Global · Multi-jurisdictional · Sovereign Authority · DORA · NIS2 · EU AI Act · ISO 42001 · GDPR
92%
Backlog Closed
147 → 12 findings · 84 days
0
Supervisory Findings
Across 3 review cycles
214
AI Models Governed
From 0 baseline · ISO 42001
14d → 2.1d
MTTR Compression
NIS2-aligned incident response
900 Published Doctrines
Control Collapse Model™
Crisis Decision Hierarchy
Failure Cascade Mapping
Full Evidence Chains
Counterparty Validated
GDPR & DORA Compliant
UCL · Imperials
Contract Outcomes

Outcomes counterparties sign against

Representative outcomes (client identifiers withheld). Written in procurement language under regulatory scrutiny.

Tier-1 FS: DORA Transformation

Win condition: audit-ready operational resilience evidence chain.

DORAEvidence Chain Model™

Result 147 findings → 12 in 84 days · owner model · testing cadence · board KPIs

Regulated Enterprise: Outsourcing Controls

Win condition: contract clauses aligned to operational resilience, TPRM, and audit rights.

TPRMContract Control Matrix™

Result Negotiation cycle 22wk → 9wk · renegotiated control schedule · exit plan

AI Programme: Governance Reset

Win condition: ISO 42001-aligned governance, model inventory, assurance pathways.

ISO 42001AI Accountability Stack™

Result 0 → 214 models governed · control matrix · accountability map · audit artefacts

Global Bank: Incident Response Overhaul

Win condition: regulatory-grade incident classification, escalation, and evidence chain under NIS2.

NIS2Crisis Decision Hierarchy

Result MTTR 14d → 2.1d · 24/7 playbooks · board escalation SLA · regulator pack

Insurer: Cloud Security Architecture

Win condition: zero-trust posture validated against NIST 800-207 and FCA expectations.

NIST 800-207Board-Survivable Cyber Architecture™

Result 3 critical gaps → 0 · microsegmentation · PAM rollout · attestation dashboard

PE Portfolio: Cyber Due Diligence

Win condition: pre-acquisition security posture assessment with quantified remediation roadmap.

M&AOperational Integrity Index

Result 5 targets assessed · €2.3M risk quantified · 2 deal-breakers identified · remediation priced

Organisations do not lose systems first. They lose decision authority. Then everything else follows.
— Doctrine Principle · Crisis Decision Hierarchy
How I Engage

A predictable path from briefing to mandate.

Three stages. Procurement-grade artefacts at every step. Designed for boards under regulatory scrutiny.

Discovery Briefing

A 60-minute confidential conversation. We map the decision authority gap, regulatory exposure window, and the artefacts your board, regulator, or counterparty will require.

Duration: 60 min · No-cost · NDA optional

Mandate Definition

A signed scope tied to specific outcomes — control closures, evidence chains, governance architecture, or interim CISO coverage. Procurement-grade contract on day one.

Duration: 5 working days · Board resolution where required

Delivery & Artefacts

Doctrine-grade execution against the mandate. Every output is regulator-ready and board-survivable: control matrices, evidence chains, accountability maps, decision papers.

Duration: 6 weeks – 9 months · Cadence agreed in stage 2
Why Retain Me

Senior authority. Direct delivery. No partner-tier markup.

When the regulator is already in the building, the work cannot be delegated to junior consultants. It has to land with the named principal.

Senior Authority Direct

The principal who signs the doctrine is the principal who delivers it. No partner-to-junior handoff.

vs Big-4: partner-led sale, manager-tier delivery, junior-tier execution.
Procurement-Grade Artefacts

Every output is regulator-ready and board-survivable. Evidence chains, accountability maps, decision papers — not slideware.

vs in-house: internal teams ship slide decks; mandates require artefact chains under audit-grade scrutiny.
Board-Survivable Doctrine

900 published doctrine frameworks, peer-reviewed at UCL & Imperial. The IP that the work runs on is named, citable, and counterparty-validated.

vs generic advisory: generic frameworks; this work runs on named, peer-reviewed doctrine.
Anonymised References

Validation from Tier-1 environments.

Named references available under NDA. Quotes condensed and anonymised for compliance.

  • Delivered board-ready evidence under severe timeline pressure.
    — CISO, Tier-1 Financial Services
  • Converted fragmented governance into an auditable operating model.
    — Programme Director, Regulated Enterprise
  • Operated at board, CISO and delivery-team level without handoff risk.
    — Transformation Sponsor, EU CNI Operator

Quotes presented in anonymised form to respect client confidentiality. Full attribution and reference letters available under NDA to qualified procurement, board, and regulator-side counterparties.

Enterprise Delivery Lineage

Provenance from the world’s largest delivery environments.

Senior authority direct — shaped by, and operationally fluent within, the audit, advisory, consulting, technology and managed-service ecosystems that boards, regulators, and procurement teams already trust.

Big 4 — Audit, Risk & Advisory
  • DeloitteAudit, risk advisory & consulting
  • PwCAssurance, risk & consulting
  • EYAssurance, advisory & consulting
  • KPMGAudit, risk & advisory
Global IT Services & Consulting
  • AccentureIT services & strategy consulting
  • IBM ConsultingTechnology, AI & Cloud
  • CapgeminiCloud & digital transformation
  • CognizantIT services & business transformation
  • InfosysIT services & digital solutions
  • Tata Consultancy ServicesGlobal IT consulting (TCS)
  • NTT DATAIT services & cloud
  • BT Global ServicesEnterprise networking & managed services
  • MastekIT services & enterprise integration
Enterprise Technology & Platforms
  • DellEnterprise infrastructure & services
  • MicrosoftCloud, enterprise software & services

Why this matters. Procurement, board, and CISO offices read these names as proxies for operating tempo, multi-vendor fluency, audit-grade discipline, and regulated-sector cadence. Retain me directly and that lineage is preserved — without partner-tier markup and without delegation to junior tiers.

Company names appear solely to describe prior professional experience within and alongside teams from these organisations as part of previous employment. No endorsement, sponsorship, partnership, or current affiliation is implied. References available under NDA where appropriate.

Technical & Professional Profile

Skills & Competencies

Certifications

CISSPCISMCRISCCCSPTOGAF 9ISO 27001 LA/LIISO 42001ITILCOBIT

Governance & Risk

DORANIS2EU AI ActGDPRFCA / PRAIT Risk FrameworksKRI Library DesignGroup Policy HarmonisationBoard ReportingM&A Due DiligenceNIST CSFISO 31000BCM / DR

SIEM / SOC / Detection

Microsoft SentinelKQL DetectionIBM QRadarSplunkArcSight ESMDatadogUEBAML Anomaly DetectionSOC ImplementationDetection-as-Code

Endpoint / EDR / Cloud

CrowdStrike FalconSentinelOneMicrosoft Defender XDRAzure DefenderCarbon BlackQualysTenableRapid7 InsightVMZero TrustCAF A–D

SOAR / Automation / IR

Splunk SOARPalo Alto XSOARPython ScriptingDFIRThreat HuntingSTIX / TAXIIMITRE ATT&CKRegulator NotificationMSSP Governance

AI Engineering

RAG Pipeline ArchitectureLLM SecurityOWASP LLM Top 10RAGAS / DeepEvalFAISS / Vector SearchWhisper / ASRBM25 Hybrid SearchAI Governance
Governance Lineage Deloitte PwC EY KPMG
Research & Publications Peer-Reviewed Research UCL & Imperials ISACA & (ISC)² Regulatory Frameworks Institutional Doctrine
Explore

Institutional Governance Architecture

Navigate the complete governance doctrine — from proprietary frameworks and research to regulatory intelligence and strategic threat analysis.

2026 Threat Frontier

AI + Cyber Security

As AI reshapes the attack surface — LLM exploitation, adversarial prompts, deepfake phishing — your security architecture must operate at the intersection of governance and engineering. 27 years of cyber delivery meets the 2026 AI threat landscape.

LLM SecurityOWASP Top 10

Prompt Injection & LLM Defence

Adversarial prompt testing, jailbreak detection, and output sanitisation frameworks. OWASP LLM Top 10 assessment methodology. AI model sandboxing, guardrail architecture, and data leakage prevention for enterprise LLM deployments.

  • → Prompt injection penetration testing
  • → System prompt extraction prevention
  • → RAG poisoning defences
  • → Output filtering architectures
Azure MLSIEM AI

AI-Driven Threat Detection

ML anomaly detection integrated with Microsoft Sentinel. Behavioural baselines using Azure ML. Automated triage reduction: 60% fewer false positives through ML-assisted rule tuning. UEBA (User & Entity Behaviour Analytics) deployment for insider threat detection.

  • → Sentinel ML-powered detection
  • → Behavioural anomaly baselines
  • → UEBA insider threat modelling
  • → AI-assisted SOC automation
EU AI ActISO 42001

AI Governance & Model Risk

EU AI Act Article 9 risk management. Model inventory, bias testing, and transparency documentation for high-risk AI systems. AI incident classification under DORA and NIS2. ISO 42001 AI management system implementation and certification readiness.

  • → High-risk AI system registration
  • → Model risk register & testing
  • → AI incident reporting (DORA/NIS2)
  • → ISO 42001 gap analysis

AI Threat Coverage

Deepfake phishing · Model inversion · Training data poisoning · Supply chain AI attacks · Shadow AI governance

View AI Security Portfolio →
Delivery Lineage · Wordmarks

Operationally fluent across the world’s largest delivery environments.

A visual recap of the audit, advisory, consulting, IT services, and platform organisations whose teams Kieran has worked within or alongside. See full context →

  • Big 4Deloitte
  • Big 4PwC
  • Big 4EY
  • Big 4KPMG
  • IT ServicesAccenture
  • IT ServicesIBM Consulting
  • IT ServicesCapgemini
  • IT ServicesCognizant
  • IT ServicesInfosys
  • IT ServicesTata Consultancy Services
  • IT ServicesNTT DATA
  • IT ServicesBT Global Services
  • IT ServicesMastek
  • PlatformsDell
  • PlatformsMicrosoft

Names are rendered as typographic wordmark representations only. Corporate logos and trademarks remain the property of their respective owners; no endorsement, sponsorship, partnership, or current affiliation is implied. References available under NDA where appropriate.

Claims · Defined

Defensible by construction. Audit-grade by definition.

Each headline claim on this page is scoped, measurable, and defensible. The definitions below set out exactly what each term means and how the figure was produced.

Peer-reviewed
Reviewed by Schiphol University academic faculty and Imperial College / UCL practitioner reviewers within the institutional doctrine series. Reviewer notes retained on file; sample notes available under NDA.
Counterparty-validated
Reviewed and formally accepted by the engaging counterparty — board, audit committee, regulator-facing function, internal audit, or procurement — within the scope of a signed mandate.
Zero breaches
Zero confirmed security breaches across the systems and control planes under direct mandate authority during the four-year retained-mandate period. Scope excludes systems outside the mandate boundary or operated by other parties.
Tier-1 boards
Regulated financial institutions, sovereign and CNI operators, and listed enterprises with full board-level cyber-governance oversight obligations under DORA, NIS2, EU AI Act, GDPR, or equivalent regimes.
900 publications
The institutional doctrine series — peer-reviewed doctrine papers, governance frameworks, technical specifications, and briefs — published since 2019. Searchable in full from the publications library.

This glossary exists to convert strong claims into defensible claims. If a definition or scope is unclear, request a clarification note before relying on the figure in board, audit, or procurement settings.

2026-05-10 · OT / ICS Doctrine

Industrial Resilience Doctrine — 21 Papers, May 2026

Latest institutional release: 21 OT/ICS doctrine papers (v4.0/v4.1) covering Purdue, IEC 62443-3-3, DORA Chapter III, NIS2 Article 21, IEC 61511, and IEC 62439-3 PRP/HSR alignment for board-grade cyber-physical resilience. Read the local PDF or view the Drive mirror.

Operationalising OT Cyber Risk

A Board-to-Plant-Floor Operating Model Translating Risk Appetite into PLC Configuration

From Compliance to Control

A Clause-by-Clause Engineering Crosswalk Between IEC 62443-3-3 DORA Chapter III and NIS2 Article 21

Industrial Cyber Resilience by Design

Cyber-Physical Systems Under IEC 61511 Functional Safety and Adversarial Cyber Stress

Engineering Survivable OT Architectures

IEC 62439-3 PRP-HSR Graceful Degradation and Island-Mode Under Adversarial Compromise

Quantifying OT Risk

A Transparent Monte Carlo Method for Translating SCADA ICS and DCS Threats into Defensible Capital Decisions

Design Authority for Industrial Networks

A Charter Operating Model and Conflict-Resolution Framework for IT-OT Convergent Network Governance

Enterprise Network Architecture for OT

Evolving Purdue — Modbus-DNP3-CIP DPI Micro-Segmentation and IIoT Vendor Access

Designing Hybrid OT Connectivity

Azure AWS Edge and Data-Centre Integration Under Latency and Sovereignty Constraints

Governing Multi-Vendor Network Architectures in Critical Infrastructure

SBOMs DORA CTPP and Vendor-Governance for Industrial Estates

Industrial Network Resilience

PROFINET IRT IEC 61850 GOOSE BGP-MPLS Failover and Deterministic Networking for Mission-Critical Industrial Estates

Zero Trust for ICS in Practice

Identity-Aware Overlays Protocol Proxies and Lateral-Movement Defeat for Headless Industrial Devices

Industrial Segmentation Reimagined

Static VLANs to Software-Defined Plant Networks with Risk-Based OT-Aware Peer-to-Peer Zones

Designing the Industrial DMZ

Reverse Proxies Jump Servers Dual-Homed Historians and Data Diodes — Engineering the IT-OT Trust Boundary

Identity and Privileged Access in OT

Break-Glass Procedures Just-in-Time Vendor Access and the MFA Constraint on the Plant Floor

OT/ICS Resilience Doctrine — Volume 15 (Drive Mirror)

Institutional cyber-physical doctrine release — drive mirror entry pending local PDF availability.

Failover Without Failure

Engineering Sub-Millisecond Continuity in Industrial Control Systems Using IEC 62439-3 PRP-HSR

Dependency Mapping in OT Systems

Eliminating Hidden Single Points of Failure Through Passive Discovery and Graph Analysis

SACDA Architecture for Modern Industry

Formal Specification of the Safe Autonomous Connected Distributed Edge-Native Architecture

SACDA Resilience Engineering

Run-Time Operationalisation of the Autonomous Edge — Local Control and Telemetry Queuing

Read PDF
Kieran Upadrasta refers to the institutional cyber governance practice of Professor Kieran Upadrasta, operating across the United Kingdom, the European Union, and multi-jurisdictional regulated environments. The practice and its named doctrine — Board-Survivable Cyber Architecture™, The Evidence Chain Model™, Decision Rights Architecture™, Recoverability Mandate™, Contract Control Matrix™, and AI Accountability Stack™ — are the intellectual property of Kieran Upadrasta and may not be reproduced, distributed, or adapted without prior written permission. This site is provided for informational and professional engagement purposes only. Content does not constitute legal, regulatory, or financial advice and is not a substitute for engagement under contract. See also , , and .