24 Oct 2025
by Alex Martin

Of monkeys, pedestals and cyber security

Guest blog by Alex Martin, Cyber Services Director at Reliance Cyber

Focus your energy on the controls that actually stop cyber attacks. Perfect policies, risk reports, and maturity frameworks might look good, but they don’t block threats. Get your defences solid first — then build your pedestals.

Introduction

There’s a beautiful metaphor about how human nature often guides us to do things in order of ease, rather than in order of priority. It goes like this: Imagine your team is tasked with teaching a monkey to juggle flaming torches while standing atop a 12-foot pedestal. What do you do first? The right answer lies in assessing critical path and risk. 99.99% of the risk to this project’s success lies in training the monkey. Building a pedestal is easy; we’ve been doing it for millennia. So, logically, we should spend all our effort on the monkey, and only worry about the pedestal once we know the monkey is making clear progress. But that’s not what usually happens, especially in corporate settings. Instead, we build the pedestal first.

Why?

  • Because it’s a clear deliverable.

It shows progress: “Yeah boss, we’re working on the monkey, but check out this awesome pedestal.”

  • Because even if the project fails, we can still say we achieved something: “Shame about the monkey, but hats off to the pedestal team.”
  • This thinking is flawed. If the monkey fails, the pedestal is pointless. (Unless you’re a pedestal manufacturer, in which case... carry on.)

Applying the metaphor to cybersecurity

In conversations with CISOs, IT directors, customers, suppliers and peers, I frequently see this metaphor play out in cyber security. Too often, we place far more emphasis on governance, reporting, and risk documentation, while neglecting the hands-on work that truly protects our organisations. Let me explain. Cyber security, at its core, is about preventing unauthorised access, damage, or disruption to digital assets. Success is when attackers get nothing. Failure is when our business is wiped out by a breach. The difference lies in whether our defences are effective.

 

 

Monkeys (Hard Problems)

Pedestals (Less Hard Problems)

Ensuring 100% EDR coverage and robust configuration

Remediating vulnerabilities with a constant downward trend

Securing the SDLC to minimise software risk

Improving email gateway threat blocking

Arranging a third-party security maturity assessment

Completing a risk register for audit

Producing and distributing security policies

Creating risk reports for the board

 

 

 

 

 

 

 

 

The right-hand column isn’t unimportant or effortless. But these are well-trodden paths. Writing a security policy? Tens of thousands have done it. Achieving near-zero vulnerabilities at scale? That’s rare. That’s meaningful. And it directly impacts breach prevention. In cyber, we’re facing purely technical threats. Threat actors simply don’t care about your risk register, policies, or maturity score. Somewhat ironically, they might well steal or encrypt those documents, but they certainly won’t be deterred by them. So don’t be tempted to spend all your energy on the right-hand side. Particularly the energy of your most senior and experienced cyber security people – which is so often the case in my personal experience.

“You can start improving these controls right now. No matter what tool or technology you use today...”

Addressing the counterarguments

“The metaphor doesn’t suggest ignoring the pedestal altogether. It suggests not starting there when the monkey is still accidentally setting itself on fire.”

Counter argument A:

It’s a fair point. In an ideal world with abundant resources and a break from threat actors, we could build all the frameworks first. But that's rarely the case. Often, doing Thing A means Thing B doesn't get done.

Developing policies is inward-facing, requires heavy stakeholder involvement, and takes time to enact meaningful change. Meanwhile, there are proven best practices for improving defences that most organisations can act on immediately.

Almost everyone has firewalls, IDPs, and some kind of EDR. But almost no audit I’ve seen shows these configured without gaps. And when scanning external attack surfaces, HIGH or CRITICAL vulnerabilities are nearly always present.

You can start improving these controls right now. No matter what tool or technology you use today, there’s documentation and guidance (normally available for free from the vendor) on how to configure it properly. Or ask us. That will protect you far more than any policy document. And it might give you the breathing room to focus on governance later.

Remember: The metaphor doesn’t suggest ignoring the pedestal altogether. It suggests not starting there when the monkey is still accidentally setting itself on fire.

Counter argument B:

Without risk management, how do we know where we’re weak and what to prioritise?

Another strong argument, and yet the same principle applies. If security teams were really well resourced and if threat actors would just give us a break for a few months while we get our ducks in a row, it would be bullet proof.

More realistically, unless you’re a giant, complex enterprise, two questions can go a long way:

  1. What systems and data are most critical to the business?
  2. How are companies like ours getting breached?

Answering those questions in any company of less than a few thousand employees should be trivial.

So, if ransomware is common in your sector, and your critical systems are on-prem, you can immediately start hardening those systems.

Take EDR, for instance. You don’t need a risk workshop to conclude:

  • You need EDR on every compatible asset.

So, if ransomware is common in your sector, and your critical systems are on-prem, you can immediately start hardening those systems.

Take EDR, for instance. You don’t need a risk workshop to conclude:

  • You need EDR on every compatible asset.
  • It must be correctly configured to detect and prevent threats.

If that’s not true today, make it true fast. Bring in help if needed. Our incident response teams never see ransomware succeed where EDR is well-deployed and configured.

Or take a firewall. You don’t need a risk workshop to conclude:

  • ANY/ANY rules are bad without exception
  • Allowing plaintext protocols must always be avoided
  • You need to make sure that all known CVEs are patched.

You can normally fix these things quickly and for free. So start there. Need board-level justification or risk messaging for support, expertise or funding? We can give you that tomorrow.

Summary

At Reliance Cyber, we believe that cyber security is increasingly an engineering discipline. In 2025, organisations are under constant threat. Governance matters. Policies matter. But none of them stop an exploit on an exposed port.

Focus first on the monkey: tighten your controls, eliminate obvious weaknesses, and make your defensive tools work properly.

You don’t need perfect standards to shut down insecure firewall rules. You don’t need board approval to patch a vulnerable system. You just need to start.

And once the monkey is juggling safely, then go build that pedestal.

“It’s a fair point. In an ideal world with abundant resources and a break from threat actors, we could build all the frameworks first. But that’s rarely the case.”


Cyber Resilience Programme activities

techUK brings together key players across the cyber security sector to promote leading-edge UK capabilities, build networks and grow the sector. techUK members have the opportunity to network, share ideas and collaborate, enabling the industry as a whole to address common challenges and opportunities together. Visit the programme page here.

 

Upcoming events

Latest news and insights 

Learn more and get involved

 

Cyber Resilience updates

Sign-up to get the latest updates and opportunities from our Cyber Resilience programme.

 

 

Here are the five reasons to join the Cyber Security programme

Download

Join techUK groups

techUK members can get involved in our work by joining our groups, and stay up to date with the latest meetings and opportunities in the programme.

Learn more

 

Become a techUK member

Our members develop strong networks, build meaningful partnerships and grow their businesses as we all work together to create a thriving environment where industry, government and stakeholders come together to realise the positive outcomes tech can deliver.

Learn more

 Meet the team 

Jill Broom

Jill Broom

Head of Cyber Resilience, techUK

Jill leads the techUK Cyber Resilience programme, having originally joined techUK in October 2020 as a Programme Manager for the Cyber and Central Government programmes. She is responsible for managing techUK's work across the cyber security ecosystem, bringing industry together with key stakeholders across the public and private sectors. Jill also provides the industry secretariat for the Cyber Growth Partnership, the industry and government conduit for supporting the growth of the sector. A key focus of her work is to strengthen the public–private partnership across cyber to support further development of UK cyber security and resilience policy.

Before joining techUK, Jill worked as a Senior Caseworker for an MP, advocating for local communities, businesses and individuals, so she is particularly committed to techUK’s vision of harnessing the power of technology to improve people’s lives. Jill is also an experienced editorial professional and has delivered copyediting and writing services for public-body and SME clients as well as publishers.

Email:
[email protected]
Website:
www.techuk.org/
LinkedIn:
https://www.linkedin.com/in/jill-broom-19aa824

Read lessmore

Annie Collings

Annie Collings

Programme Manager, Cyber Resilience, techUK

Annie is the Programme Manager for Cyber Resilience at techUK. She first joined as the Programme Manager for Cyber Security and Central Government in September 2023. 

In her role, Annie supports the Cyber Security SME Forum, engaging regularly with key government and industry stakeholders to advance the growth and development of SMEs in the cyber sector. Annie also coordinates events, engages with policy makers and represents techUK at a number of cyber security events.

Before joining techUK, Annie was an Account Manager at a specialist healthcare agency, where she provided public affairs support to a wide range of medical technology clients. She also gained experience as an intern in both an MP’s constituency office and with the Association of Independent Professionals and the Self-Employed. Annie holds a degree in International Relations from Nottingham Trent University.

Email:
[email protected]
Twitter:
anniecollings24
LinkedIn:
https://www.linkedin.com/in/annie-collings-270150158/

Read lessmore

Olivia Staples

Olivia Staples

Junior Programme Manager - Cyber Resilience, techUK

Olivia Staples joined techUK in May 2025 as a Junior Programme Manager in the Cyber Resilience team.

She supports the programs mission to promote cyber resilience by engaging key commercial and government stakeholders to shape the cyber resilience policy towards increased security and industry growth. Olivia assists in member engagement, event facilitation and communications support.

Before joining techUK, Olivia gained experience in research, advocacy, and strategic communications across several international organisations. At the Munich Security Conference, she supported stakeholder engagement and contributed to strategic communications. She also worked closely with local and national government stakeholders in Spain and Italy, where she was involved in policy monitoring and advocacy for both public and private sector clients.

Olivia holds an MSc in Political Science (Comparative Politics and Conflict Studies) from the London School of Economics (LSE) and a BA in Spanish and Latin American Studies from University College London (UCL).

Outside of tech, Olivia enjoys volunteering with local charities and learning Norwegian.

Email:
[email protected]

Read lessmore

Fran Richiusa

Fran Richiusa

Programme Team Assistant for Public Sector Markets, techUK

Fran serves as the Programme Team Assistant within techUK’s Public Sector Market Programmes, where she is responsible for delivering comprehensive team support, managing administrative functions, and fostering strong relationships with members.

Prior to joining techUK in May 2025, Fran built a meaningful career in the charitable and local government sectors. She worked extensively with both victims and perpetrators of crime, and notably led the coordination of Domestic Homicide Reviews across Surrey—an initiative aimed at identifying lessons and preventing future incidents of domestic abuse.

Outside of work, Fran is an avid traveller and a proud cat mum who enjoys unwinding with her feline companions.

 

Email:
[email protected]
Website:
www.techuk.org/
LinkedIn:
https://www.linkedin.com/in/francesca-richiusa/

Read lessmore

 

 

 

 

Authors

Alex Martin

Alex Martin

Cyber Services Director, Reliance Cyber