Services
Strategy, oversight, execution—done right
I help organisations build resilient, compliant, and pragmatic security and privacy programmes.
1. Board & Executive Assurance
I deliver clarity, control, and resilience—trusted by boards and executives to restore confidence and unlock business growth under pressure.
- 15+ years protecting enterprises, infrastructure, and SaaS against operational, reputational, and legal risk;
- Board-level partner to executives, regulators, and investors across scale-ups and global multinationals;
- Executive leadership of security, privacy, and resilience programmes in highly regulated industries;
- Proven record in converting board strategy into measurable outcomes across business, IT, and cloud;
- Crisis-tested in restoring trust after compliance failures, investigations, breaches, and incidents;
- Deep GRC and operational resilience expertise, bridging technical remediation with legal demands;
- Track record delivering frameworks and certifications that withstand audits, regulators, and investors;
- Offensive and defensive depth in penetration testing, application security, and infrastructure hardening;
- Mastery of ISO 27K, SOC 2, GDPR, NIS2, DORA, AI Act, CRA, BIO2, and global frameworks;
- Enabled M&A, investment, and market entry in finance, healthcare, telecommunications, and SaaS;
- Trusted to resolve regulatory investigations and avert organisations from multimillion-euro penalties.
2. Cybersecurity, Risk & Compliance Leadership
Delivering pragmatic, industry-aligned security leadership—enabling informed risk decisions, measurable assurance, and compliance.
- Develop and drive the security strategy and roadmap in line with stakeholder needs;
- Report on risks, compliance, and maturity to boards and executive leadership;
- Lead enterprise risk assessments, treatment, and control design to reduce risk exposure;
- Conduct reviews, audits, and gap analyses (ISO/IEC 27001, NIS2, DORA, BIO2, NEN 7510);
- Track legal and regulatory changes (NIS2, CRA) and update internal controls;
- Establish and enforce security policies, procedures, and baselines (CIS, NIST SP 800);
- Deliver security awareness and training across departments and leadership;
- Guide secure architecture, design principles, IAM strategy, and Zero Trust adoption;
- Drive BCP/DR planning and vulnerability management (CVEs, OWASP Top 10, CVD);
- Build security operations centres (SOC) and incident response teams (CSIRT);
- Oversee security operations, workforce, budget, and resource alignment;
- Direct incident response, digital forensics, and regulator/crisis communications;
- Coordinate playbooks, tabletop exercises, simulations, and red/blue/purple teaming;
- Manage cyber insurance coverage, policy conditions, and claims exposure;
- Drive OKRs, KPIs/KRIs, and report risk posture to executives and the board;
- Manage audits, third-party risk, contractual controls, and supply chain control gaps;
- Maintain and validate assurance artefacts (ISO 27K, ISAE, SSAE, SOC 2, PCI-DSS, BCRs);
- Conduct capability maturity assessments (CMMI) and support investor due diligence;
- Align ISMS operations with ISO/IEC 27001, 27017, and industry benchmarks;
- Advise senior leadership on governance, risk appetite, and cross-functional alignment.
3. Data Protection, Privacy & AI Risk Management
Leading enterprise-wide privacy governance—balancing data-driven innovation with ethical AI, regulatory compliance, and accountability.
- Develop and drive the data protection strategy in line with stakeholder needs;
- Report on privacy risks, compliance, and maturity to boards and executive leadership;
- Lead enterprise risk assessments, treatment, and control design to reduce risk exposure;
- Conduct DPIAs, LIAs, TIAs, and AI risk assessments (FRIAs) for high-risk processing;
- Monitor the evolving regulatory landscape, particularly in the EU, UK, and US;
- Track regulatory guidance (EDPB, DPAs, ICO, FTC) and federal & international rulings;
- Maintain and optimise RoPAs, data retention schedules, and lawful bases under GDPR;
- Develop and review privacy policies, notices, and mechanisms aligned with FIPPs;
- Negotiate and review DPAs, cross-border data transfers, and joint controllerships;
- Maintain and validate assurance artefacts (BCRs, SCCs, ISO 27K, ISAE, SSAE, SOC 2);
- Advance PIMS maturity with ISO/IEC 27701, 27018, EDPB guidance, and EU data strategy;
- Direct audits, breach response, and notifications to regulators and data subjects;
- Handle DSARs and engage with the Dutch DPA and other European regulators;
- Advise on transparency obligations, consent strategies, and cookie compliance;
- Drive fairness, explainability, and accountability under the EU AI Act;
- Direct implementation of privacy-by-design and privacy-enhancing technologies (PETs);
- Lead awareness and training programmes on data protection and responsible AI.
4. Secure Engineering & Cloud Resilience
Driving secure engineering—bridging software development, cloud infrastructure, and security operations to enable digital transformation.
- Define and adopt secure architecture and design principles to enhance risk posture;
- Embed threat modelling (STRIDE, attack trees, abuse-case scenarios) into SDLC;
- Conduct code reviews to identify OWASP Top 10 issues, CWEs, and ASVS non-conformities;
- Perform penetration testing and vulnerability scanning with actionable PoCs;
- Assess API security, auth protocols (OAuth2, OIDC, JWT), and secrets management;
- Integrate and tune SAST, DAST, and IAST security gates in CI/CD pipelines;
- Secure software supply chains using SBOMs, SCA, and license compliance;
- Guide secure coding, IaC practices, cloud architecture on AWS, Azure, and GCP;
- Harden OS and containers on Linux, Docker, and Kubernetes with security baselines;
- Improve detection and response via logging, audit trails, and runtime monitoring;
- Harden deployments with secure defaults, rollback support, and DR automation;
- Champion shift-left practices and security-by-design across engineering teams.
Why work with me
15+ years of leadership, impact, and delivery
This isn’t just my profession—it’s my domain.
I bring nearly two decades of senior experience across cybersecurity, data protection, security engineering, and regulatory compliance. My hybrid expertise is rooted in execution, not just theory. I’ve secured regulatory approvals, strengthened resilience through certified management systems, cut liability and risk exposure, and led organisations through audits and investor due diligence. I don’t just advise; I architect, implement, and deliver. I know what works and what wastes time.
-
Deep hands-on expertise Hard-won knowledge of what actually works.
-
Fluency across domains Connecting business, legal, and engineering.
-
Execution that builds resilience Strengthened trust and reduced risk.
-
Independent and discreet A neutral partner who cuts through politics.
-
Capability transfer I upskill your people, not replace them.
-
No guesswork Evidence-driven decisions, not assumptions.
-
No one-size-fits-all Solutions tailored to your risk reality.
-
No lock-in Autonomy delivered, dependency avoided.
-
No paper compliance Controls that function in practice.
-
No fear tactics I bring facts, clarity, and assurance.
Who I work with
Executives seeking clarity and assurance
If you need senior expertise across strategic, legal, and technical domains—you’re in the right place.
-
Boards & Executives
Discreet advisory, risk oversight, governance, and leadership balancing strategy with hands-on execution.
-
Legal & Compliance
TOMs, DPAs, cross-border transfers, M&A due diligence, and AI governance—made practical and defensible.
-
IT & Engineering
Secure architecture, DevSecOps, cloud resilience, and vulnerability triage embedded into delivery.
-
Start-ups & Scale-ups
Audit-readiness, certifications, M&A preparation, and investor due diligence, building trust at every growth stage.
-
Regulated Industries
Protecting high-risk and high-sensitivity data in finance, health, and other sectors under heavy scrutiny.
-
SaaS Providers
Designing multi-tenant platforms that scale securely, comply globally, and earn lasting customer trust.
FAQ
Straight answers
I lead with transparency so you can make informed decisions, not just comforting ones.
What differentiates you from a full-time employee?
When you hire me, you’re not onboarding someone who needs training, hand-holding, or months to get up to speed. You’re getting nearly two decades of hard-won experience across security, privacy, engineering, and legal domains. I ask the right questions, extract what matters, and get to work. You get outcomes, not overhead.
Unlike full-time hires, I’m not caught up in office politics or role preservation. I bring clarity, challenge assumptions, and lead with transparency. You get facts, not theatre. I’ve seen how internal politics and noise can obscure risk, slow progress, and distort reality. I cut through that with facts and focus. No employer risk. No hidden agenda. Just discreet, senior execution, where and when you need it.
How do your engagements typically work?
Flexible, independent, and outcome-driven.
Some clients retain me on a monthly basis for strategic oversight, risk advisory, or interim leadership. Others bring me in for tightly scoped projects, such as DPIAs, vendor assessments, internal ISO/IEC 27001 audits, or high-pressure remediation projects after incidents.
Scope, deliverables, and check-ins are defined up front—for focus, clarity, and accountability. I’m flexible, but lead decisively to protect outcomes and budgets. I’ve seen how some consultants inflate hours or let projects drift. That’s where I’m different: I keep scope tight, delivery sharp, and outcomes accountable.
I work independently on my own secured devices and drive execution while collaborating through your preferred tools, whether that’s email, Teams, Slack, or something else. This keeps things practical, efficient, and compliant with the Dutch Wet DBA—ensuring a clear, professional, and truly independent working relationship.
Are you hands-on, or do you just advise?
Both. Most assignments require a mix of strategic input and hands-on execution to deliver real results. I’ve seen teams left with abstract frameworks or stuck with vague recommendations that never land in practice. That’s not me. I make sure strategy translates into action, delivers outcomes, and holds up under scrutiny.
When you’re short on time, under pressure, or hitting roadblocks, I step in and help. Whether that means building registers, writing policies, conducting assessments, negotiating contracts, or managing crises, I roll up my sleeves and get it done. However, my goal isn’t to create dependence. Ultimately, I embed practices and transfer capabilities, leaving you stronger and more resilient than before.
What industries do you have experience in?
While I’m sector-agnostic, I’ve supported clients across e-commerce, healthcare, fintech, education, digital media, and government—handling regulated data, sensitive workloads, and critical systems.
I’ve worked across high-risk environments and apply proven methods tailored to your risk, regulatory obligations, and growth stage. I know what regulators expect, what partners and clients demand, and what investors scrutinise most. I’m also keenly aware of conflicting risk appetites and interests, particularly in commercial environments.
How do you handle sensitive or confidential work?
Trust and discretion underpin everything I do. I routinely operate under NDA. If required, we can extend confidentiality to cover the fact of our engagement. You can expect strict independence, secure working practices, and absolute protection of sensitive information.
I’ve supported clients through regulatory investigations, breach response, and other situations where discretion was critical to survival. My role extends beyond safeguarding intellectual property, personal data, systems, and compliance posture: it’s also about protecting your reputation and trust.
Do you also perform internal ISO/IEC 27K audits?
Yes, I conduct independent, standards-based assessments in line with ISO 19011 across ISO/IEC 27001, 27701, 27017, 27018, and Dutch BIO2 and NEN 7510. Provided I haven’t designed the controls or processes being audited, of course.
As a Certified Information Systems Auditor (CISA) and a Certified ISO/IEC 27001 and 27701 Lead Implementer, I help clients strengthen posture, prepare for certification, and meet internal assurance goals without conflict of interest.
Case studies
Expertise with measurable outcomes
I’ve led high-stakes engagements where discretion was essential and the stakes were regulatory, financial, and reputational. While most of my work is under NDA, these examples highlight the outcomes I deliver.
Pricing
Flexible models for serious work
My work reflects a lifelong commitment to protecting people, systems, and data.
My services are tailored, not templated. Whether you need ongoing leadership, targeted delivery, or flexible access to expertise, we will structure our engagement to meet your specific needs.
-
Retainer model
Fixed hours per month · Ongoing strategic and operational support. From acting as your vCISO, vCPO, or vDPO, to leading risk management, advising teams, or handling sensitive issues as they arise.
-
Project-based
Fixed scope, defined outcomes · Scoped initiatives with clear goals. Including audits, DPIAs, security reviews, TOMs analysis, OSINT & vulnerability reports, as well as ISO/IEC 27001 preparation.
-
Prepaid model
Prepaid hours, flexible use · Expertise on call without the monthly commitment. Buy a block of hours and use them as needed. For reviews, second opinions, or other quick interventions.
-
Interim placement
On-demand interim coverage · For short-term placement or urgent assignments. When you need a CISO, DPO, or technical expert to step in quickly and focus on restoring clarity and control.
Contact
Straight answers, no sales pitch
Whether you’re scaling, raising funding, preparing for certification, facing regulatory scrutiny, or simply stuck, I help you get the controls and confidence you need.
Need clarity and hands-on expertise?
I’m available to take on new assignments in 🗓️ November 2025.
Schedule an appointment