Experts in management cyber training

Protect 2020 Cyber Security Table Top Exercises

Meet the people behind Protect2020 who can effectively deliver a Cybersecurity Tabletop Exercise (TTX) to your boardroom.

Meet the team

Protect 2020's Andy Crocker - expert in cyber training management

Andy Crocker:

Founder & CEO

Founder and CEO of Protect2020, Andy has a distinguished background that spans both military and law enforcement roles. He first made his mark as a member of the UK's elite National Hi-Tech Crime Unit, the hi-tech wing of the National Crime Squad (NCS), now the National Crime Agency (NCA).


Notably, Andy played a pivotal role in leading a joint investigation into Russian Organised Cyber Crime groups targeting the UK, a venture that gained him recognition in the acclaimed nonfiction book, "Fatal System Error" (2010) by Joseph Menn.


Prior to joining the UK police, Andy dedicated 12 years to serving in the British Army as a Military Training Instructor, where he honed his skills in imparting military-based knowledge.


Leveraging his extensive experience in training and cyber security, Andy was inspired to establish Protect2020, providing management cyber training aimed to equip individuals and cyber boardroom facilitators with the knowledge and tools to safeguard against cyber threats.

Phil Ineson, Protect 2020 - cyber training management expert

Phil Ineson

Co-founder & Director

Phillip, an enthusiastic entrepreneur, has a notable track record of founding, managing, selling, and buying cyber security companies. His expertise has also been recognised through advisory roles within the House of Commons and NATO, leading to numerous business accolades.


Prior to a successful career in entrepreneurship, Phillip held prominent positions with major American technology firms, where he established a stellar reputation for customer service and satisfaction. Remarkably, he maintains enduring relationships with clients dating back three decades.


Continually driven by innovation, Phillip is actively involved in launching and nurturing new ventures, focusing on pioneering cutting-edge technology companies in the UK.

Protect 2020's Richard Stiennon - Cyber training management advisor

Richard Stiennon

Non-Exec Advisor

Richard Stiennon is a world renowned cyber security analyst. He is the founder and owner of IT-Harvest, an industry analyst company.


Richard is the author of numerous books on cybersecurity, to include, 'Security Yearbook', 'There Will Be Cyberwar' and 'Surviving Cyberwar'.


Richard is a non-executive member of the Protect2020 board and we are very pleased to have him as an advisor and mentor.

Our cybersecurity approach is rooted in recognised standards and best practices, including the NIST Cyber Security Framework, CIS Top 20, CMMC Level 1 readiness, HIPAA, and ISO 27001.

FAQs

Have a question? We’re here to help.

  • What is a cybersecurity tabletop exercise?

    Protect2020's cybersecurity tabletop exercise is a critical simulation designed to evaluate an organisation's preparedness for cyber threats. 

  • What does Protect2020’s cybersecurity tabletop exercise involve?

    Protect2020’s cybersecurity tabletop exercise involves creating realistic cyber-attack scenarios to test the effectiveness of cybersecurity risk management strategies and incident response plans. 

  • Who should take part in a cybersecurity boardroom exercise?

    Participants from diverse departments such as IT, security, legal, and management should engage in a cybersecurity boardroom exercise, to help emphasise cross-functional collaboration and decision-making under pressure. 

  • What are the aims of Protect2020’s cybersecurity drills?

    Cyber security drills aim to identify strengths and weaknesses in handling potential cyber incidents and fostering real-time problem-solving skills. Post-exercise, a thorough analysis leads to actionable insights for enhancing cybersecurity measures, ensuring the organisation is better equipped to handle real cyber threats effectively.

  • How will my organisation benefit from management cybersecurity training?

    Protect2020’s cybersecurity tabletop exercise is vital for large companies and offers numerous benefits. It enhances overall preparedness against cyber threats, ensuring that cyber security risk management strategies are practical and ingrained in the company culture. Through these exercises, vulnerabilities in cybersecurity measures are identified and addressed. 

  • What is ProtectAware and how is it different from traditional phishing tests?

    ProtectAware is a deepfake simulation and training platform that goes beyond email-based phishing. It uses realistic AI-driven voice calls, video calls, emails and messages to replicate how modern attackers impersonate trusted individuals. The focus is on testing real decision-making, verification behaviour and policy adherence, not just whether someone clicks a link



  • Does ProtectAware use real executives’ voices or images?

    Yes, but only with explicit client written approval. ProtectAware uses a client-provided audio or video sample to safely simulate executive impersonation. This allows organisations to test how staff respond to authority-based requests while ensuring the exercise is controlled, ethical and aligned with internal governance.


  • What happens if someone falls for a ProtectAware simulation?

    If a user engages with the simulation and clicks a link, they are immediately redirected to targeted micro-training. This explains how the deepfake worked, highlights the missed warning signs and reinforces the correct actions, such as using out-of-band verification and following internal policies

  • What outcomes does ProtectAware provide to organisations?

    ProtectAware delivers clear insight into how people and processes perform under realistic deepfake pressure. Organisations gain measurable improvements in awareness, stronger adherence to verification procedures, reduced risk of executive impersonation fraud, and defensible evidence of proactive deepfake risk management.

  • How does ProtectVerify detect deepfakes during live meetings?

    ProtectVerify continuously analyses audio and video streams in real time, looking for indicators of AI-generated or manipulated media. It assesses speech patterns, visual inconsistencies and synthetic artefacts to determine whether a participant’s voice or appearance may be artificial, providing immediate alerts to support informed decisions during the call.

  • When should organisations use ProtectVerify?

    ProtectVerify is designed for high-trust, high-impact interactions such as executive meetings, financial approvals, interviews, client engagements and external partner calls. It provides assurance where identity matters most, helping organisations reduce the risk of impersonation, fraud and manipulation during live communications.

  • What is Shadow AI and why is it a risk?

    Shadow AI refers to the use of AI tools and models by employees without formal approval, oversight or governance. While often well-intentioned, this can lead to sensitive data being shared externally, inconsistent decision-making, regulatory non-compliance and increased exposure to security and reputational risk.

  • How does Protect 2020 help organisations identify Shadow AI?

    Protect 2020 conducts a structured assessment to uncover both declared and undeclared AI usage across the organisation. This includes understanding how tools are being used in practice, where data is flowing, and which processes rely on AI, providing clear visibility of the true AI footprint.

  • What outcomes can organisations expect from a Shadow AI review?

    Organisations gain a clear understanding of AI-related risks, practical recommendations for governance and control, and an executive-level view of where action is required. This enables safer AI adoption, improved compliance with UK and EU regulations, and greater confidence in how AI supports business operations.

Client Testimonials