Global · Multi-jurisdictional · Sovereign Authority · DORA · NIS2 · EU AI Act · ISO 42001 · GDPR
92%
Backlog Closed
147 → 12 findings · 84 days
0
Supervisory Findings
Across 3 review cycles
214
AI Models Governed
From 0 baseline · ISO 42001
14d → 2.1d
MTTR Compression
NIS2-aligned incident response
900 Published Doctrines
Control Collapse Model™
Crisis Decision Hierarchy
Failure Cascade Mapping
Full Evidence Chains
Counterparty Validated
GDPR & DORA Compliant
UCL · Imperials
Contract Outcomes

Outcomes counterparties sign against

Representative outcomes (client identifiers withheld). Written in procurement language under regulatory scrutiny.

Tier-1 FS: DORA Transformation

Win condition: audit-ready operational resilience evidence chain.

DORAEvidence Chain Model™

Result 147 findings → 12 in 84 days · owner model · testing cadence · board KPIs

Regulated Enterprise: Outsourcing Controls

Win condition: contract clauses aligned to operational resilience, TPRM, and audit rights.

TPRMContract Control Matrix™

Result Negotiation cycle 22wk → 9wk · renegotiated control schedule · exit plan

AI Programme: Governance Reset

Win condition: ISO 42001-aligned governance, model inventory, assurance pathways.

ISO 42001AI Accountability Stack™

Result 0 → 214 models governed · control matrix · accountability map · audit artefacts

Global Bank: Incident Response Overhaul

Win condition: regulatory-grade incident classification, escalation, and evidence chain under NIS2.

NIS2Crisis Decision Hierarchy

Result MTTR 14d → 2.1d · 24/7 playbooks · board escalation SLA · regulator pack

Insurer: Cloud Security Architecture

Win condition: zero-trust posture validated against NIST 800-207 and FCA expectations.

NIST 800-207Board-Survivable Cyber Architecture™

Result 3 critical gaps → 0 · microsegmentation · PAM rollout · attestation dashboard

PE Portfolio: Cyber Due Diligence

Win condition: pre-acquisition security posture assessment with quantified remediation roadmap.

M&AOperational Integrity Index

Result 5 targets assessed · €2.3M risk quantified · 2 deal-breakers identified · remediation priced

Organisations do not lose systems first. They lose decision authority. Then everything else follows.
— Doctrine Principle · Crisis Decision Hierarchy
How I Engage

A predictable path from briefing to mandate.

Three stages. Procurement-grade artefacts at every step. Designed for boards under regulatory scrutiny.

Discovery Briefing

A 60-minute confidential conversation. We map the decision authority gap, regulatory exposure window, and the artefacts your board, regulator, or counterparty will require.

Duration: 60 min · No-cost · NDA optional

Mandate Definition

A signed scope tied to specific outcomes — control closures, evidence chains, governance architecture, or interim CISO coverage. Procurement-grade contract on day one.

Duration: 5 working days · Board resolution where required

Delivery & Artefacts

Doctrine-grade execution against the mandate. Every output is regulator-ready and board-survivable: control matrices, evidence chains, accountability maps, decision papers.

Duration: 6 weeks – 9 months · Cadence agreed in stage 2
Why Retain Me

Senior authority. Direct delivery. No partner-tier markup.

When the regulator is already in the building, the work cannot be delegated to junior consultants. It has to land with the named principal.

Senior Authority Direct

The principal who signs the doctrine is the principal who delivers it. No partner-to-junior handoff.

vs Big-4: partner-led sale, manager-tier delivery, junior-tier execution.
Procurement-Grade Artefacts

Every output is regulator-ready and board-survivable. Evidence chains, accountability maps, decision papers — not slideware.

vs in-house: internal teams ship slide decks; mandates require artefact chains under audit-grade scrutiny.
Board-Survivable Doctrine

900 published doctrine frameworks, peer-reviewed at UCL & Imperial. The IP that the work runs on is named, citable, and counterparty-validated.

vs generic advisory: generic frameworks; this work runs on named, peer-reviewed doctrine.
Technical & Professional Profile

Skills & Competencies

Certifications

CISSPCISMCRISCCCSPTOGAF 9ISO 27001 LA/LIISO 42001ITILCOBIT

Governance & Risk

DORANIS2EU AI ActGDPRFCA / PRAIT Risk FrameworksKRI Library DesignGroup Policy HarmonisationBoard ReportingM&A Due DiligenceNIST CSFISO 31000BCM / DR

SIEM / SOC / Detection

Microsoft SentinelKQL DetectionIBM QRadarSplunkArcSight ESMDatadogUEBAML Anomaly DetectionSOC ImplementationDetection-as-Code

Endpoint / EDR / Cloud

CrowdStrike FalconSentinelOneMicrosoft Defender XDRAzure DefenderCarbon BlackQualysTenableRapid7 InsightVMZero TrustCAF A–D

SOAR / Automation / IR

Splunk SOARPalo Alto XSOARPython ScriptingDFIRThreat HuntingSTIX / TAXIIMITRE ATT&CKRegulator NotificationMSSP Governance

AI Engineering

RAG Pipeline ArchitectureLLM SecurityOWASP LLM Top 10RAGAS / DeepEvalFAISS / Vector SearchWhisper / ASRBM25 Hybrid SearchAI Governance
Governance Lineage Deloitte PwC EY KPMG
Research & Publications Peer-Reviewed Research UCL & Imperials ISACA & (ISC)² Regulatory Frameworks Institutional Doctrine
Explore

Institutional Governance Architecture

Navigate the complete governance doctrine — from proprietary frameworks and research to regulatory intelligence and strategic threat analysis.

2026 Threat Frontier

AI + Cyber Security

As AI reshapes the attack surface — LLM exploitation, adversarial prompts, deepfake phishing — your security architecture must operate at the intersection of governance and engineering. 27 years of cyber delivery meets the 2026 AI threat landscape.

LLM SecurityOWASP Top 10

Prompt Injection & LLM Defence

Adversarial prompt testing, jailbreak detection, and output sanitisation frameworks. OWASP LLM Top 10 assessment methodology. AI model sandboxing, guardrail architecture, and data leakage prevention for enterprise LLM deployments.

  • → Prompt injection penetration testing
  • → System prompt extraction prevention
  • → RAG poisoning defences
  • → Output filtering architectures
Azure MLSIEM AI

AI-Driven Threat Detection

ML anomaly detection integrated with Microsoft Sentinel. Behavioural baselines using Azure ML. Automated triage reduction: 60% fewer false positives through ML-assisted rule tuning. UEBA (User & Entity Behaviour Analytics) deployment for insider threat detection.

  • → Sentinel ML-powered detection
  • → Behavioural anomaly baselines
  • → UEBA insider threat modelling
  • → AI-assisted SOC automation
EU AI ActISO 42001

AI Governance & Model Risk

EU AI Act Article 9 risk management. Model inventory, bias testing, and transparency documentation for high-risk AI systems. AI incident classification under DORA and NIS2. ISO 42001 AI management system implementation and certification readiness.

  • → High-risk AI system registration
  • → Model risk register & testing
  • → AI incident reporting (DORA/NIS2)
  • → ISO 42001 gap analysis

AI Threat Coverage

Deepfake phishing · Model inversion · Training data poisoning · Supply chain AI attacks · Shadow AI governance

View AI Security Portfolio →
2026-05-10 · OT / ICS Doctrine

Industrial Resilience Doctrine — 21 Papers, May 2026

Latest institutional release: 21 OT/ICS doctrine papers (v4.0/v4.1) covering Purdue, IEC 62443-3-3, DORA Chapter III, NIS2 Article 21, IEC 61511, and IEC 62439-3 PRP/HSR alignment for board-grade cyber-physical resilience. Read the local PDF or view the Drive mirror.

Operationalising OT Cyber Risk

A Board-to-Plant-Floor Operating Model Translating Risk Appetite into PLC Configuration

From Compliance to Control

A Clause-by-Clause Engineering Crosswalk Between IEC 62443-3-3 DORA Chapter III and NIS2 Article 21

Industrial Cyber Resilience by Design

Cyber-Physical Systems Under IEC 61511 Functional Safety and Adversarial Cyber Stress

Engineering Survivable OT Architectures

IEC 62439-3 PRP-HSR Graceful Degradation and Island-Mode Under Adversarial Compromise

Quantifying OT Risk

A Transparent Monte Carlo Method for Translating SCADA ICS and DCS Threats into Defensible Capital Decisions

Design Authority for Industrial Networks

A Charter Operating Model and Conflict-Resolution Framework for IT-OT Convergent Network Governance

Enterprise Network Architecture for OT

Evolving Purdue — Modbus-DNP3-CIP DPI Micro-Segmentation and IIoT Vendor Access

Designing Hybrid OT Connectivity

Azure AWS Edge and Data-Centre Integration Under Latency and Sovereignty Constraints

Governing Multi-Vendor Network Architectures in Critical Infrastructure

SBOMs DORA CTPP and Vendor-Governance for Industrial Estates

Industrial Network Resilience

PROFINET IRT IEC 61850 GOOSE BGP-MPLS Failover and Deterministic Networking for Mission-Critical Industrial Estates

Zero Trust for ICS in Practice

Identity-Aware Overlays Protocol Proxies and Lateral-Movement Defeat for Headless Industrial Devices

Industrial Segmentation Reimagined

Static VLANs to Software-Defined Plant Networks with Risk-Based OT-Aware Peer-to-Peer Zones

Designing the Industrial DMZ

Reverse Proxies Jump Servers Dual-Homed Historians and Data Diodes — Engineering the IT-OT Trust Boundary

Identity and Privileged Access in OT

Break-Glass Procedures Just-in-Time Vendor Access and the MFA Constraint on the Plant Floor

OT/ICS Resilience Doctrine — Volume 15 (Drive Mirror)

Institutional cyber-physical doctrine release — drive mirror entry pending local PDF availability.

Failover Without Failure

Engineering Sub-Millisecond Continuity in Industrial Control Systems Using IEC 62439-3 PRP-HSR

Dependency Mapping in OT Systems

Eliminating Hidden Single Points of Failure Through Passive Discovery and Graph Analysis

SACDA Architecture for Modern Industry

Formal Specification of the Safe Autonomous Connected Distributed Edge-Native Architecture

SACDA Resilience Engineering

Run-Time Operationalisation of the Autonomous Edge — Local Control and Telemetry Queuing

Industrial Transformation Without Downtime

Ships-in-the-Night Architecture and Choreographed Cut-Over for 24-7 Industrial Estates

Contact Email Direct