Portfolio
Professional projects, published thought leadership, and work samples demonstrating expertise in security architecture, governance frameworks, and organisational risk management.
System Security Concepts Article Series
A comprehensive 7-article series on implementing systematic security documentation within Information Security Management Systems (ISMS). Published January 2026.
Series Overview: ~19,000 words providing strategic and tactical guidance on security concepts as the foundation of security governance, targeting CISOs, Security Architects, and Enterprise Architects.
Articles
-
The Foundation of Security Governance (~2,750 words)
- What security concepts are and why they matter
- Stakeholder perspectives and ISMS integration
- Ownership models and early planning principles
- Target audience: CISOs, Security Directors, Enterprise Architects
-
Core Components: What Makes a Security Concept Effective (~3,250 words)
- System context, threat modelling, and risk assessment
- How architectural choices transform threats (SaaS vs Cloud vs On-Premise)
- Control responsibility matrices across different architectures
- Target audience: Security Architects, System Architects
-
Control Selection and Security Frameworks (~2,980 words)
- Proportionate response and framework-based control selection
- ISO 27001/27002, NIST CSF/800-53, IEC 62443, CIS Controls
- Building organisational control libraries
- Target audience: Security Architects, CISOs, Security Governance
-
The Living Document: Lifecycle and Change Management (~2,450 words)
- Lifecycle integration and project planning
- Change management integration
- Threat landscape updates and maintenance triggers
- Target audience: Security Architects, System Architects, Change/Project Managers
-
Enterprise Security Capabilities: The Integration Challenge (~2,450 words)
- Documenting IAM, SIEM, vulnerability management, and data protection integration
- Portfolio visibility through stacked security concepts
- Control inheritance models
- Target audience: Security Architects, Enterprise Architects, CISOs
-
Access Control and Data Protection: Getting the Details Right (~2,350 words)
- Authentication requirements, RBAC implementation patterns
- Data classification and encryption specifications
- Key management and monitoring requirements
- Target audience: Security Architects, System Architects, Technical Security Specialists
-
Implementation Guide: Templates, Tools, and Getting Started (~2,850 words)
- Document structure templates
- Pilot system selection and rollout planning
- Organisational models and success patterns
- Target audience: Security Architects, System Architects, CISOs, Security Leaders
Key Themes
- Architecture-agnostic process, architecture-specific analysis: Security concepts apply regardless of technology choices, but analysis must address actual architectural decisions
- Early planning essential: Security concepts created at project inception enable proper resourcing and timing
- Proportionate response: Control intensity scales with system criticality and threat landscape
- Enterprise integration: Document how systems leverage existing capabilities rather than reinventing controls
Additional portfolio materials and project case studies to be added.