What I Do Best

Four core practice areas built on decades of cybersecurity leadership in financial services and consultancy.

01

Securing Emerging Tech

AI and Agentic AI are the most significant shift in the threat landscape since cloud computing — and most security programmes are not keeping pace. I help organisations understand what it actually means to secure AI systems: autonomous agents, LLM-powered workflows, AI supply chains and the new attack surfaces they introduce, from prompt injection to model poisoning to uncontrolled agent escalation.

Whether you are adopting AI tools, building AI-powered products, or trying to govern AI risk at the board level, I bring both the technical depth and the strategic clarity to make your AI security posture real — not just a policy document.

  • AI and Agentic AI threat modelling and risk assessment
  • LLM security review — prompt injection, data leakage, misuse vectors
  • Agentic AI governance frameworks and control design
  • AI supply chain and third-party model risk management
  • Board and executive briefings on AI security risk
  • Emerging tech security strategy — AI, blockchain, robotics
AI Security Agentic AI LLM Risk AI Governance Threat Modelling Emerging Tech
02

Cryptography & Quantum-Safe Advisory

Post-Quantum Ready

Cryptography is the foundation of every digital security control — and most organisations have accumulated years of cryptographic debt without realising it. I conduct in-depth reviews of cryptographic architectures, identify weaknesses in PKI, TLS and key management, and design migration paths to quantum-resistant standards (FIPS 203/204/205).

With the standardisation of ML-KEM, ML-DSA and SLH-DSA in 2024, the post-quantum migration clock is ticking. I help teams understand the timeline, prioritise their most at-risk systems, and build a pragmatic transition plan.

  • Cryptographic inventory and risk assessment
  • PKI architecture review and redesign
  • TLS configuration hardening and protocol modernisation
  • Post-quantum migration strategy (ML-KEM, ML-DSA, SLH-DSA)
  • Key management lifecycle and HSM advisory
  • Crypto-agility design for future-proof systems
ML-KEM / FIPS 203 ML-DSA PKI TLS 1.3 HSM Crypto-Agility
03

Security Training & Workshops

Security awareness and technical training that actually sticks. Drawing on my experience as a lecturer at TIAS Business School, I design and deliver training that meets audiences where they are — from hands-on technical deep-dives for engineering teams to clear, jargon-free sessions for business leaders.

  • Executive and board security awareness programmes
  • Technical security workshops for development and operations teams
  • Applied cryptography training for engineers
  • Incident response tabletop exercises
  • Secure coding and SDLC security integration
  • Custom curriculum design for in-house security academies
Workshops Exec Briefings Tabletop Exercises Curriculum Design
04

Speaking & Keynotes

Available for conference keynotes, panel discussions and corporate events on topics spanning post-quantum cryptography, the evolving threat landscape, building security culture, and the future of regulatory compliance. I translate complex technical and regulatory subjects into narratives that resonate with mixed audiences.

  • Keynote presentations at security and technology conferences
  • Panel participation on cybersecurity and quantum computing topics
  • Internal corporate events and all-hands security briefings
  • Podcast and media appearances
Keynotes Panels Post-Quantum Security Culture

Ready to get started?

Tell me about your security challenge and let's figure out how I can help.

Start a Conversation Read the Blog