Services

Strategy, oversight, execution—done right

I help organisations build resilient, compliant, and pragmatic security and privacy programmes.

1. Board & Executive Assurance

I deliver clarity, control, and resilience—trusted by boards and executives to restore confidence and unlock business growth under pressure.

  1. 15+ years protecting enterprises, infrastructure, and SaaS against operational, reputational, and legal risk;
  2. Board-level partner to executives, regulators, and investors across scale-ups and global multinationals;
  3. Executive leadership of security, privacy, and resilience programmes in highly regulated industries;
  4. Proven record in converting board strategy into measurable outcomes across business, IT, and cloud;
  5. Crisis-tested in restoring trust after compliance failures, investigations, breaches, and incidents;
  6. Deep GRC and operational resilience expertise, bridging technical remediation with legal demands;
  7. Track record delivering frameworks and certifications that withstand audits, regulators, and investors;
  8. Offensive and defensive depth in penetration testing, application security, and infrastructure hardening;
  9. Mastery of ISO 27K, SOC 2, GDPR, NIS2, DORA, AI Act, CRA, BIO2, and global frameworks;
  10. Enabled M&A, investment, and market entry in finance, healthcare, telecommunications, and SaaS;
  11. Trusted to resolve regulatory investigations and avert organisations from multimillion-euro penalties.

2. Cybersecurity, Risk & Compliance Leadership

Delivering pragmatic, industry-aligned security leadership—enabling informed risk decisions, measurable assurance, and compliance.

  1. Develop and drive the security strategy and roadmap in line with stakeholder needs;
  2. Report on risks, compliance, and maturity to boards and executive leadership;
  3. Lead enterprise risk assessments, treatment, and control design to reduce risk exposure;
  4. Conduct reviews, audits, and gap analyses (ISO/IEC 27001, NIS2, DORA, BIO2, NEN 7510);
  5. Track legal and regulatory changes (NIS2, CRA) and update internal controls;
  6. Establish and enforce security policies, procedures, and baselines (CIS, NIST SP 800);
  7. Deliver security awareness and training across departments and leadership;
  8. Guide secure architecture, design principles, IAM strategy, and Zero Trust adoption;
  9. Drive BCP/DR planning and vulnerability management (CVEs, OWASP Top 10, CVD);
  10. Build security operations centres (SOC) and incident response teams (CSIRT);
  11. Oversee security operations, workforce, budget, and resource alignment;
  12. Direct incident response, digital forensics, and regulator/crisis communications;
  13. Coordinate playbooks, tabletop exercises, simulations, and red/blue/purple teaming;
  14. Manage cyber insurance coverage, policy conditions, and claims exposure;
  15. Drive OKRs, KPIs/KRIs, and report risk posture to executives and the board;
  16. Manage audits, third-party risk, contractual controls, and supply chain control gaps;
  17. Maintain and validate assurance artefacts (ISO 27K, ISAE, SSAE, SOC 2, PCI-DSS, BCRs);
  18. Conduct capability maturity assessments (CMMI) and support investor due diligence;
  19. Align ISMS operations with ISO/IEC 27001, 27017, and industry benchmarks;
  20. Advise senior leadership on governance, risk appetite, and cross-functional alignment.

3. Data Protection, Privacy & AI Risk Management

Leading enterprise-wide privacy governance—balancing data-driven innovation with ethical AI, regulatory compliance, and accountability.

  1. Develop and drive the data protection strategy in line with stakeholder needs;
  2. Report on privacy risks, compliance, and maturity to boards and executive leadership;
  3. Lead enterprise risk assessments, treatment, and control design to reduce risk exposure;
  4. Conduct DPIAs, LIAs, TIAs, and AI risk assessments (FRIAs) for high-risk processing;
  5. Monitor the evolving regulatory landscape, particularly in the EU, UK, and US;
  6. Track regulatory guidance (EDPB, DPAs, ICO, FTC) and federal & international rulings;
  7. Maintain and optimise RoPAs, data retention schedules, and lawful bases under GDPR;
  8. Develop and review privacy policies, notices, and mechanisms aligned with FIPPs;
  9. Negotiate and review DPAs, cross-border data transfers, and joint controllerships;
  10. Maintain and validate assurance artefacts (BCRs, SCCs, ISO 27K, ISAE, SSAE, SOC 2);
  11. Advance PIMS maturity with ISO/IEC 27701, 27018, EDPB guidance, and EU data strategy;
  12. Direct audits, breach response, and notifications to regulators and data subjects;
  13. Handle DSARs and engage with the Dutch DPA and other European regulators;
  14. Advise on transparency obligations, consent strategies, and cookie compliance;
  15. Drive fairness, explainability, and accountability under the EU AI Act;
  16. Direct implementation of privacy-by-design and privacy-enhancing technologies (PETs);
  17. Lead awareness and training programmes on data protection and responsible AI.

4. Secure Engineering & Cloud Resilience

Driving secure engineering—bridging software development, cloud infrastructure, and security operations to enable digital transformation.

  1. Define and adopt secure architecture and design principles to enhance risk posture;
  2. Embed threat modelling (STRIDE, attack trees, abuse-case scenarios) into SDLC;
  3. Conduct code reviews to identify OWASP Top 10 issues, CWEs, and ASVS non-conformities;
  4. Perform penetration testing and vulnerability scanning with actionable PoCs;
  5. Assess API security, auth protocols (OAuth2, OIDC, JWT), and secrets management;
  6. Integrate and tune SAST, DAST, and IAST security gates in CI/CD pipelines;
  7. Secure software supply chains using SBOMs, SCA, and license compliance;
  8. Guide secure coding, IaC practices, cloud architecture on AWS, Azure, and GCP;
  9. Harden OS and containers on Linux, Docker, and Kubernetes with security baselines;
  10. Improve detection and response via logging, audit trails, and runtime monitoring;
  11. Harden deployments with secure defaults, rollback support, and DR automation;
  12. Champion shift-left practices and security-by-design across engineering teams.

Why work with me

15+ years of leadership, impact, and delivery

This isn’t just my profession—it’s my domain.

I bring nearly two decades of senior experience across cybersecurity, data protection, security engineering, and regulatory compliance. My hybrid expertise is rooted in execution, not just theory. I’ve secured regulatory approvals, strengthened resilience through certified management systems, cut liability and risk exposure, and led organisations through audits and investor due diligence. I don’t just advise; I architect, implement, and deliver. I know what works and what wastes time.

  • Deep hands-on expertise Hard-won knowledge of what actually works.
  • Fluency across domains Connecting business, legal, and engineering.
  • Execution that builds resilience Strengthened trust and reduced risk.
  • Independent and discreet A neutral partner who cuts through politics.
  • Capability transfer I upskill your people, not replace them.
  • No guesswork Evidence-driven decisions, not assumptions.
  • No one-size-fits-all Solutions tailored to your risk reality.
  • No lock-in Autonomy delivered, dependency avoided.
  • No paper compliance Controls that function in practice.
  • No fear tactics I bring facts, clarity, and assurance.

Who I work with

Executives seeking clarity and assurance

If you need senior expertise across strategic, legal, and technical domains—you’re in the right place.
  • Boards & Executives

    Discreet advisory, risk oversight, governance, and leadership balancing strategy with hands-on execution.

  • Legal & Compliance

    TOMs, DPAs, cross-border transfers, M&A due diligence, and AI governance—made practical and defensible.

  • IT & Engineering

    Secure architecture, DevSecOps, cloud resilience, and vulnerability triage embedded into delivery.

  • Start-ups & Scale-ups

    Audit-readiness, certifications, M&A preparation, and investor due diligence, building trust at every growth stage.

  • Regulated Industries

    Protecting high-risk and high-sensitivity data in finance, health, and other sectors under heavy scrutiny.

  • SaaS Providers

    Designing multi-tenant platforms that scale securely, comply globally, and earn lasting customer trust.

FAQ

Straight answers

I lead with transparency so you can make informed decisions, not just comforting ones.

What differentiates you from a full-time employee?

When you hire me, you’re not onboarding someone who needs training, hand-holding, or months to get up to speed. You’re getting nearly two decades of hard-won experience across security, privacy, engineering, and legal domains. I ask the right questions, extract what matters, and get to work. You get outcomes, not overhead.

Unlike full-time hires, I’m not caught up in office politics or role preservation. I bring clarity, challenge assumptions, and lead with transparency. You get facts, not theatre. I’ve seen how internal politics and noise can obscure risk, slow progress, and distort reality. I cut through that with facts and focus. No employer risk. No hidden agenda. Just discreet, senior execution, where and when you need it.

How do your engagements typically work?

Flexible, independent, and outcome-driven.

Some clients retain me on a monthly basis for strategic oversight, risk advisory, or interim leadership. Others bring me in for tightly scoped projects, such as DPIAs, vendor assessments, internal ISO/IEC 27001 audits, or high-pressure remediation projects after incidents.

Scope, deliverables, and check-ins are defined up front—for focus, clarity, and accountability. I’m flexible, but lead decisively to protect outcomes and budgets. I’ve seen how some consultants inflate hours or let projects drift. That’s where I’m different: I keep scope tight, delivery sharp, and outcomes accountable.

I work independently on my own secured devices and drive execution while collaborating through your preferred tools, whether that’s email, Teams, Slack, or something else. This keeps things practical, efficient, and compliant with the Dutch Wet DBA—ensuring a clear, professional, and truly independent working relationship.

Are you hands-on, or do you just advise?

Both. Most assignments require a mix of strategic input and hands-on execution to deliver real results. I’ve seen teams left with abstract frameworks or stuck with vague recommendations that never land in practice. That’s not me. I make sure strategy translates into action, delivers outcomes, and holds up under scrutiny.

When you’re short on time, under pressure, or hitting roadblocks, I step in and help. Whether that means building registers, writing policies, conducting assessments, negotiating contracts, or managing crises, I roll up my sleeves and get it done. However, my goal isn’t to create dependence. Ultimately, I embed practices and transfer capabilities, leaving you stronger and more resilient than before.

What industries do you have experience in?

While I’m sector-agnostic, I’ve supported clients across e-commerce, healthcare, fintech, education, digital media, and government—handling regulated data, sensitive workloads, and critical systems.

I’ve worked across high-risk environments and apply proven methods tailored to your risk, regulatory obligations, and growth stage. I know what regulators expect, what partners and clients demand, and what investors scrutinise most. I’m also keenly aware of conflicting risk appetites and interests, particularly in commercial environments.

How do you handle sensitive or confidential work?

Trust and discretion underpin everything I do. I routinely operate under NDA. If required, we can extend confidentiality to cover the fact of our engagement. You can expect strict independence, secure working practices, and absolute protection of sensitive information.

I’ve supported clients through regulatory investigations, breach response, and other situations where discretion was critical to survival. My role extends beyond safeguarding intellectual property, personal data, systems, and compliance posture: it’s also about protecting your reputation and trust.

Do you also perform internal ISO/IEC 27K audits?

Yes, I conduct independent, standards-based assessments in line with ISO 19011 across ISO/IEC 27001, 27701, 27017, 27018, and Dutch BIO2 and NEN 7510. Provided I haven’t designed the controls or processes being audited, of course.

As a Certified Information Systems Auditor (CISA) and a Certified ISO/IEC 27001 and 27701 Lead Implementer, I help clients strengthen posture, prepare for certification, and meet internal assurance goals without conflict of interest.

  1. ISO/IEC 27001 certification badge
  2. ISO/IEC 27701 certification badge
  3. Auditing certification badge

Case studies

Expertise with measurable outcomes

I’ve led high-stakes engagements where discretion was essential and the stakes were regulatory, financial, and reputational. While most of my work is under NDA, these examples highlight the outcomes I deliver.

  1. ISO/IEC 27001 Certification Secured to Enable Regulated Market Growth

    A leading marketing and communications SaaS platform risked losing enterprise deals without a credible risk governance programme. Continued integration with major social platforms and the ability to serve banking and government clients demanded compliance and resilience under ISO/IEC 27001, BIO2, GDPR, DORA, and the AI Act.

    I designed and rolled out a tailored Information Security, Privacy, and Compliance Management System, supported by custom tooling for risk management, control tracking, and evidence collection. I also embedded continuous compliance to sustain platform integrations and meet rigorous financial and public-sector due diligence.

    The platform secured and sustained ISO/IEC 27001 certification, unlocking enterprise procurement and expansion into regulated markets while safeguarding critical integrations, assuring regulators, and strengthening long-term confidence among partners and shareholders.

  2. Crypto Trading Platform Licensed for EU AML Compliance and Acquisition

    A Dutch fintech startup preparing to launch a consumer cryptocurrency trading platform faced scrutiny from the Dutch Central Bank (DNB), the regulator responsible for licensing and supervising banks. At the time, major banks refused to provide services to crypto firms, deeming the sector too new and high-risk. This created an existential barrier to launch.

    I architected a security-led operating model to meet EU licensing requirements and withstand regulatory and banking due diligence. This included KYC processes, sanctions screening, transaction monitoring, and suspicious activity reporting, supported by enterprise-grade fraud detection and data protection controls to ensure resilience across EU jurisdictions.

    The company gained regulatory approval and secured integration with BNP Paribas, enabling licensed market entry in the Netherlands and across Europe. With compliance embedded, it scaled rapidly, established Dutch market leadership, and was ultimately acquired by global exchange Kraken.

  3. Global Child Abuse Network Exposed Through Cloud Security Assessment

    A global consumer transport and mobility platform operating across 100+ countries commissioned an independent white-box security assessment of its production environment. The project required senior secure engineering expertise and discretion, given the sensitivity of the findings.

    I uncovered a covertly reconfigured cloud component in the core infrastructure that let unauthorised traffic flow undetected. Evidence suggested an insider-driven change, exploited by Russian-based threat actors to host and distribute child sexual abuse material. Beyond discovery, I advised executive leadership on crisis management, coordinated with law enforcement, and provided technical evidence for a successful takedown.

    This intervention averted an existential risk to the business, enabling decisive action to protect users and cooperate with authorities. It avoided multi-million-euro penalties and reputational collapse, while preserving trust with regulators, partners, and investors.

  4. Travel Platform Rebuilt for Scale, Resilience, and Regulatory Compliance

    A fast-growing European travel platform was constrained by unstable infrastructure, performance bottlenecks, and scrutiny from consumer watchdogs, including the Dutch Authority for Consumers and Markets (ACM). Outages during high-profile television advertising campaigns further damaged reputation and drew threats of regulatory fines.

    I worked with engineering to re-architect the platform for scale and resilience, fixing systemic weaknesses and aligning the board and product teams with regulatory expectations. I also strengthened integrations with external platforms that had previously failed under load.

    The rebuild delivered 500x faster performance, zero downtime under peak load, regulatory compliance, and support for new partner integrations. This averted penalties and drove a measurable surge in bookings, enabling sustainable growth.

  5. Healthcare Platform Hardened to Achieve NEN 7510 Certification

    A Dutch healthcare provider required independent assurance that its new digital platform complied with sector-specific NEN 7510 standards after a failed certification attempt. The platform supported patient self-diagnosis, medical record tracking, and video consultations, making health data protection vital to operations and trust.

    My assessment exposed numerous application security flaws and systemic gaps in access control and data handling. I worked with engineering teams to remediate issues and embed secure and privacy engineering practices for sustained assurance. I deployed automated SAST and DAST tooling, trained engineers in threat modelling, and established security standards for the evolving platform.

    The platform achieved NEN 7510 certification, strengthening trust with medical partners, and ensuring reliable delivery of patient care while reinforcing confidence at board level.

Pricing

Flexible models for serious work

My work reflects a lifelong commitment to protecting people, systems, and data.

My services are tailored, not templated. Whether you need ongoing leadership, targeted delivery, or flexible access to expertise, we will structure our engagement to meet your specific needs.

  • Retainer model

    Fixed hours per month · Ongoing strategic and operational support. From acting as your vCISO, vCPO, or vDPO, to leading risk management, advising teams, or handling sensitive issues as they arise.

  • Project-based

    Fixed scope, defined outcomes · Scoped initiatives with clear goals. Including audits, DPIAs, security reviews, TOMs analysis, OSINT & vulnerability reports, as well as ISO/IEC 27001 preparation.

  • Prepaid model

    Prepaid hours, flexible use · Expertise on call without the monthly commitment. Buy a block of hours and use them as needed. For reviews, second opinions, or other quick interventions.

  • Interim placement

    On-demand interim coverage · For short-term placement or urgent assignments. When you need a CISO, DPO, or technical expert to step in quickly and focus on restoring clarity and control.

Contact

Straight answers, no sales pitch

Whether you’re scaling, raising funding, preparing for certification, facing regulatory scrutiny, or simply stuck, I help you get the controls and confidence you need.

Need clarity and hands-on expertise?

I’m available to take on new assignments in 🗓️ November 2025.

Schedule an appointment Profile picture linking to my LinkedIn