Manufacturing

Helping manufacturing companies create and execute strategies to exceed their goals


Behind many successful businesses, ventures, or services, is an organisation that manufactures high-quality products and equipment. Manufacturing is the backbone of every industry but it takes careful planning and a deep knowledge base to improve your manufacturing operations and efficiency.


Across all areas of industry, our global network of experts can offer a tailor-made strategy and end-to-end solution for all of your manufacturing functions. We build a package of services to suit your precise needs, including Change Management, Digital Transformation, IR4.0 Strategy, Cyber Security, Go-to-market Planning and more.

Who we have worked with


Amazon

Amazon

Audi

Audi

BT
Post Office

Post Office

BA

BA

BP

BP

Amazon

We have a dedicated Manufacturing team with decades of industry experience 

As well as manufacturing experience, our specialists have a keen understanding of technology and digital infrastructure, procurement, and people management – all of the vital elements in a sustainable manufacturing operation.


Our procurement strategies underscore a proficiency to streamline supply chains, ensuring that the right materials are available at the right time and at the right cost. We conduct a thorough analysis of supplier networks, cost-control measures, and negotiation practices designed to optimise your production lifecycle and minimise operational costs.

CONTACT THE TEAM

Collectively we have


GET IN TOUCH

Case Study

Agency Sales Model


The dealership model at a luxury car manufacturer had been in place for over 100 years, however it was designed in a way that was disadvantageous for both the car buyer and the OEM. This was due to the fact it was characterised by a lack of vehicle price transparency, a low trust relationship between buyers and dealers, and a process no longer representative of the digital service landscape that consumers have become accustomed to.

 

Catalysed by new market entrants such as Tesla, the bricks and mortar sales model was ripe for disruption. A German automotive manufacturer engaged Cambridge Management Consulting to optimise their sales agency model for a new digital and consumer landscape.

READ CASE STUDY

How we help our clients

Our team of experts has decades of experience providing support to a range of manufacturing companies

Scale-Up & Expansion

At the forefront of our manufacturing service is our expertise in scaling-up and expanding a business; we are equipped to grow your manufacturing operations, company size, customer base, and market presence.

Digital Transformation & Industry 4.0

Every business venture has a digital side, particularly that of manufacturing; we are equipped with experts to ensure that your digital operations are optimised.

Cyber Security

Our cyber security practitioners can ensure that all of the digital operations within and surrounding your manufacturing endeavours are resilient, robust, and secure.

People Strategies

People are a crucial part of any manufacturing operation – we can work with you to develop strategies for managing and motivating your personnel and helping them to effectively embrace change.

Restructuring & Consolidation

With growth and expansion comes change and restructuring; we have specialists to support you through every step of a merger, acquisition, or divestiture.

Edge-Enabled Manufacturing Solutions

If you are wanting to optimise your manufacturing operations through edge-based solutions but don’t possess the expertise, our specialists can support this implementation.

Procurement Solutions

Our procurement specialists are well equipped to select the best suppliers, products, and resources for your manufacturing needs, across any industry.

Retail, Property, Manufacturing

Case Studies


A vineyard at sunset
by Pete Nisbet 17 April 2024
edenseven Supports Direct Wines’ Progress to Net Zero By providing a carbon assessment and supporting global supplier engagement. Direct Wines Ltd (Direct Wines) is an international and independent wine merchant which launched its first non-UK business in 2007 and currently has operations across the globe, with over 450 suppliers in their network and employing approximately 1,000 people. Direct Wines owns Laithwaite’s Wine and Averys in the UK, as well as owning and operating a number of their own vineyards and wine-making facilities in the UK, France, USA, and Australia. Direct Wines engaged edenseven, one of the Cambridge Management Consulting group of companies, to support the acceleration of their sustainability programme, with a clear focus on engaging their supply base. Project Overview To research the different techniques being adopted across the globe to sequester (store) carbon within the wine-growing community. The final report would need to show technical in-depth research and be summarised in a format to enable general circulation. Create a muti-language online questionnaire focussed on benchmarking Direct Wines’ supply chain engagement levels relating to decarbonisation. This analysis would be summarised and presented to the board. To create an engagement plan with key suppliers across multiple regions to provide a variety of consultative services to enable the acceleration of decarbonisation. Skills & Knowledge An environmental expert with an in-depth knowledge of carbon sequestration and best practice techniques. Digital capability to produce a multi-language questionnaire and host it on a separate domain to Direct Wines. A clear understanding of an appropriate questionnaire structure, which will product meaningful quantifiable data, while assuring a high response rate. Experience in delivering bespoke carbon reduction and benchmarking projects across different geographies. Outcome & Results Market Analysis : A structured research paper giving clear guidance on the methods used to sequester carbon across multiple regions. This gave Direct Wines a document which would be distributed to senior stakeholders and suppliers to help positively impact their overall Scope 3 emissions. Supply Chain Assessment : A clear benchmark of Direct Wines supply chains current understanding an progress to achieve net zero. This gave Direct Wines the ability to identify individual suppliers who needed support to move forward. Programme Development : The delivery of a programme of work across selected suppliers which consisted of carbon foot-printing assessment, renewable energy feasibility studies, best practice gap analysis, and data reviews.
Ice shards up close with neon tints
by Pete Nisbet 12 February 2024
Press Release: 25/01/2024 - Iceland Foods Limited (Iceland), one of the UK's best known supermarket chains with almost 1000 locations, has signed a long-term agreement with edenseven , one of the Cambridge Management Consulting group of companies, to report and monitor all classes of emissions through their online carbon reporting and management platform, cero.earth. Built by edenseven's in-house software engineers, cero.earth is a cloud-based carbon accounting and management platform that provides a complete view of a business' emissions and decarbonisation plan. Monitoring emissions across all three scopes, cero.earth gives a business a clear understanding of its current position against net zero targets, creates insights to identify areas where action is required, and uses the reporting functionality to help meet regulatory requirements. Capturing data from all of Iceland's stores, food warehouses, distribution centres, and supply chain, cero.earth will help Iceland to report their Scope 1, 2, and 3 emissions, monitor their existing decarbonisation programmes, and build insight to create momentum across their whole portfolio and supply chain. Pete Nisbet , Managing Partner of edenseven, said: "cero.earth has been built to give businesses like Iceland a resource which will help them make a material change to their overall emissions footprint and meet regulatory reporting requirements. With the seamless data input process, clear reporting functionality, and analytical support, cero.earth will free up Iceland's resources to focus on the deployment of programmes of work to deliver against their net zero ambitions." Graham Ireland, Head of Energy and Mechanical Services at Iceland, said: "As a proud signatory of The Climate Pledge and with a target for our own operations and supply chain to be net zero by 2040, Iceland has a clear focus on emission reduction. At Iceland, we believe that every business has a responsibility to take action against climate change and reduce its carbon footprint. Using a resource like cero.earth will allow us to easily report on all 3 Scopes of emissions, enabling Iceland to achieve our targets through clear insight and easy project tracking, as well as helping to meet regulatory reporting requirements." About edenseven edenseven is a sustainability consultancy and technology provider that uses data and market experience to enable companies and their supply chains to play their part in tackling climate change while achieving sustainable growth. edenseven uses the combined power of data, advanced analytics, and pragmatic project management to help companies baseline their current status, identify improvement opportunities in the short, medium, and long terms, and plan and implement those opportunities. For more information, visit our website: www.edenseven.co.uk About Iceland Foods Limited Iceland is one of Britain's fastest-growing and most innovative retailers, recognised as one of the best companies to work for in the UK. Iceland seeks to build a growing, profitable, and responsible business that does the right thing for their colleagues and customers, the communities they serve, the planet, and future generations. Iceland has almost 1000 locations across the UK.

Our team can be your team


Our team of experts have multiple decades of experience across many different business environments and across various geographies.


We can build you a specialised team with the skillset and expertise required to meet the demands of your industry.


Our combination of expertise and an intelligent methodology is what realises tangible financial benefits for clients.

SPEAK TO THE TEAM

Our Retail, Property,

Manufacturing Experts

Industry insights


Abstract kaleidoscope of AI generated shapes
by Tom Burton 10 September 2025
This article explores the ‘Third Way’ to AI adoption – a balanced approach that enables innovation, defines success clearly, and scales AI responsibly for lasting impact | READ FULL ARTICLE
A Data centre in a field
by Stuart Curzon 22 August 2025
Discover how Deep Green, a pioneer in decarbonised data centres, partnered with Cambridge Management Consulting to expand its market presence through an innovative, sustainability‑driven go‑to‑market strategy | READ CASE STUDY
Crystal ball on  a neon floor
by Jason Jennings 21 August 2025
Discover how digital twins are revolutionising project management. This article explores how virtual replicas of physical systems are helping businesses to simulate outcomes, de-risk investments and enhance decision-making.
A vivid photo of the skyline of Stanley on the Falkland Islands
by Cambridge Management Consulting 20 August 2025
Cambridge Management Consulting (Cambridge MC) and Falklands IT (FIT) have donatede £3,000 to the Hermes/Viraat Heritage Trust to support the learning and development of young children in the Falkland Islands.
A modern office building on a wireframe floor with lava raining from the sky in the background
by Tom Burton 29 July 2025
What’s your organisation’s type when it comes to cyber security? Is everything justified by the business risks, or are you hoping for the best? Over the decades, I have found that no two businesses or organisations have taken the same approach to cybersecurity. This is neither a criticism nor a surprise. No two businesses are the same, so why would their approach to digital risk be? However, I have found that there are some trends or clusters. In this article, I’ve distilled those observations, my understanding of the forces that drive each approach, and some indicators that may help you recognise it. I have also suggested potential advantages and disadvantages. Ad Hoc Let’s start with the ad hoc approach, where the organisation does what it thinks needs to be done, but without any clear rationale to determine “How much is enough?” The Bucket of Sand Approach At the extreme end of the spectrum is the 'Bucket of Sand' option which is characterised by the belief that 'It will never happen to us'. Your organisation may feel that it is too small to be worth attacking or has nothing of any real value. However, if an organisation has nothing of value, one wonders what purpose it serves. At the very least, it is likely to have money. But it is rare now that an organisation will not hold data and information worth stealing. Whether this data is its own or belongs to a third party, it will be a target. I’ve also come across businesses that hold a rather more fatalistic perspective. Most of us are aware of the regular reports of nation-state attacks that are attempting to steal intellectual property, causing economic damage, or just simply stealing money. Recognising that you might face the full force of a cyber-capable foreign state is undoubtedly daunting and may encourage the view that 'We’re all doomed regardless'. If a cyber-capable nation-state is determined to have a go at you, the odds are not great, and countering it will require eye-watering investments in protection, detection and response. But the fact is that they are rare events, even if they receive disproportionate amounts of media coverage. The majority of threats that most organisations face are not national state actors. They are petty criminals, organised criminal bodies, opportunistic amateur hackers or other lower-level actors. And they will follow the path of least resistance. So, while you can’t eliminate the risk, you can reduce it by applying good security and making yourself a more challenging target than the competition. Following Best Practice Thankfully, these 'Bucket of Sand' adopters are less common than ten or fifteen years ago. Most in the Ad Hoc zone will do some things but without clear logic or rationale to justify why they are doing X rather than Y. They may follow the latest industry trends and implement a new shiny technology (because doing the business change bit is hard and unpopular). This type of organisation will frequently operate security on a feast or famine basis, deferring investments to next year when there is something more interesting to prioritise, because without business strategy guiding security it will be hard to justify. And 'next year' frequently remains next year on an ongoing basis. At the more advanced end of the Ad Hoc zone, you will find those organisations that choose a framework and aim to achieve a specific benchmark of Security Maturity. This approach ensures that capabilities are balanced and encourages progressive improvement. However, 'How much is enough?' remains unanswered; hence, the security budget will frequently struggle for airtime when budgets are challenged. It may also encourage a one-size-fits-all approach rather than prioritising the assets at greatest risk, which would cause the most significant damage if compromised. Regulatory-Led The Regulatory-Led organisation is the one I’ve come across most frequently. A market regulator, such as the FCA in the UK, may set regulations. Or the regulator may be market agnostic but have responsibility for a particular type of data, such as the Information Commissioner’s Office’s interest in personal data privacy. If regulatory compliance questions dominate most senior conversations about cyber security, the organisation is probably in this zone. Frequently, this issue of compliance is not a trivial challenge. Most regulations don’t tend to be detailed recipes to follow. Instead, they outline the broad expectations or the principles to be applied. There will frequently be a tapestry of regulations that need to be met rather than a single target to aim for. Businesses operating in multiple countries will likely have different regulations across those regions. Even within one country, there may be market-specific and data-specific regulations that both need to be applied. This tapestry is growing year after year as jurisdictions apply additional regulations to better protect their citizens and economies in the face of proliferating and intensifying threats. In the last year alone, EU countries have had to implement both the Digital Operational Resilience Act (DORA) and Network and Infrastructure Security Directive (NIS2) , which regulate financial services businesses and critical infrastructure providers respectively. Superficially, it appears sensible and straightforward, but in execution the complexities and limitations become clear. Some of the nuances include: Not Everything Is Regulated The absence of regulation doesn’t mean there is no risk. It just means that the powers that be are not overly concerned. Your business will still be exposed to risk, but the regulators or government may be untroubled by it. Regulations Move Slowly Cyber threats are constantly changing and evolving. As organisations improve their defences, the opposition changes their tactics and tools to ensure their attacks can continue to be effective. In response, organisations need to adjust and enhance their defences to stay ahead. Regulations do not respond at this pace. So, relying on regulatory compliance risks preparing to 'Fight the last war'. The Tapestry Becomes Increasingly Unwieldy It may initially appear simple. You review the limited regulations for a single region, take your direction, and apply controls that will make you compliant. Then, you expand into a new region. And later, one of your existing jurisdictions introduces an additional set of regulations that apply to you. Before you know it, you must first normalise and consolidate the requirements from a litany of different sets of rules, each with its own structure, before you can update your security/compliance strategy. Most Regulations Talk about Appropriateness As mentioned before, regulations rarely provide a recipe to follow. They talk about applying appropriate controls in a particular context. The business still needs to decide what is appropriate. And if there is a breach or a pre-emptive audit, the business will need to justify that decision. The most rational justification will be based on an asset’s sensitivity and the threats it is exposed to — ergo, a risk-based rather than a compliance-based argument. Opportunity-Led Many businesses don’t exist in heavily regulated industries but may wish to trade in markets or with customers with certain expectations about their suppliers’ security and resilience. These present barriers to entry, but if overcome, they also offer obstacles to competition. The expectations may be well defined for a specific customer, such as DEF STAN 05-138 , which details the standards that the UK Ministry of Defence expects its suppliers to meet according to a project’s risk profile. Sometimes, an entire market will set the entry rules. The UK Government has set Cyber Essentials as the minimum standard to be eligible to compete for government contracts. The US has published NIST 800-171 to detail what government suppliers must meet to process Controlled Unclassified Information (CUI). Businesses should conduct due diligence on their suppliers, particularly when they provide technology, interface with their systems or process their data. Regulations, such as NIS2, are increasingly demanding this level of Third Party Risk Management because of the number of breaches and compromises originating from the supply chain. Businesses may detail a certain level of certification that they consider adequate, such as ISO 27001 or a System & Organization Controls (SOC) report. By achieving one or more of these standards, new markets may open up to a business. Good security becomes a growth enabler. But just like with regulations, if the security strategy starts with one of these standards, it can rapidly become unwieldy as a patchwork quilt of different entry requirements builds up for other markets. Risk-Led The final zone is where actions are defined by the risk the business is exposed to. Being led by risk in this way should be natural and intuitive. Most of us might secure our garden shed with a simple padlock but would have several more secure locks on the doors to our house. We would probably also have locks on the windows and may add CCTV cameras and a burglar alarm if we were sufficiently concerned about the threats in our area. We may even install a secure safe inside the house if we have some particularly valuable possessions. These decisions and the application of defences are all informed by our understanding of the risks to which different groups of assets are exposed. The security decisions you make at home are relatively trivial compared to the complexity most businesses face with digital risk. Over the decades, technology infrastructures have grown, often becoming a sprawling landscape where the boundaries between one system and another are hard to determine. In the face of this complexity, many organisations talk about being risk-led but, in reality, operate in one of the other zones. There is no reason why an organisation can’t progressively transform from an Ad Hoc, Regulatory-Led or Opportunity-Led posture into a Risk-Led one. This transformation may need to include a strategy to enhance segmentation and reduce the sprawling landscape described above. Risk-Led also doesn’t mean applying decentralised, bespoke controls on a system-by-system basis. The risk may be assessed against the asset or a category of assets, but most organisations usually have a framework of standard controls and policies to apply or choose from. The test to tell whether an organisation genuinely operates in the Risk-Led zone is whether they have a well-defined Risk Appetite. This policy is more than just the one-liner stating that they have a very low appetite for risk. It should typically be broken down into different categories of risk or asset types; for instance, it might detail the different appetites for personal data risk compared to corporate intellectual property marked as 'In Strict Confidence'. Each category should clarify the tolerance, the circumstances under which risk will be accepted, and who is authorised to sign off. I’ve seen some exceptionally well-drafted risk appetite policies that provide clear direction. Once in place, any risk review can easily understand the boundaries within which they can operate and determine whether the controls for a particular context are adequate. I’ve also seen many that are so loose as to be unactionable or, on as many occasions, have not been able to find a risk appetite defined at all. In these situations, there is no clear way of determining 'How much security is enough'. Organisations operating in this zone will frequently still have to meet regulatory requirements and individual customer or market expectations. However, this regulatory or commercial risk assessment can take the existing strategy as the starting point and review the relevant controls for compliance. That may prompt an adjustment to security in certain places. But when challenged, you can defend your strategy because you can trace decisions back to the negative outcomes you are attempting to prevent — and this intent is in everyone’s common interest. Conclusions Which zone does your business occupy? It may exist in more than one — for instance, mainly aiming for a specific security maturity in the Ad Hoc zone but reinforced for a particular customer. But which is the dominant zone that drives plans and behaviour? And why is that? It may be the right place for today, but is it the best approach for the future? Apart from the 'Bucket of Sand' approach, each has pros and cons. I’ve sought to stay balanced in how I’ve described them. However, the most sustainable approach is one driven by business risk, with controls that mitigate those risks to a defined appetite. Regulatory compliance will probably constitute some of those risks, and when controls are reviewed against the regulatory requirements, there may be a need to reinforce them. Also, some customers may have specific standards to meet in a particular context. However, the starting point will be the security you believe the business needs and can justify before reviewing it through a regulatory or market lens. If you want to discuss how you can improve your security, reduce your digital risk, and face the future with confidence, get in touch with Tom Burton, Senior Partner - Cyber Security, using the below form.
AI co-pilot
by Jason Jennings 28 July 2025
Jason Jennings | Elevate your project management with AI. This guide for senior leaders explains how AI tools can enhance project performance through predictive foresight, cognitive collaboration, and portfolio intelligence. Unlock the potential of AI in your organisation and avoid the common pitfalls.
SEE MORE INSIGHTS

"Cambridge MC's resources continue to support our client through the process."


- Bristol City Council

"Continue to Support the Client"

Get in touch with our

Manufacturing team today


We are a highly collaborative team of senior-level executive professionals able to adapt to any challenge, however niche & challenging.

+44 (0)1223 750335

info@cambridgemc.com

Contact Form - Retail, Property, Manufacturing

Case Studies


Our team has had the privilege of partnering with a diverse array of clients, from burgeoning startups to FTSE 100 companies. Each case study reflects our commitment to delivering tailored solutions that drive real business results.

CASE STUDIES

A little bit about Cambridge MC


Cambridge Management Consulting is a specialist consultancy drawing on an extensive global network of over 200 senior executives in 22 countries.


Our purpose is to help our clients make a better impact on the world.

ABOUT CAMBRIDGE MC