Home Consulting Products Open Source About Jobs Book a call

The gap in this market is not more governance frameworks. It's people who can sit inside a technical architecture decision and say: this implementation will satisfy this regulatory requirement, because the attestation chain maps to this specific control. That's what we do.

AI Governance Advisory

Strategy and implementation support for AI risk management, regulatory alignment, and governance framework design, from board briefings to technical controls.

Governance frameworks · Risk registers
Board-level briefings · Compliance gap analyses
EU AI Act readiness · Internal audit support

Digital Sovereignty

Assessing and strengthening organisational control over data, infrastructure, AI systems, and vendor relationships, with particular focus on critical and public sector environments.

Sovereignty audits · Vendor dependency reports
Control frameworks · Procurement guidance
Confidential computing architecture

Open Source Security

DevSecOps strategy, software supply chain security, SBOM implementation, and OpenSSF adoption for organisations where the software supply chain is a material risk.

Security posture assessments · SLSA roadmaps
SBOM tooling selection and implementation
OpenSSF Scorecard baseline · Training

Technical Due Diligence

Security and governance review for M&A, investment decisions, or procurement, covering AI systems, software supply chains, and security posture.

Technical risk reports · Security posture summaries
Remediation priority lists
Vendor assessment frameworks

Where we work.

We focus on environments where security and governance failures have real consequences: regulated industries, public sector, and critical national infrastructure.

Healthcare / NHS Financial Services Critical National Infrastructure Technology & SaaS Public Sector Academic & Research
01

Retained Advisory

Ongoing relationship with agreed scope. Suitable for organisations building capability or navigating a multi-year programme.

02

Project-Based

Defined scope, timeline, and deliverables. Suitable for assessments, audits, framework design, and due diligence.

03

Workshops & Training

Half-day or full-day sessions for technical or executive teams. Topics include AI governance, supply chain security, and digital sovereignty.

04

Speaking

Keynotes, panels, and technical presentations for conferences, policy forums, and industry events.

Book a discovery call

Anonymised. Details changed to protect client confidentiality.

FINANCIAL SERVICES - UK

DORA operational resilience gap assessment

A UK-regulated financial institution needed to understand their exposure under DORA's ICT risk requirements before their first supervisory review. They had compliance documentation but no technical validation of whether their AI and cloud systems actually delivered the resilience they claimed.

Outcome: Nine-domain sovereignty assessment with per-domain gap report, prioritised remediation roadmap, and board-ready summary distinguishing compliance posture from technical reality.
PUBLIC SECTOR - EU

AI Act readiness for high-risk system deployment

A public sector body procuring an AI decision-support system needed to determine whether the vendor's conformity claims held up technically. The system was classified as high-risk under Annex III and their procurement team lacked the technical capacity to evaluate the technical documentation.

Outcome: Technical review of vendor documentation against EU AI Act Articles 9-17 requirements. Identified three material gaps in the conformity assessment before contract signature.
TECHNOLOGY - SERIES B

Supply chain security baseline for CRA compliance

A software company shipping to enterprise customers in the EU needed to implement SBOM generation and software supply chain controls ahead of the Cyber Resilience Act's requirements. Their engineering team understood DevSecOps but had no experience mapping controls to regulatory obligations.

Outcome: OpenSSF Scorecard baseline, SLSA Level 2 implementation roadmap, SBOM generation integrated into CI/CD. Compliance mapping delivered as engineering-ready specifications.
"The CLOUD Act does not care where your data centre is. It cares where your provider is incorporated."

Code, Chips and Control - Ch.7, Data Jurisdiction