Operationalising OT Cyber Risk
A Board-to-Plant-Floor Operating Model Translating Risk Appetite into PLC Configuration
The institutional operating model boards retain when contracts, regulators, and market confidence converge on the same fault line. Decision architecture for environments where information is incomplete and consequences are irreversible.
Organisations do not lose systems first. They lose decision authority. Then everything else follows.
This doctrine exists because the distance between a near-miss and a career-ending breach is one unsigned control.
Not advisory. Not consultancy. The governance infrastructure that holds when the regulator is already in the building.
Technical Execution Stack
Sentinel · Splunk · Azure Defender · KQL · Wireshark · Burp Suite · Nessus · MITRE ATT&CK · Defender for Endpoint · Logic Apps SOAR
I accept 2–3 mandates per calendar year. Engagement requires executive authority or board resolution.
Who this is for
Regulatory exposure, accountability frameworks, and evidence chains for board-level scrutiny under DORA and NIS2.
Explore governance doctrine →Operational resilience models, control collapse diagnostics, and crisis decision hierarchies built for regulated environments.
Explore resilience frameworks →Pre-acquisition cyber due diligence, failure cascade mapping, and post-deal control uplift programmes.
Explore due diligence doctrine →End-to-end delivery for DORA, NIS2, EU AI Act, ISO 42001, and GDPR obligations with full audit-trail evidence.
Explore compliance delivery →Representative outcomes (client identifiers withheld). Written in procurement language under regulatory scrutiny.
Win condition: audit-ready operational resilience evidence chain.
Result 147 findings → 12 in 84 days · owner model · testing cadence · board KPIs
Win condition: contract clauses aligned to operational resilience, TPRM, and audit rights.
Result Negotiation cycle 22wk → 9wk · renegotiated control schedule · exit plan
Win condition: ISO 42001-aligned governance, model inventory, assurance pathways.
Result 0 → 214 models governed · control matrix · accountability map · audit artefacts
Win condition: regulatory-grade incident classification, escalation, and evidence chain under NIS2.
Result MTTR 14d → 2.1d · 24/7 playbooks · board escalation SLA · regulator pack
Win condition: zero-trust posture validated against NIST 800-207 and FCA expectations.
Result 3 critical gaps → 0 · microsegmentation · PAM rollout · attestation dashboard
Win condition: pre-acquisition security posture assessment with quantified remediation roadmap.
Result 5 targets assessed · €2.3M risk quantified · 2 deal-breakers identified · remediation priced
Organisations do not lose systems first. They lose decision authority. Then everything else follows.
Three stages. Procurement-grade artefacts at every step. Designed for boards under regulatory scrutiny.
A 60-minute confidential conversation. We map the decision authority gap, regulatory exposure window, and the artefacts your board, regulator, or counterparty will require.
A signed scope tied to specific outcomes — control closures, evidence chains, governance architecture, or interim CISO coverage. Procurement-grade contract on day one.
Doctrine-grade execution against the mandate. Every output is regulator-ready and board-survivable: control matrices, evidence chains, accountability maps, decision papers.
When the regulator is already in the building, the work cannot be delegated to junior consultants. It has to land with the named principal.
The principal who signs the doctrine is the principal who delivers it. No partner-to-junior handoff.
Every output is regulator-ready and board-survivable. Evidence chains, accountability maps, decision papers — not slideware.
900 published doctrine frameworks, peer-reviewed at UCL & Imperial. The IP that the work runs on is named, citable, and counterparty-validated.
Named references available under NDA. Quotes condensed and anonymised for compliance.
Delivered board-ready evidence under severe timeline pressure.— CISO, Tier-1 Financial Services
Converted fragmented governance into an auditable operating model.— Programme Director, Regulated Enterprise
Operated at board, CISO and delivery-team level without handoff risk.— Transformation Sponsor, EU CNI Operator
Quotes presented in anonymised form to respect client confidentiality. Full attribution and reference letters available under NDA to qualified procurement, board, and regulator-side counterparties.
Senior authority direct — shaped by, and operationally fluent within, the audit, advisory, consulting, technology and managed-service ecosystems that boards, regulators, and procurement teams already trust.
Why this matters. Procurement, board, and CISO offices read these names as proxies for operating tempo, multi-vendor fluency, audit-grade discipline, and regulated-sector cadence. Retain me directly and that lineage is preserved — without partner-tier markup and without delegation to junior tiers.
Company names appear solely to describe prior professional experience within and alongside teams from these organisations as part of previous employment. No endorsement, sponsorship, partnership, or current affiliation is implied. References available under NDA where appropriate.
Certifications
Governance & Risk
SIEM / SOC / Detection
Endpoint / EDR / Cloud
SOAR / Automation / IR
AI Engineering
Navigate the complete governance doctrine — from proprietary frameworks and research to regulatory intelligence and strategic threat analysis.
As AI reshapes the attack surface — LLM exploitation, adversarial prompts, deepfake phishing — your security architecture must operate at the intersection of governance and engineering. 27 years of cyber delivery meets the 2026 AI threat landscape.
Adversarial prompt testing, jailbreak detection, and output sanitisation frameworks. OWASP LLM Top 10 assessment methodology. AI model sandboxing, guardrail architecture, and data leakage prevention for enterprise LLM deployments.
ML anomaly detection integrated with Microsoft Sentinel. Behavioural baselines using Azure ML. Automated triage reduction: 60% fewer false positives through ML-assisted rule tuning. UEBA (User & Entity Behaviour Analytics) deployment for insider threat detection.
EU AI Act Article 9 risk management. Model inventory, bias testing, and transparency documentation for high-risk AI systems. AI incident classification under DORA and NIS2. ISO 42001 AI management system implementation and certification readiness.
AI Threat Coverage
Deepfake phishing · Model inversion · Training data poisoning · Supply chain AI attacks · Shadow AI governance
A visual recap of the audit, advisory, consulting, IT services, and platform organisations whose teams Kieran has worked within or alongside. See full context →
Names are rendered as typographic wordmark representations only. Corporate logos and trademarks remain the property of their respective owners; no endorsement, sponsorship, partnership, or current affiliation is implied. References available under NDA where appropriate.
Each headline claim on this page is scoped, measurable, and defensible. The definitions below set out exactly what each term means and how the figure was produced.
This glossary exists to convert strong claims into defensible claims. If a definition or scope is unclear, request a clarification note before relying on the figure in board, audit, or procurement settings.
Latest institutional release: 21 OT/ICS doctrine papers (v4.0/v4.1) covering Purdue, IEC 62443-3-3, DORA Chapter III, NIS2 Article 21, IEC 61511, and IEC 62439-3 PRP/HSR alignment for board-grade cyber-physical resilience. Read the local PDF or view the Drive mirror.
A Board-to-Plant-Floor Operating Model Translating Risk Appetite into PLC Configuration
A Clause-by-Clause Engineering Crosswalk Between IEC 62443-3-3 DORA Chapter III and NIS2 Article 21
Cyber-Physical Systems Under IEC 61511 Functional Safety and Adversarial Cyber Stress
IEC 62439-3 PRP-HSR Graceful Degradation and Island-Mode Under Adversarial Compromise
A Transparent Monte Carlo Method for Translating SCADA ICS and DCS Threats into Defensible Capital Decisions
A Charter Operating Model and Conflict-Resolution Framework for IT-OT Convergent Network Governance
Evolving Purdue — Modbus-DNP3-CIP DPI Micro-Segmentation and IIoT Vendor Access
Azure AWS Edge and Data-Centre Integration Under Latency and Sovereignty Constraints
SBOMs DORA CTPP and Vendor-Governance for Industrial Estates
PROFINET IRT IEC 61850 GOOSE BGP-MPLS Failover and Deterministic Networking for Mission-Critical Industrial Estates
Identity-Aware Overlays Protocol Proxies and Lateral-Movement Defeat for Headless Industrial Devices
Static VLANs to Software-Defined Plant Networks with Risk-Based OT-Aware Peer-to-Peer Zones
Reverse Proxies Jump Servers Dual-Homed Historians and Data Diodes — Engineering the IT-OT Trust Boundary
Break-Glass Procedures Just-in-Time Vendor Access and the MFA Constraint on the Plant Floor
Institutional cyber-physical doctrine release — drive mirror entry pending local PDF availability.
Engineering Sub-Millisecond Continuity in Industrial Control Systems Using IEC 62439-3 PRP-HSR
Eliminating Hidden Single Points of Failure Through Passive Discovery and Graph Analysis
Formal Specification of the Safe Autonomous Connected Distributed Edge-Native Architecture
Run-Time Operationalisation of the Autonomous Edge — Local Control and Telemetry Queuing