[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f4hz1yLLRdFnmT207wwL4tvsBV2n_2kfak8BNoFc-J7g":3,"page-\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fcyber-threat-intelligence":85,"$fBP3ggdKCJednmsoREfENIZTFy0lKxFd7hEDQFr-feSM":386,"$fDh3cwgtoutvKR5CCE2XRXsY2aAqyi5_cBVUpcKbJovU":423},{"talan_aa_testing_tech_americas":4,"talan_aa_testing_tech_uk":32,"talan_localhost_france":50,"talan_localhost_global":68},{"name":5,"domain_suffix":6,"languages":7,"countries":10,"menus":13,"search_page":16,"career_hub_page":19,"content_hub_page":26},"Americas","americas",{"en":8,"fr":9},"en","fr",[11,12],"us","ca",{"footer":14,"main":15},"dm14049411-footer","dm14049411-main",{"en":17,"fr":18},"\u002Fen\u002Fsearch","\u002Ffr\u002Frechercher",{"en":20,"fr":23},{"url":21,"title":22},"\u002Famericas\u002Fen\u002Fjoin-us\u002Four-job-offers","Our job offers",{"url":24,"title":25},"\u002Famericas\u002Ffr\u002Fnous-rejoindre\u002Fnos-offres-demploi","Nos offres d'emploi",{"en":27,"fr":30},{"url":28,"title":29},"\u002Fen\u002Fpositive-innovation","Positive Innovation",{"url":31,"title":29},"\u002Ffr\u002Fpositive-innovation",{"front_page":33,"name":34,"domain_suffix":35,"languages":36,"countries":37,"menus":39,"search_page":42,"career_hub_page":43,"content_hub_page":46,"domain":49},"\u002Fnode\u002F897","UK","uk",{"en":8},[38],"gb",{"footer":40,"main":41},"dm3910373-footer","dm3910373-main",{"en":17,"fr":18},{"en":44},{"url":45,"title":22},"\u002Fuk\u002Fen\u002Four-job-offers",{"en":47,"fr":48},{"url":28,"title":29},{"url":31,"title":29},"talan_aa_testing_tech_uk",{"front_page":51,"name":52,"domain_suffix":53,"languages":54,"countries":55,"menus":56,"search_page":59,"career_hub_page":60,"content_hub_page":65},"\u002Fnode\u002F686","France","france",{"fr":9},[9],{"footer":57,"main":58},"dm945515-footer","dm945515-main",{"en":17,"fr":18},{"en":61,"fr":63},{"url":62,"title":22},"\u002Ffrance\u002Fen\u002Fjoin-us\u002Four-job-offers",{"url":64,"title":25},"\u002Ffrance\u002Ffr\u002Fnous-rejoindre\u002Fnos-offres-demploi",{"en":66,"fr":67},{"url":28,"title":29},{"url":31,"title":29},{"name":69,"domain_suffix":70,"languages":71,"countries":72,"menus":73,"search_page":76,"career_hub_page":77,"content_hub_page":82},"Global","global",{"en":8,"fr":9},null,{"footer":74,"main":75},"dm1532175-footer","dm1532175-main",{"en":17,"fr":18},{"en":78,"fr":80},{"url":79,"title":22},"\u002Fglobal\u002Fen\u002Fjoin-us\u002Four-job-offers",{"url":81,"title":25},"\u002Fglobal\u002Ffr\u002Fnous-rejoindre\u002Fnos-offres-demploi",{"en":83,"fr":84},{"url":28,"title":29},{"url":31,"title":29},{"title":86,"breadcrumbs":87,"metatags":99,"content_format":117,"content":118,"page_layout":339,"contact_link":340,"blocks":345,"current_user":379,"local_tasks":384,"messages":385},"Cyber Threat Intelligence | Talan - Site groupe",[88,92,96],{"frontpage":89,"url":90,"label":91},true,"\u002Fuk\u002Fen","Home",{"frontpage":93,"url":94,"label":95},false,"\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Funleashing-power-technology","Unleashing the power of technology",{"frontpage":93,"url":97,"label":98},"","Cyber Threat Intelligence",{"meta":100,"link":108},[101,103,106],{"name":102,"content":86},"title",{"name":104,"content":105},"robots","index, follow",{"property":107,"content":97},"og:image",[109,112,115],{"rel":110,"href":111},"canonical","https:\u002F\u002Fwww.talan.com\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fcyber-threat-intelligence",{"rel":113,"hreflang":114,"href":111},"alternate","en-GB",{"rel":113,"hreflang":116,"href":111},"x-default","json",{"element":119,"created":120,"experts":121,"expertsTitle":172,"headerBody":173,"image":174,"majorExpertise":187,"title":98,"type":201,"uid":202,"nid":203,"href":204,"lang":8,"domain":35,"libraryOfAnchorBlocs":205,"libraryOfBloc":217},"node-expertise","1741860827",[122,142,157],{"element":123,"name":124,"picture":125,"position":138,"tid":139,"type":140,"href":141},"taxonomy-term-expert","Ian HIRST",{"element":126,"mediaImage":127,"title":136,"type":137},"media-image-responsive-narrow",{"element":128,"content":129},"field-image",{"srcset":130,"sizes":131,"url":133,"alt":134,"width":135,"height":135},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2025-01\u002FIan-HIRST.jpg.webp?itok=-PrxIod7 325w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2025-01\u002FIan-HIRST.jpg.webp?itok=NNHwcu6l 512w",{"325":132,"512":133},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2025-01\u002FIan-HIRST.jpg.webp?itok=-PrxIod7","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2025-01\u002FIan-HIRST.jpg.webp?itok=NNHwcu6l","Ian Hirst","325","Image of Ian Hirst","image","Cyber Threat Services Partner","1114","expert","\u002Fuk\u002Fen\u002Fian-hirst",{"element":123,"name":143,"picture":144,"position":154,"tid":155,"type":140,"href":156},"Matt STEVENS",{"element":126,"mediaImage":145,"title":153,"type":137},{"element":128,"content":146},{"srcset":147,"sizes":148,"url":151,"alt":152,"width":135,"height":135},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2025-03\u002FMatt%20Stevens.jpg.webp?itok=_ZivZ6GP 325w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2025-03\u002FMatt%20Stevens.jpg.webp?itok=GqIeHjvf 650w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_1300x1300\u002Fpublic\u002F2025-03\u002FMatt%20Stevens.jpg.webp?itok=GcD59WPA 800w",{"325":149,"650":150,"800":151},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2025-03\u002FMatt%20Stevens.jpg.webp?itok=_ZivZ6GP","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2025-03\u002FMatt%20Stevens.jpg.webp?itok=GqIeHjvf","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_1300x1300\u002Fpublic\u002F2025-03\u002FMatt%20Stevens.jpg.webp?itok=GcD59WPA","Image of Matt Stevens","Matt Stevens, Assistant-lead, Cyber Threat Services","Assistant-lead, Cyber Threat Services","1146","\u002Fuk\u002Fen\u002Fmatt-stevens",{"element":123,"name":158,"picture":159,"position":169,"tid":170,"type":140,"href":171},"Alessandro SCARLATTI",{"element":126,"mediaImage":160,"title":168,"type":137},{"element":128,"content":161},{"srcset":162,"sizes":163,"url":166,"alt":167,"width":135,"height":135},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2026-05\u002FAlessandroScarlatti-WEB.jpg.webp?itok=X_17c7Hb 325w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2026-05\u002FAlessandroScarlatti-WEB.jpg.webp?itok=M6o7Jtco 650w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_1300x1300\u002Fpublic\u002F2026-05\u002FAlessandroScarlatti-WEB.jpg.webp?itok=egf6G5lD 1000w",{"325":164,"650":165,"1000":166},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2026-05\u002FAlessandroScarlatti-WEB.jpg.webp?itok=X_17c7Hb","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2026-05\u002FAlessandroScarlatti-WEB.jpg.webp?itok=M6o7Jtco","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_1300x1300\u002Fpublic\u002F2026-05\u002FAlessandroScarlatti-WEB.jpg.webp?itok=egf6G5lD","Image of Alessandro Scarlatti","Alessandro Scarlatti, Cyber Threat Intelligence Operations Lead at Talan","Cyber Threat Intelligence Operations Lead","1147","\u002Fuk\u002Fen\u002Falessandro-scarlatti","Our Experts","Our solution provides cyber threat intelligence and expert analyst support, with a professional services consultancy wrap.",{"element":175,"mediaImage":176,"title":186,"type":137},"media-image-responsive-half-banner",{"element":128,"content":177},{"srcset":178,"sizes":179,"url":182,"alt":183,"width":184,"height":185},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner_400\u002Fpublic\u002F2025-03\u002FAdobeStock_537995974.jpeg.webp?itok=O73Qi8T1 400w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner_700\u002Fpublic\u002F2025-03\u002FAdobeStock_537995974.jpeg.webp?itok=UDJtOPvM 700w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner\u002Fpublic\u002F2025-03\u002FAdobeStock_537995974.jpeg.webp?itok=Vi5qaU2h 1200w",{"400":180,"700":181,"1200":182},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner_400\u002Fpublic\u002F2025-03\u002FAdobeStock_537995974.jpeg.webp?itok=O73Qi8T1","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner_700\u002Fpublic\u002F2025-03\u002FAdobeStock_537995974.jpeg.webp?itok=UDJtOPvM","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner\u002Fpublic\u002F2025-03\u002FAdobeStock_537995974.jpeg.webp?itok=Vi5qaU2h","Woman cyber security, meeting or programming working at night with digital overlay","1300","624","Woman, cyber security, meeting or programming working at night with digital overlay",[188],{"tid":189,"uuid":190,"revisionId":189,"langcode":8,"vid":191,"revisionCreated":192,"revisionUser":97,"revisionLogMessage":97,"status":193,"name":194,"description":97,"weight":195,"parent":196,"changed":197,"defaultLangcode":193,"revisionDefault":193,"revisionTranslationAffected":193,"metatag":198,"path":8,"workspace":97,"contentTranslationSource":199,"contentTranslationOutdated":196,"contentTranslationUid":200,"contentTranslationCreated":192,"fieldDescription":97},"257","93d2b95b-db51-4365-933c-dd14a704e544","major_expertise","1725441020","1","Cybersecurity - Securing your IT ecosystem","17","0","1734038941","meta, link, meta","und","3","expertise","31","1482","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fcyber-threat-intelligence",[206,211,214],{"element":207,"text-200":208,"title-255":209,"type":210},"pg-anchor","our-solution","Our Solution","anchor",{"element":207,"text-200":212,"title-255":213,"type":210},"our-value","Our Value",{"element":207,"text-200":215,"title-255":216,"type":210},"bespoke-intelligence","Free Report",[218,237,242,295,308,333,336],{"element":219,"ctaLabel":220,"title-255":221,"type":222,"longDescription":223,"mediaImage":225,"ressource":233},"pg-download-cta-push","Get in touch - Your service, your way","Take Control of Your Security with Talan Bespoke Intelligence","download_cta_push",[224],"\u003Cp>Get in touch with us today and receive a FREE intelligence report.\u003C\u002Fp>",{"element":226,"mediaImage":227,"title":230,"type":137},"media-image",{"element":128,"content":228},{"url":229,"alt":230,"width":231,"height":232},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_2600x2600\u002Fpublic\u002F2025-03\u002FGet-in-touch-CTI2.jpg.webp?itok=qKNgf6g-","Text image asking to get in touch with Talan","1838","2600",{"element":234,"textLong":235,"type":236},"pg-pdf-wall","\u003Ciframe src=\"https:\u002F\u002Fgo.talan.com\u002Fl\u002F688263\u002F2025-03-10\u002F2dbl5j\" width=\"100%\" height=\"750\" type=\"text\u002Fhtml\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\">\u003C\u002Fiframe>","pdf_wall",{"element":238,"type":239,"wysiwyg":240},"pg-wysiwyg","wysiwyg",[241],"\u003Ch3>Actionable Intelligence, Zero Noise\u003C\u002Fh3>\u003Cp>Empower your Security Strategy with Talan's Bespoke Threat Insights. Unlock clarity amidst the chaos of security alerts. Talan's cyber threat intelligence service filters out the noise to deliver only the insights that matter, precise, relevant, and actionable.\u003C\u002Fp>",{"element":243,"imagePosition":244,"title-255":245,"type":246,"anchor":247,"expandsItems":248},"pg-expands","left","Our Cyber Threat Intelligence Solution Capabilities include:","expands","our-solutions",[249,255,259,263,267,271,275,279,283,287,291],{"element":250,"title-60":251,"type":252,"wysiwyg":253},"pg-expands-item","Threat Detection","expands_item",[254],"\u003Cp>\u003Cstrong>Stay Ahead of Threats with Proactive Detection\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Leverage comprehensive incident reports, seamless MITRE ATT&amp;CK Framework integration, and in-depth profiling of known threat actors and operations. Our threat detection capabilities monitor all your technology—both hardware and software—to deliver tailored intelligence unique to your organisation, swiftly identifying indicators of compromise and empowering you to respond decisively.\u003C\u002Fp>",{"element":250,"title-60":256,"type":252,"wysiwyg":257},"Brand Protection",[258],"\u003Cp>\u003Cstrong>Protect Your Brand with Advanced Intelligence\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Safeguard your reputation with comprehensive brand intelligence solutions. From domain abuse detection and data leakage monitoring to brand and executive impersonation detection, we provide proactive defences against targeted threats. Our digital asset monitoring and industry-specific threat insights enable you to mitigate brand attacks swiftly and confidently.\u003C\u002Fp>",{"element":250,"title-60":260,"type":252,"wysiwyg":261},"Social Media Monitoring",[262],"\u003Cp>\u003Cstrong>Harness Social Media Intelligence for Strategic Advantage\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Unlock actionable insights with advanced digital profiling and real-time anonymous sentiment analysis. Our social media intelligence capabilities monitor online landscapes to help you understand perceptions, mitigate risks, and inform your strategy—keeping you ahead in an ever-evolving digital world.\u003C\u002Fp>",{"element":250,"title-60":264,"type":252,"wysiwyg":265},"Third Party Risk Management ",[266],"\u003Cp>\u003Cstrong>Secure Your Supply Chain with Proactive Monitoring\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Identify and mitigate risks across your entire supply chain with real-time monitoring of active vulnerabilities, cyber incidents, and data breaches. Our extended supply chain intelligence keeps you informed and protected—ensuring operational resilience and security.\u003C\u002Fp>",{"element":250,"title-60":268,"type":252,"wysiwyg":269},"Geopolitical Intelligence",[270],"\u003Cp>\u003Cstrong>Navigate Global Risks with Geopolitical Intelligence\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Stay ahead of emerging threats with expert analysis of geopolitical contexts and detailed in-country reports. Our geopolitical intelligence capabilities provide the insights you need to make informed decisions and protect your interests worldwide.\u003C\u002Fp>",{"element":250,"title-60":272,"type":252,"wysiwyg":273},"Vulnerability & Exposure Monitoring",[274],"\u003Cp>\u003Cstrong>Stay One Step Ahead with Proactive Vulnerability Monitoring\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Detect and respond swiftly to emerging threats with comprehensive breach alert tracking, email credential monitoring, and infrastructure surveillance. Our enhanced vulnerability intelligence and scanning, combined with contextualised Indicators of Compromise (IOCs), ensure you have the insights needed to fortify your defences effectively.\u003C\u002Fp>",{"element":250,"title-60":276,"type":252,"wysiwyg":277},"Analyst Services and Support",[278],"\u003Cp>\u003Cstrong>Uncover Hidden Threats with Expert Analyst Services\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Leverage advanced open-source intelligence, darknet and deep web monitoring, and expert threat contextualisation and malware analysis. Our comprehensive analyst services include a rapid ‘take-down’ capability, ensuring swift action against emerging threats to safeguard your organisation.\u003C\u002Fp>",{"element":250,"title-60":280,"type":252,"wysiwyg":281},"Instant Assessment",[282],"\u003Cp>\u003Cstrong>See Your Organisation Through an Attacker’s Eyes\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Our non-intrusive instant assessments deliver a security rating based on publicly accessible data, revealing how potential attackers perceive your organisation. Gain actionable insights to strengthen your defences swiftly and effectively.\u003C\u002Fp>",{"element":250,"title-60":284,"type":252,"wysiwyg":285},"Initial Access Broker Monitoring",[286],"\u003Cp>\u003Cstrong>Stay Ahead of Cybercriminals with Initial Access Broker Monitoring\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Gain real-time visibility into underground marketplaces where compromised access is traded. Our advanced analytics and machine learning models uncover patterns and tactics used by Initial Access Brokers, enabling proactive threat identification. With seamless incident response integration, customisable alerts, and expert support, we help you neutralise threats swiftly and confidently.\u003C\u002Fp>",{"element":250,"title-60":288,"type":252,"wysiwyg":289},"Device Risk Profiling",[290],"\u003Cp>\u003Cstrong>Strengthen Your Defences with Advanced Device Profiling\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Leverage comprehensive profiling for cyber-physical systems using the MITRE EMB3D Framework. Our device profiling capabilities encompass risk assessment, threat vector identification, and threat actor analysis to deliver enhanced assurance. With integrated threat modelling, third-party risk management, supplier investigations, and geopolitical risk insights, we provide a holistic approach to securing your devices and supply chain.\u003C\u002Fp>",{"element":250,"title-60":292,"type":252,"wysiwyg":293},"Reconnaissance and Investigative Insight",[294],"\u003Cp>\u003Cstrong>Uncover Hidden Risks with Reconnaissance and Investigative Insight\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Gain a 360-degree view of potential threats with comprehensive organisation and key individual profiling, reputational analysis, and asset identification. Our services include financial analysis, regulatory and legal standing assessments, and risk profiling, enhanced by supplier investigations and digital Footprinting. With continual monitoring, risk scoring, and peer comparison, we deliver actionable insights to safeguard your organisation's integrity and reputation.\u003C\u002Fp>",{"element":296,"direction":244,"title-255":297,"type":298,"mediaImage":299,"wysiwyg":306},"pg-text-and-image","UK-Based Experts, Bespoke Intelligence","text_and_image",{"element":226,"mediaImage":300,"title":305,"type":137},{"element":128,"content":301},{"url":302,"alt":303,"width":232,"height":304},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_2600x2600\u002Fpublic\u002F2025-03\u002FAdobeStock_205858183.jpeg.webp?itok=7zPoTQKq","Futuristic graphical user interface concept","1543","Woman working in front of a graphical interface",[307],"\u003Cp>\u003Cstrong>Precision Threat Insights Tailored to Your Needs.&nbsp;\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Leverage the expertise of our UK-based team with backgrounds in engineering, law enforcement, military, and cyber security.&nbsp;\u003C\u002Fp>\u003Cp>Talan's custom-built intelligence solutions are designed to fit your unique requirements, offering a comprehensive range of capabilities in flexible packages that suit every need.\u003C\u002Fp>",{"element":309,"title-60":310,"type":311,"anchor":212,"keyPoints":312},"pg-key-points","Add value to every security function","key_points",[313,318,321,324,327,330],{"element":314,"text-200":315,"title-60":316,"type":317},"pg-key-points-item","Estimate likely threats and their potential business impact to direct an organisations cyber security strategies, controls, and mitigation measures.","Security Leaders","key_points_item",{"element":314,"text-200":319,"title-60":320,"type":317},"Accelerates their alert triage, understand the motives and TTP’s of threat actors and track security trends.","Threat analysts and incident response teams",{"element":314,"text-200":322,"title-60":323,"type":317},"Intelligence delivers context and risk scoring that enables them to reduce downtime while patching the vulnerabilities that really matter first.","Vulnerability management teams",{"element":314,"text-200":325,"title-60":326,"type":317},"Visibility of security postures of vendors, suppliers, and other 3rd parties that access the organisation’s systems.","Third-party risk programs",{"element":314,"text-200":328,"title-60":329,"type":317},"Visibility into, and takedown of, unsanctioned web and social media mentions, data leaks, phishing attacks, etc.","Brand protection teams",{"element":314,"text-200":331,"title-60":332,"type":317},"Precise intelligence about what’s happening in the cities, countries, and regions of interest.","Geopolitical risk and physical security teams",{"element":238,"type":239,"anchor":215,"wysiwyg":334},[335],"\u003Ch5>Take Control of Your Security with Talan Bespoke Intelligence\u003C\u002Fh5>\u003Cp>Choose the perfect package that fits your needs—whether you want the service alone or a fully managed solution delivered by our experts at Talan. It's all about what works best for you.&nbsp;\u003C\u002Fp>\u003Cp>Plus, for a limited time, get in touch with us today and receive a FREE intelligence report—no strings attached! Discover actionable insights and see how our service can elevate your security strategy.&nbsp;\u003C\u002Fp>\u003Cp>\u003Cstrong>Your service, your way.\u003C\u002Fstrong>\u003C\u002Fp>",{"element":337,"embedExternalForm":235,"title-255":220,"type":338},"pg-form","form","default",{"element":341,"link":342},"block-header-contact",{"title":343,"href":344},"Contact us","\u002Fuk\u002Fen\u002Fcontact-us-uk",{"footer_top":346},{"footer_uk":347,"olivero_footerblock":369},{"element":348,"links":349,"logo":356,"subtitle":367,"title":368},"block-content-footer",[350,354],{"title":351,"options":352,"content":353},"Your career",[],"\u002Fuk\u002Fen\u002Fjoin-us\u002Fyour-career",{"title":22,"options":355,"content":45},[],{"element":126,"mediaImage":357,"title":366,"type":137},{"element":128,"content":358},{"srcset":359,"sizes":360,"url":363,"alt":364,"width":135,"height":365},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=aImG83Wz 325w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=SIEVvEZi 650w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_1300x1300\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=WnG6bPb- 840w",{"325":361,"650":362,"840":363},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=aImG83Wz","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=SIEVvEZi","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_1300x1300\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=WnG6bPb-","Talan-curious-mind-logo","310","Talan-curious-mind","We believe in the diversity of our profiles, the richness of our experiences, our differences of opinion - this is what creates the strength and relevance of the Talan collective.","Join Us ",{"element":370,"id":371,"label":372,"label_display":373,"provider":374,"title":375,"subtitle":367,"title_cta_1":376,"title_cta_2":351,"title_cta_3":22,"url_cta_1":377,"url_cta_2":378,"url_cta_3":79},"drupal-block-footer-block","footer_block","Footer Block","visible","talan_decoupled","Join Us -","Culture and values","\u002Fglobal\u002Fen\u002Fjoin-us\u002Fculture-and-values","\u002Fglobal\u002Fen\u002Fjoin-us\u002Fyour-career",{"id":380,"name":381,"roles":382},0,"Anonymous",[383],"anonymous",[],[],[387,390,393,396,399,402,405,408,411,414,417,420],{"title":388,"url":389},"Careers","\u002Fuk\u002Fen\u002Fjoin-talan-community-curious-minds",{"title":391,"url":392},"Locations","\u002Fuk\u002Fen\u002Four-locations",{"title":394,"url":395},"Legal information and GTCU","\u002Fuk\u002Fen\u002Flegal-information-and-general-terms-and-conditions-use",{"title":397,"url":398},"Ethics & Compliance","\u002Fuk\u002Fen\u002Fethics-compliance",{"title":400,"url":401},"Privacy policy","\u002Fuk\u002Fen\u002Ftalan-group-data-protection-policy",{"title":403,"url":404},"Binding Corporate Rules","\u002Fuk\u002Fen\u002Fbinding-corporate-rules-processor",{"title":406,"url":407},"Carbon Reduction Plan","\u002Fuk\u002Fen\u002Fcarbon-reduction-plan",{"title":409,"url":410},"Digital accessibility","\u002Fuk\u002Fen\u002Fdigital-accessibility",{"title":412,"url":413},"Disclaimers, Terms & Conditions","\u002Fuk\u002Fen\u002Fdisclaimers-terms-conditions",{"title":415,"url":416},"Grievance Policy & Procedure","\u002Fuk\u002Fen\u002Fgrievance-policy-procedure",{"title":418,"url":419},"Modern Slavery Policy","\u002Fuk\u002Fen\u002Fmodern-slavery-policy",{"title":421,"url":422},"Whistleblower Protection Policy","\u002Fuk\u002Fen\u002Fwhistleblower-protection-policy",[424,533,558,640,663],{"title":425,"url":97,"push_image":426,"push_surtitle":427,"push_title":428,"push_tag":97,"push_url":429,"below":430},"Capabilities","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2026-04\u002FMSI-UK-Carbon-Reduction-Plan.jpg.webp","OUR EXPERTISE","Strategic Sustainability Support with a Leading UK Health Provider","\u002Fuk\u002Fen\u002Fstrategic-sustainability-support-leading-uk-health-provider",[431,451,483,506,512],{"title":432,"url":97,"cta_uri":433,"cta_title":434,"below":435},"Consulting","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Fshaping-your-transformation","See all our Consulting expertise",[436,439,442,445,448],{"title":437,"url":438},"Integrating technology into your strategy","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Fintegrate-technology-your-strategy",{"title":440,"url":441},"Reinventing your business model","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Freinvent-your-business-model",{"title":443,"url":444},"Strengthen your resilience and operational excellence","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Fenhance-your-companys-resilience-and-operational-excellence",{"title":446,"url":447},"Reinventing the customer experience","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Freinvent-customer-experience-talan",{"title":449,"url":450},"Fully engage your company in sustainable transformation","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Fsustainable-transformation",{"title":452,"url":97,"cta_uri":453,"cta_title":454,"below":455},"Data and AI","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fcapture-richness-your-data","See all our Data x AI expertise",[456,459,462,465,468,471,474,477,480],{"title":457,"url":458},"Data x AI","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-x-ai",{"title":460,"url":461},"Data Analytics","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-analytics",{"title":463,"url":464},"Data Architecture & Solutions Integration","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-architecture-solutions-integration",{"title":466,"url":467},"Data Governance & Compliance","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-governance-compliance",{"title":469,"url":470},"Data Modelling, Data Warehousing & Big Data","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-modelling-data-warehousing-big-data",{"title":472,"url":473},"Data Privacy","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-privacy",{"title":475,"url":476},"Data Quality Management","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-quality-management",{"title":478,"url":479},"Data Science & Data Engineering","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-science-data-engineering",{"title":481,"url":482},"Data Strategy","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-strategy",{"title":484,"url":97,"cta_uri":94,"cta_title":485,"below":486},"Technology","See all our technological expertise",[487,490,493,494,497,500,503],{"title":488,"url":489},"Smart Automation & RPA","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fintelligent-automation-rpa-boost-your-companys-efficiency-talan",{"title":491,"url":492},"Cybersecurity","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fcybersecurity",{"title":98,"url":204},{"title":495,"url":496},"Ecosystem Cloud","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fbuild-your-cloud-ecosystem",{"title":498,"url":499},"Microsoft x Talan","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fmicrosoft-talan",{"title":501,"url":502},"SAP x Talan","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fsap",{"title":504,"url":505},"Salesforce x Talan","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fsalesforce",{"title":507,"url":97,"below":508},"Nurturing positive innovation",[509],{"title":510,"url":511},"Cultivate positive innovation","\u002Fuk\u002Fen\u002Fcapabilities\u002Fnurturing-positive-innovation\u002Fcultivate-positive-innovation-and-transform-your-challenges-opportunities",{"title":513,"url":97,"below":514},"The Talan Method",[515,518,521,524,527,530],{"title":516,"url":517},"Continuum of service: supporting you at every stage of your project","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Fcontinuum-services-heart-your-transformation",{"title":519,"url":520},"Enlightening decisions","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-enlightening-decisions",{"title":522,"url":523},"Putting data at the service of change","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-putting-data-service-change",{"title":525,"url":526},"Scaling projects","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-scaling-projects",{"title":528,"url":529},"Innovating through research","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-research-driver-innovation",{"title":531,"url":532},"Mobilising ingenious and committed experts","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-mobilising-ingenious-and-committed-experts",{"title":534,"url":97,"cta_uri":535,"cta_title":536,"below":537},"Industries","\u002Fuk\u002Fen\u002Four-industries","See all industries",[538,542,546,550,554],{"title":539,"url":540,"link_thumbnail":541},"Energy","\u002Fuk\u002Fen\u002Findustries\u002Fdigital-transformation-propel-your-energy-and-environmental-company-future-0","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002Fshutterstock_2276246949.jpg.webp",{"title":543,"url":544,"link_thumbnail":545},"Bank & Finance","\u002Fuk\u002Fen\u002Findustries\u002Fbanking-and-finance-unleash-your-transformation-potential-0","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002Fshutterstock_1407617270.jpg.webp",{"title":547,"url":548,"link_thumbnail":549},"Insurance","\u002Fuk\u002Fen\u002Findustries\u002Fguiding-insurance-sector-through-transformations-0","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002Fshutterstock_2212041425.jpg.webp",{"title":551,"url":552,"link_thumbnail":553},"Health","\u002Fuk\u002Fen\u002Findustries\u002Ftransforming-healthcare-0","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-09\u002Fshutterstock_1958734429%20%281%29.jpg.webp",{"title":555,"url":556,"link_thumbnail":557},"Public Services","\u002Fuk\u002Fen\u002Findustries\u002Fdigital-transformation-and-modernisation-public-services","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002Fshutterstock_2433950661_0.jpg.webp",{"title":559,"url":97,"push_image":560,"push_surtitle":561,"push_title":562,"push_tag":97,"push_url":563,"below":564},"Insights","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2026-04\u002Fhalifax-bank-cash-machine-atm-uk-high-street.jpg.webp","INSIGHT","The UK's Open Finance Roadmap Is Here: From Vision to Value","\u002Fuk\u002Fen\u002Fuks-open-finance-roadmap-here-vision-value",[565,592,619],{"title":559,"url":97,"cta_uri":566,"cta_title":567,"below":568},"\u002Fuk\u002Fen\u002Fall-our-insights","See all our insights",[569],{"element":570,"rows":571},"drupal-view",[572,578,580,584,588],{"element":573,"title":574,"type":575,"nid":576,"href":577,"lang":8,"domain":35},"node-insight-menu","The real cyber AI risk no one is talking about ","insight","2955","\u002Fuk\u002Fen\u002Fai-cyber-risk-no-one-really-talking-about",{"element":573,"title":562,"type":575,"nid":579,"href":563,"lang":8,"domain":35},"2957",{"element":573,"title":581,"type":575,"nid":582,"href":583,"lang":8,"domain":35},"Making Local Energy Markets Work in Practice","2923","\u002Fuk\u002Fen\u002Fmaking-local-energy-markets-work-practice",{"element":573,"title":585,"type":575,"nid":586,"href":587,"lang":8,"domain":35},"What does it take to enter the GB Flexibility Market?","2920","\u002Fuk\u002Fen\u002Fwhat-does-it-take-enter-gb-flexibility-market",{"element":573,"title":589,"type":575,"nid":590,"href":591,"lang":8,"domain":35},"What is the best approach to managing Smart Data privacy risks? ","2906","\u002Fuk\u002Fen\u002Fwhat-best-approach-managing-smart-data-privacy-risks",{"title":593,"url":97,"cta_uri":594,"cta_title":595,"below":596},"Case studies","\u002Fuk\u002Fen\u002Fall-our-use-cases","See all our case studies",[597],{"element":570,"rows":598},[599,603,607,611,615],{"element":600,"title":428,"type":601,"nid":602,"href":429,"lang":8,"domain":35},"node-case-studies-menu","case_studies","2960",{"element":600,"title":604,"type":601,"nid":605,"href":606,"lang":8,"domain":35},"Advising regional heat pump adoption for local government","2930","\u002Fuk\u002Fen\u002Fadvising-regional-heat-pump-adoption-local-government",{"element":600,"title":608,"type":601,"nid":609,"href":610,"lang":8,"domain":35},"Developing a Heat Network Roadmap","2922","\u002Fuk\u002Fen\u002Fdeveloping-heat-network-roadmap",{"element":600,"title":612,"type":601,"nid":613,"href":614,"lang":8,"domain":35},"AI Adoption Programme: How to Accelerate Enterprise AI Transformation","2144","\u002Fuk\u002Fen\u002Fai-adoption-program-enterprise",{"element":600,"title":616,"type":601,"nid":617,"href":618,"lang":8,"domain":35},"Unlocking Ireland’s Net Zero Future with Renewable Liquid Gases","2139","\u002Fuk\u002Fen\u002Funlocking-irelands-net-zero-future-renewable-liquid-gases",{"title":620,"url":97,"cta_uri":621,"cta_title":622,"below":623},"See us at","\u002Fuk\u002Fen\u002Fall-our-events","All our events",[624],{"element":570,"rows":625},[626,632,636],{"element":627,"title":628,"type":629,"nid":630,"href":631,"lang":8,"domain":35},"node-appointment-menu","British Forces in Business Awards 2026","appointment","3149","\u002Fuk\u002Fen\u002Fbritish-forces-business-awards-2026",{"element":627,"title":633,"type":629,"nid":634,"href":635,"lang":8,"domain":35},"Mythos and beyond: What the wider AI shift means for the threat landscape","3141","\u002Fuk\u002Fen\u002Fmythos-and-beyond-what-wider-ai-shift-means-threat-landscape",{"element":627,"title":637,"type":629,"nid":638,"href":639,"lang":8,"domain":35},"DataFest 2026","3139","\u002Fuk\u002Fen\u002Fdatafest-2026",{"title":641,"url":97,"below":642},"Join Us",[643,647,650,653,657,661],{"title":644,"url":645,"link_thumbnail":646},"Cultures and Values","\u002Fuk\u002Fen\u002Fjoin-us\u002Fculture-and-values","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2025-02\u002FTalan-PRO-62_0.jpg.webp",{"title":648,"url":389,"link_thumbnail":649},"Join Talan","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTALAN-2000-18_0.jpg.webp",{"title":22,"url":651,"link_thumbnail":652},"https:\u002F\u002Fwww.talan.com\u002Fuk\u002Fen\u002Four-job-offers?country=gb","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTalan-PRO-7_1.jpg.webp",{"title":654,"url":655,"link_thumbnail":656},"Our recruitment process","\u002Fuk\u002Fen\u002Fjoin-us\u002Four-recruitment-process","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTalan-PRO-48_2.jpg.webp",{"title":658,"url":659,"link_thumbnail":660},"Talan day-to-day","\u002Fuk\u002Fen\u002Fjoin-us\u002Ftalan-action","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTalan-PRO-54_1.jpg.webp",{"title":351,"url":353,"link_thumbnail":662},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTalan-PRO-61.jpg.webp",{"title":664,"url":97,"push_image":665,"push_surtitle":666,"push_title":667,"push_tag":97,"push_url":668,"below":669},"ABOUT US","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2026-03\u002FB%20Corp%20Webpage%20Image_0.jpg.webp","NEWS","Talan UK & Ireland Achieves Prestigious B Corp Certification","\u002Fuk\u002Fen\u002Ftalan-uk-ireland-achieves-prestigious-b-corp-certification",[670,685,696,723,738],{"title":671,"url":97,"below":672},"Our vision",[673,676,679,682,683],{"title":674,"url":675},"About Talan","\u002Fuk\u002Fen\u002Fabout-us\u002Four-vision\u002Fwho-we-are",{"title":677,"url":678},"CSR Commitment","\u002Fuk\u002Fen\u002Fabout-us\u002Four-vision\u002Fcsr-commitment-talan",{"title":680,"url":681},"Diversity and inclusion at Talan","\u002Fuk\u002Fen\u002Fabout-us\u002Four-vision\u002Fdiversity-and-inclusion-talan",{"title":528,"url":529},{"title":29,"url":684},"\u002Fuk\u002Fen\u002Fcapabilities\u002Fnurturing-positive-innovation\u002Fpositive-innovation",{"title":686,"url":97,"below":687},"Our group",[688,690,693],{"title":689,"url":392},"Our locations",{"title":691,"url":692},"Our organisation","\u002Fuk\u002Fen\u002Fabout-us\u002Four-group\u002Four-organisation",{"title":694,"url":695},"The Talan group ecosystem","\u002Fuk\u002Fen\u002Fabout-us\u002Four-group\u002Ftalan-group-ecosystem",{"title":697,"url":97,"cta_uri":698,"cta_title":699,"below":700},"Our news","\u002Fuk\u002Fen\u002Four-news","See all our news",[701],{"element":570,"rows":702},[703,709,713,715,719],{"element":704,"title":705,"type":706,"nid":707,"href":708,"lang":8,"domain":35},"node-news-menu","Why fixing the UK’s energy pricing problem is a leadership challenge","news","3024","\u002Fuk\u002Fen\u002Fwhy-fixing-uks-energy-pricing-problem-leadership-challenge",{"element":704,"title":710,"type":706,"nid":711,"href":712,"lang":8,"domain":35},"Talan supports delivery of Gas Safe Register student engagement trial","2929","\u002Fuk\u002Fen\u002Ftalan-supports-delivery-gas-safe-register-student-engagement-trial",{"element":704,"title":667,"type":706,"nid":714,"href":668,"lang":8,"domain":35},"2890",{"element":704,"title":716,"type":706,"nid":717,"href":718,"lang":8,"domain":35},"TenSquare, the new brand dedicated to strategy consulting from the Talan group ","2743","\u002Fuk\u002Fen\u002Ftensquare-new-brand-dedicated-strategy-consulting-talan-group",{"element":704,"title":720,"type":706,"nid":721,"href":722,"lang":8,"domain":35},"UK’s leading infrared heating manufacturers, Welsh government, and social housing providers join forces at Baglan infrared showcase event","2746","\u002Fuk\u002Fen\u002Fuks-leading-infrared-heating-manufacturers-welsh-government-and-social-housing-providers-join-forces-baglan-infrared-showcase-event",{"title":724,"url":97,"below":725},"Expert communities",[726,729,732,735],{"title":727,"url":728},"Discover our experts","\u002Fuk\u002Fen\u002Fabout-us\u002Fexpert-communities\u002Fall-our-experts",{"title":730,"url":731},"Our Oracle community blog","https:\u002F\u002Finsum.talan.com\u002Ffr\u002Fressources\u002Fblogue\u002F",{"title":733,"url":734},"Our SAP community blog","https:\u002F\u002Fwww.jaimemonsap.com\u002F",{"title":736,"url":737},"The data blog","https:\u002F\u002Fblog.talan.com\u002Fcategory\u002Fdata\u002F",{"title":739,"url":740,"cta_uri":740,"cta_title":741},"Awards & Certificates","https:\u002F\u002Fwww.talan.com\u002Fuk\u002Fen\u002Four-uk-awards-certificates","See all our Awards & Certificates"]