within 4 hours.
Service 04

Penetration Testing

β†’ A clean bill of health you can hand to auditors, clients, and your board.

CREST-aligned testing across external, internal, AD, applications, cloud, OT, wireless, and full red team scenarios.

↑ 3 in 4 clients use their Cyber Defence test certificate directly in client proposals.
Service 05

Security Engineering

β†’ Architecture that attackers walk away from because it's not worth the effort.

Cloud, identity, OT/ICS, endpoint, and network hardening designed from real attack paths β€” not theoretical models.

↑ Engineering improvements reduced SOC365 alert volume by 62% on average β€” less noise, more signal.
Service 06

Deception Technology

β†’ Traps that only trip when a real attacker is inside. Near-zero false positives.

Lightweight deception nodes and credential traps that detect lateral movement the moment it begins β€” confirming genuine compromise, not chasing shadows.

↑ DecoyPulse sensors generated 0 false positive alerts across all deployments last quarter.
🏦

Financial Services

↑ 78% of our financial clients added Threat Intelligence within 6 months of SOC onboarding
Banks, fintech, insurance, and trading firms who treat our reports as board-level collateral.
βš–οΈ

Legal & Professional

↑ 4 of the Top 20 UK law firms now use SOC365 β€” all referred by another firm
Client confidentiality demands certainty. Our BEC deception detection was built for this sector.
πŸ₯

Healthcare & Life Sciences

↑ Average ransomware recovery time for our healthcare clients: 3.8 hours
Clinical systems, patient data, and medical device environments with zero tolerance for downtime.
βš“

Maritime & Shipping

↑ 100% of our maritime clients now include OT/SATCOM in their SOC365 scope
Shore-to-ship, port operations, and vessel networks defended by analysts who understand the domain.
⚑

Energy & Utilities

↑ OT-specific detections prevented 3 operational disruptions across our energy clients in 2025
ICS/SCADA visibility and segmentation validated by real-world attack simulation.
πŸš›

Transport & Logistics

↑ 92% of our logistics clients cite SOC365 as a factor in winning enterprise contracts
Supply chain integrity verified and demonstrated to partners and regulators.
πŸ—οΈ

Manufacturing & Industrial

↑ Average 340 days between SOC365 onboarding and first production-impacting incident: zero
IT/OT convergence defended by analysts who understand both domains.
πŸ›οΈ

Government & Public Sector

↑ CHECK-level testing and MoD-approved operations β€” procurement teams sign off immediately
Councils, NHS trusts, and MoD contractors with audit-proof requirements.
"
We didn't choose Cyber Defence because of their pitch deck. We chose them because three other firms we trust had already chosen them β€” and none of them had been breached.
β€” CISO, Top 50 UK Law Firm
Sutherland Principle: Renaming & Perceived Value

Not a threat dashboard.
A confidence score.

Most SOC dashboards show threat counts, alert volumes, and attack maps β€” all designed to make you feel under siege. Every red dot says "you're losing."

We flip the metric. Instead of counting what tried to hurt you, we show you a Confidence Score: a single number that tells you how well-defended you are, right now, based on detection coverage, response times, vulnerability exposure, and engineering posture.

Same underlying data. Entirely different emotional experience. One makes you want to spend more money. The other makes you feel like your money is already well spent.

47,231 threats blocked β†’ Confidence Score: 94/100
Critical alerts: 3 β†’ Time since last escalation: 847 hours
SOC365 β€” Confidence Dashboard
Live
94/100
Overall Confidence Score
Detection Coverage 97%
Mean Response Time 3m 12s
Open Vulnerabilities 4 β€” remediation in progress
Engineering Posture Hardened
Hours Since Last Escalation 847
Deception Sensors Active 24/24
Sutherland Principle: Scarcity & Time Constraints

We onboard four new SOC clients per quarter. No more.

Every new SOC365 client gets a dedicated onboarding period: detection engineering tuned to their environment, named analyst assignment, deception sensor deployment, and a full threat model review.

This takes time and senior attention. We won't compress it. The constraint is genuine β€” and it means every client gets the thoroughness that makes the service worth having.

Pen testing and incident response are available with shorter lead times. SOC365 onboarding is the bottleneck β€” book your quarter when you see availability.

Reserve your quarter β†’

SOC365 Onboarding β€” 2026

Q1 (Jan–Mar)Fully committed
Q2 (Apr–Jun)1 slot remaining
Q3 (Jul–Sep)Accepting enquiries
Q4 (Oct–Dec)Accepting enquiries
Sutherland Principle: Make the Choice Defensible

Nobody ever got fired for choosing CREST-certified, MoD-approved defenders.

B2B decisions are driven by one emotion above all others: the fear of being blamed. We make Cyber Defence the safest possible choice β€” the one you can defend to any board, auditor, or regulator.

πŸ›‘οΈ

CREST Certified

The accreditation your procurement team already recognises. No explaining needed. Instant credibility.

πŸ‡¬πŸ‡§

MoD & CHECK Approved

If it's good enough for the Ministry of Defence, it's good enough for your board. A decision that defends itself.

πŸ“Š

ISO-Aligned Processes

Every procedure, every escalation, every report β€” mapped to standards your compliance team already audits against.

🀝

Named Contacts at Every Level

Your analyst, your account lead, your escalation path β€” named people, not ticket queues. Accountability you can point to.

Sutherland Principle: Framing β€” Gain Narrative Over Loss Narrative

Stories of confidence. Not stories of near-misses.

Traditional case studies dramatise the threat. Ours focus on the outcome: what the client gained, not what they nearly lost.

Financial Services Β· PCI Environment

22 hidden attack paths found and sealed β€” 6 months before the next audit

Outcome: PCI audit passed first time. Zero remediation items.

A payment gateway with a hardened perimeter. Our testers found lateral movement paths that bypassed existing controls. All closed, verified, and documented before the compliance window opened.

Legal Β· Business Email Compromise

BEC attack detected and contained in 4 minutes β€” before a single instruction was sent

Outcome: Β£0 lost. Client trust preserved. Detection rule now protects all legal clients.

DecoyPulse credential traps detected the compromised account attempting lateral movement. Our analyst called the client's IT lead directly. Containment was complete before the attacker could act.

Healthcare Β· Ransomware

Clinical operations fully restored in 3.8 hours β€” no patient data accessed

Outcome: 94% of systems operational within 4 hours. Full recovery within 18 hours.

Ransomware detonated at 02:17 UTC. Our Disrupt team was on a call with the client's IT director within 8 minutes. Pre-staged containment playbooks turned a potential catastrophe into a controlled recovery.

Ready to meet the person
who watches while you sleep?

Book a free consultation. We'll show you your environment through our eyes, introduce you to your would-be analyst, and tell you exactly what we'd recommend β€” with no obligation.

Book your consultation β†’
Average time from first call to SOC365 go-live: 21 working days Β· Pen testing: 12 days Β· IR retainer: same day

Concept Notes β€” For Internal Review

How each section applies Rory Sutherland's behavioural science principles to the Cyber Defence proposition.

Principle 01

The Named Guardian Effect

The existing "Duty Analyst" strip is already a Sutherland-grade detail β€” it personalises an anonymous service. This concept amplifies it into the central proposition: "Someone is watching while you sleep." The named person transforms a commodity SOC service into a trusted relationship. Sutherland argues that effort-signalling (a greeting card vs. an email) creates perceived value. A named analyst is the cybersecurity greeting card.

Ref: Alchemy β€” signalling through effort, the greeting card principle, trust through personal commitment

Principle 02

Confidence Score vs. Threat Dashboard

Reframing the SOC dashboard from "threats blocked" to a "Confidence Score" applies Sutherland's core insight: perceived value is the only value. The same telemetry data, presented as a score out of 100 instead of a wall of red alerts, transforms the client's emotional experience from anxiety to reassurance. This also drives retention β€” confident clients don't shop for alternatives.

Ref: Alchemy β€” renaming/relabelling, "all value is perceived value", the Patagonian Toothfish β†’ Chilean Sea Bass

Principle 03

Gain Framing Throughout

Every service is described by what the client gains, not what they avoid losing. "Undisturbed operations" instead of "threat prevention." "A plan within twenty minutes" instead of "incident response." Sutherland's research shows that gain framing generates referrals and repeat business; loss framing generates anxiety and buyer's remorse.

Ref: Alchemy β€” framing effects, pensioner vs. unemployed reframe, "47 doors locked" from Hedgehog concept

Principle 04

Social Proof at Sector Level

Generic testimonials are weak. Sector-specific peer behaviour data is powerful. "4 of the Top 20 UK law firms use SOC365 β€” all referred by another firm" triggers the same herd behaviour as the hotel towel experiment. People follow people in their peer group, not marketing copy from a vendor.

Ref: Alchemy β€” social proof, hotel towel reuse, Nudgestock on norms and herd behaviour

Principle 05

Scarcity Through Genuine Constraints

"4 new SOC clients per quarter" is a credible constraint backed by the real onboarding process. Sutherland found that time constraints on direct mail offers dramatically increased response β€” even when late replies were still accepted. The quarterly calendar makes the constraint visible and believable, which increases both perceived quality and urgency.

Ref: Alchemy β€” direct mail time close, scarcity heuristics, Brainfluence podcast on perceived value

Principle 06

The IBM Safety Principle

"Nobody got fired for buying IBM" is Sutherland's shorthand for how B2B decisions actually work: people choose what they can defend if it goes wrong. CREST, MoD, CHECK, ISO alignment, and named contacts all serve as risk-reduction signals. The section is explicitly designed for the person who needs to justify the vendor choice to their board β€” not the person who evaluates the technology.

Ref: Alchemy β€” signalling theory, B2B "fame", "nobody gets fired" decision safety, the role of brands as risk reducers

Principle 07

Case Studies as Confidence Stories

Traditional security case studies read like horror stories: "A devastating ransomware attack struck..." We reframe them as stories of confidence and competence: "Clinical operations fully restored in 3.8 hours." The outcome leads. The threat is context, not the headline. This generates different word of mouth: "They recovered us in four hours" vs. "We got ransomwared."

Ref: Alchemy β€” reframing, gain vs. loss narratives, storytelling for brand positioning

Principle 08

The Reframe Strip: Small Words, Big Shifts

The four-column strip below the hero explicitly shows the "before and after" of each reframe. This serves two purposes: (1) it signals to visitors that Cyber Defence thinks differently, and (2) it demonstrates Sutherland's "dare to be trivial" principle β€” that the smallest changes in language can produce the largest changes in perception and behaviour.

Ref: Nudgestock "Dare To Be Trivial", Ogilvy call centre +4 words = 3x conversion, "I'm going to solve this for you"