Business Continuity Management Systems

As a business leader or IT decision-maker, you’re already spinning multiple plates: managing risk, meeting regulatory requirements, and making sure your systems are secure without slowing the pace of business. So, when something fundamental changes in how we track cyber threats—like the CVE database—it’s completely fair to ask: "Do I need to worry about this?”
Let us explain what’s happening, why it matters, and how PGI makes sure it doesn’t become your problem to solve.
Before the introduction of the CVE programme, different vendors and researchers would often describe the same issue using different names or formats, making it difficult to track or respond to security threats effectively. This lack of standardisation led to confusion, slower patching, and an increased risk of oversight.With standardisation, the industry has been able to collaborate more effectively; organisations can quickly understand the issue at hand so it can be patched much faster and ultimately meaning threat actors have fewer access points for causing disruption or reputational damage and stealing data or other monetary assets.
In recent days, you may have heard rumours of a new CVE programme. While US-based organisation, MITRE, has maintained the CVE database since its creation in 1999, the European Union Agency for Cybersecurity (ENISA) is forming a similar organisation with a similar purpose and mission. Does this send us back to chaotic pre-CVE times where there is no longer one source of truth? Does this mean organisations will require US and EU reports with similar, but subtly different reporting?Happily, the European and US organisations plan to cooperate and maintain mirrored entries. Think of this as having a strong redundancy - a back-up to make sure we will always have access to the ever-growing list of vulnerabilities that security professionals the world over rely on.
Right now, nothing urgent. MITRE and ENISA are working together to keep both databases aligned. But looking ahead, organisations like yours may face:
Back to those spinning plates, you have enough going on, which is why we’re keeping such a close eye on what’s next.
Our role is to make sure our clients never have to worry about which vulnerability database to use, or how global changes affect local compliance. Here’s what you can expect from us:
Cybersecurity shouldn’t be your full-time job. It’s ours. We track shifts like this to make sure your defences are strong, your reporting is aligned, and your team can focus on what matters most: running your business with confidence.
Have questions or want to know what this means for your specific organisation? Let’s talk.
Due diligence is not just a regulatory requirement but a fundamental component of a robust information security strategy.
Upgrading to Cyber Essentials plus is a significant step in enhancing your organisation’s security posture.
Are you adapting your cyber defence strategy? As corporate cyber defences have improved over recent years, organised criminal groups and malicious state actors have discovered new ways of penetrating company systems, based around the exploitation of their digital vulnerabilities, rather than just cyber security or technical weaknesses.