Brussels-based · EU-focused · EMEA Delivery · DORA · NIS2 · EU AI Act · ISO 42001 · GDPR
Q3 2026 — Accepting Mandates 1 of 3 board-mandate slots remaining · Engagement requires executive authority or board resolution
92%
Backlog Closed
147 → 12 findings · 84 days
0
Supervisory Findings
Across 3 review cycles
214
AI Models Governed
From 0 baseline · ISO 42001
14d → 2.1d
MTTR Compression
NIS2-aligned incident response
900 Published Doctrines
Control Collapse Model™
Crisis Decision Hierarchy
Failure Cascade Mapping
Full Evidence Chains
Counterparty Validated
GDPR & DORA Compliant
UCL · Imperials
Contract Outcomes

Outcomes counterparties sign against

Representative outcomes (client identifiers withheld). Written in procurement language under regulatory scrutiny.

Tier-1 FS: DORA Transformation

Win condition: audit-ready operational resilience evidence chain.

DORAEvidence Chain Model™

Result 147 findings → 12 in 84 days · owner model · testing cadence · board KPIs

Regulated Enterprise: Outsourcing Controls

Win condition: contract clauses aligned to operational resilience, TPRM, and audit rights.

TPRMContract Control Matrix™

Result Negotiation cycle 22wk → 9wk · renegotiated control schedule · exit plan

AI Programme: Governance Reset

Win condition: ISO 42001-aligned governance, model inventory, assurance pathways.

ISO 42001AI Accountability Stack™

Result 0 → 214 models governed · control matrix · accountability map · audit artefacts

Global Bank: Incident Response Overhaul

Win condition: regulatory-grade incident classification, escalation, and evidence chain under NIS2.

NIS2Crisis Decision Hierarchy

Result MTTR 14d → 2.1d · 24/7 playbooks · board escalation SLA · regulator pack

Insurer: Cloud Security Architecture

Win condition: zero-trust posture validated against NIST 800-207 and FCA expectations.

NIST 800-207Board-Survivable Cyber Architecture™

Result 3 critical gaps → 0 · microsegmentation · PAM rollout · attestation dashboard

PE Portfolio: Cyber Due Diligence

Win condition: pre-acquisition security posture assessment with quantified remediation roadmap.

M&AOperational Integrity Index

Result 5 targets assessed · €2.3M risk quantified · 2 deal-breakers identified · remediation priced

Organisations do not lose systems first. They lose decision authority. Then everything else follows.
— Doctrine Principle · Crisis Decision Hierarchy
How I Engage

A predictable path from briefing to mandate.

Three stages. Procurement-grade artefacts at every step. Designed for boards under regulatory scrutiny.

Stage 1

Discovery Briefing

A 60-minute confidential conversation. We map the decision authority gap, regulatory exposure window, and the artefacts your board, regulator, or counterparty will require.

Duration: 60 min · No-cost · NDA optional
Stage 2

Mandate Definition

A signed scope tied to specific outcomes — control closures, evidence chains, governance architecture, or interim CISO coverage. Procurement-grade contract on day one.

Duration: 5 working days · Board resolution where required
Stage 3

Delivery & Artefacts

Doctrine-grade execution against the mandate. Every output is regulator-ready and board-survivable: control matrices, evidence chains, accountability maps, decision papers.

Duration: 6 weeks – 9 months · Cadence agreed in stage 2
Why Retain Me

Senior authority. Direct delivery. No partner-tier markup.

When the regulator is already in the building, the work cannot be delegated to junior consultants. It has to land with the named principal.

Senior Authority Direct

The principal who signs the doctrine is the principal who delivers it. No partner-to-junior handoff.

vs Big-4: partner-led sale, manager-tier delivery, junior-tier execution.
Procurement-Grade Artefacts

Every output is regulator-ready and board-survivable. Evidence chains, accountability maps, decision papers — not slideware.

vs in-house: internal teams ship slide decks; mandates require artefact chains under audit-grade scrutiny.
Board-Survivable Doctrine

900 published doctrine frameworks, peer-reviewed at UCL & Imperial. The IP that the work runs on is named, citable, and counterparty-validated.

vs generic advisory: generic frameworks; this work runs on named, peer-reviewed doctrine.
Governance Lineage Deloitte PwC EY KPMG
Research & Publications Peer-Reviewed Research UCL & Imperials ISACA & (ISC)² Regulatory Frameworks Institutional Doctrine
Explore

Institutional Governance Architecture

Navigate the complete governance doctrine — from proprietary frameworks and research to regulatory intelligence and strategic threat analysis.

Foundation
Doctrine
IP
Frameworks
Innovation
Research & Labs
Threats
Threat Radar
Strategy
Intelligence
Compliance
Regulatory Hub
Library
Publications
Engage
Contact
2026 Threat Frontier

AI + Cyber Security

As AI reshapes the attack surface — LLM exploitation, adversarial prompts, deepfake phishing — your security architecture must operate at the intersection of governance and engineering. 27 years of cyber delivery meets the 2026 AI threat landscape.

LLM SecurityOWASP Top 10

Prompt Injection & LLM Defence

Adversarial prompt testing, jailbreak detection, and output sanitisation frameworks. OWASP LLM Top 10 assessment methodology. AI model sandboxing, guardrail architecture, and data leakage prevention for enterprise LLM deployments.

  • → Prompt injection penetration testing
  • → System prompt extraction prevention
  • → RAG poisoning defences
  • → Output filtering architectures
Azure MLSIEM AI

AI-Driven Threat Detection

ML anomaly detection integrated with Microsoft Sentinel. Behavioural baselines using Azure ML. Automated triage reduction: 60% fewer false positives through ML-assisted rule tuning. UEBA (User & Entity Behaviour Analytics) deployment for insider threat detection.

  • → Sentinel ML-powered detection
  • → Behavioural anomaly baselines
  • → UEBA insider threat modelling
  • → AI-assisted SOC automation
EU AI ActISO 42001

AI Governance & Model Risk

EU AI Act Article 9 risk management. Model inventory, bias testing, and transparency documentation for high-risk AI systems. AI incident classification under DORA and NIS2. ISO 42001 AI management system implementation and certification readiness.

  • → High-risk AI system registration
  • → Model risk register & testing
  • → AI incident reporting (DORA/NIS2)
  • → ISO 42001 gap analysis

AI Threat Coverage

Deepfake phishing · Model inversion · Training data poisoning · Supply chain AI attacks · Shadow AI governance

View AI Security Portfolio →
Request Private Briefing
2026-05-01 · OT / ICS Doctrine

Industrial Resilience Doctrine — 21 Papers, May 2026

Latest institutional release: 21 OT/ICS doctrine papers (v4.0/v4.1) covering Purdue, IEC 62443-3-3, DORA Chapter III, NIS2 Article 21, IEC 61511, and IEC 62439-3 PRP/HSR alignment for board-grade cyber-physical resilience. Read the local PDF or view the Drive mirror.

Paper 01

Operationalising OT Cyber Risk

A Board-to-Plant-Floor Operating Model Translating Risk Appetite into PLC Configuration

Paper 02

From Compliance to Control

A Clause-by-Clause Engineering Crosswalk Between IEC 62443-3-3 DORA Chapter III and NIS2 Article 21

Paper 03

Industrial Cyber Resilience by Design

Cyber-Physical Systems Under IEC 61511 Functional Safety and Adversarial Cyber Stress

Paper 04

Engineering Survivable OT Architectures

IEC 62439-3 PRP-HSR Graceful Degradation and Island-Mode Under Adversarial Compromise

Paper 05

Quantifying OT Risk

A Transparent Monte Carlo Method for Translating SCADA ICS and DCS Threats into Defensible Capital Decisions

Paper 06

Design Authority for Industrial Networks

A Charter Operating Model and Conflict-Resolution Framework for IT-OT Convergent Network Governance

Paper 07

Enterprise Network Architecture for OT

Evolving Purdue — Modbus-DNP3-CIP DPI Micro-Segmentation and IIoT Vendor Access

Paper 08

Designing Hybrid OT Connectivity

Azure AWS Edge and Data-Centre Integration Under Latency and Sovereignty Constraints

Paper 09

Governing Multi-Vendor Network Architectures in Critical Infrastructure

SBOMs DORA CTPP and Vendor-Governance for Industrial Estates

Paper 10

Industrial Network Resilience

PROFINET IRT IEC 61850 GOOSE BGP-MPLS Failover and Deterministic Networking for Mission-Critical Industrial Estates

Paper 11

Zero Trust for ICS in Practice

Identity-Aware Overlays Protocol Proxies and Lateral-Movement Defeat for Headless Industrial Devices

Paper 12

Industrial Segmentation Reimagined

Static VLANs to Software-Defined Plant Networks with Risk-Based OT-Aware Peer-to-Peer Zones

Paper 13

Designing the Industrial DMZ

Reverse Proxies Jump Servers Dual-Homed Historians and Data Diodes — Engineering the IT-OT Trust Boundary

Paper 14

Identity and Privileged Access in OT

Break-Glass Procedures Just-in-Time Vendor Access and the MFA Constraint on the Plant Floor

Paper 15

OT/ICS Resilience Doctrine — Volume 15 (Drive Mirror)

Institutional cyber-physical doctrine release — drive mirror entry pending local PDF availability.

Paper 16

Failover Without Failure

Engineering Sub-Millisecond Continuity in Industrial Control Systems Using IEC 62439-3 PRP-HSR

Paper 17

Dependency Mapping in OT Systems

Eliminating Hidden Single Points of Failure Through Passive Discovery and Graph Analysis

Paper 18

SACDA Architecture for Modern Industry

Formal Specification of the Safe Autonomous Connected Distributed Edge-Native Architecture

Paper 19

SACDA Resilience Engineering

Run-Time Operationalisation of the Autonomous Edge — Local Control and Telemetry Queuing

Paper 20

Industrial Transformation Without Downtime

Ships-in-the-Night Architecture and Choreographed Cut-Over for 24-7 Industrial Estates

Paper 21

The Unified Industrial Resilience Model

A Mathematically-Specified Empirically-Calibrated System Unifying the Doctrine

Contact Email Direct