Madhan SamyEnquire
Digital security expert

Security.Risk.Compliance.

25+ years of advising banks, telcos, energy operators, and governments on how to protect what they actually run — from boardroom posture down to the PLC.

Portrait of Madhan Samy
Boardroom to plant floor
BasedUnited Kingdom
OperatingEMEA · APAC · Americas
AdvisoryCISO-as-a-Service
02Where the work applies
01Sectors

Banking, Telecom, Insurance, Energy, Utilities, Media, Big 4.

Enterprise security architecture, risk assessment, and compliance work for regulated industries where failure has consequences measured in pounds, downtime, or lives.

02Geographies

United Kingdom, Europe, GCC, South and Southeast Asia, Africa, Australia, United States.

Adapts to each regulator — FCA in London, NESA in Abu Dhabi, SAMA in Riyadh, QFCRA in Doha — and to each operating culture.

03Discipline

IT and OT security, under one practitioner.

25+ combined years of enterprise IT security and industrial control systems — so the gap between the corporate network and the plant floor is closed by one person, not two vendors.

04Strategic advisory

At board, CISO, and programme level.

01

Executive advisory

CISO-as-a-Service and virtual security leadership for CIOs, CTOs, and boards that need an independent point of view without a standing hire.

02

Risk workshops & M&A

Executive risk workshops and security diligence for mergers, acquisitions, and carve-outs — before the term sheet, not after.

03

Operating model & strategy

Global security operating models and multi-year strategies for AI adoption, cloud migration, and operational technology convergence.

04

Programme & regulatory alignment

Assurance on multi-year transformation programmes. Aligning security investment with the regulator of record — FCA, PRA, NESA, SAMA, or SOX.

05AI & autonomous systems

Securing the models, the pipelines, and the agents.

01

End-to-end model security

Threat models for LLM and generative-AI systems, from training data to inference. Risk assessments for autonomous agents and retrieval stacks.

02

Threat mitigation

Prompt-injection defence, model-level protection, and confidential computing for sensitive workloads.

03

Governance

AI governance aligned to NIST AI RMF and EU AI Act obligations — mapped to the controls you already operate.

04

Integration

Vector-database security, agent identity, and Zero Trust patterns for AI services inside cloud-native platforms.

06Enterprise architecture

Security designed into the transformation, not added after.

01

Strategic architecture

Target Operating Models on SABSA and TOGAF. Cloud, DevOps, and hybrid infrastructure secured against business objectives rather than a control checklist.

02

Operations

SOC, SIEM, and IAM architecture aligned to ISO 27001, NIST CSF, CIS, and PCI-DSS — built for banks, telcos, and critical infrastructure.

03

Transformation

Security-by-design through cloud migrations, digital modernisation, and organisational change — integrated into the programme plan, not bolted on.

07OT / ICS

Where safety, availability, and security meet.

01

Risk assessment

Identify vulnerabilities and exposure in OT and industrial control estates. Practical, prioritised, actionable for plant and corporate security alike.

02

Compliance & governance

ISA/IEC 62443, NIS2, and NERC-CIP programmes delivered as operating frameworks — not binders on a shelf.

03

Detection & response

Monitoring and incident response tuned for OT protocols and real-time constraints — Modbus, OPC UA, DNP3, Ethernet/IP.

04

Secure architecture

Defence-in-depth designs — segmented, resilient, and auditable — for SCADA, PLC, HMI, and DCS environments.

08Risk & compliance

Regulatory readiness, region by region.

01

Risk frameworks

Enterprise risk frameworks with treatment plans that stakeholders can act on, not just acknowledge.

02

Third-party assurance

Vendor security assessment and diligence across global supplier estates.

03

Compliance strategy

ISO, PCI, GDPR, FCA, UAE NESA, Saudi SAMA, Qatar QFCRA, Kuwait CBK, DORA, NIS2, and SOX.

04

Operational assurance

Readiness reviews and operating-model design for sustained compliance.

09Standards & regulation

The frameworks
behind the signatures.

Delivered, audited, or attested against — in banks, telcos, insurers, and critical infrastructure across the United Kingdom, European Union, and Gulf Cooperation Council.

Standards
ISO 27001:2022 · ISO 20000-1:2018 · ISO 22301:2019
NIST Cybersecurity Framework 2.0 · NIST SP 800-53 Rev. 5
COBIT 2019
PCI-DSS v4.0 · PA-DSS
COSO 2013
Basel III / IV
OCTAVE Allegro
ISA / IEC 62443 series
Regulation
Sarbanes-Oxley 404
SSAE 18 — SOC 1 / 2 / 3
DORA — Digital Operational Resilience Act
NIS2 Directive
UAE NESA
Saudi SAMA Cyber Framework
Qatar QFCRA
Kuwait CBK
UK GDPR & Data Protection Act 2018
HMG Security Policy Framework
10Platforms & tooling

Fluent across the stack.

Hands-on working knowledge — selected where they fit the problem, not the other way around.

Enterprise & cloud

AWS · Azure · GCP native security
Splunk · Microsoft Sentinel · IBM QRadar
CrowdStrike · SentinelOne · Microsoft Defender
Okta · Azure AD · CyberArk
Palo Alto · Fortinet · Cisco
DLP, encryption, data masking

OT / ICS & advanced

Claroty · Dragos · Nozomi Networks
Modbus · OPC UA · DNP3 · Ethernet/IP
Kubernetes · Docker · DevSecOps pipelines
LLM protection · MLOps security frameworks
Tenable · Qualys · Rapid7
Attack Surface Management · Threat Intel
11Credentials

Education and certification.

Education

MBA — Leadership & Strategy
University of Bedfordshire, United Kingdom
Diploma — Electronics, Communication & Networking Technologies
Aptech, India

Certifications

ISA / IEC 62443 Specialist
CISSP
CISA
CCSA
CCNA
CLP
MCP
CNE
On engagement
Madhan Samy
12About

Independent. Quiet engagements.

I advise at CISO and board level on cybersecurity, risk, and compliance — across banks, telcos, insurers, energy and utility operators, and Big Four practices.

My work sits between the boardroom and the plant floor: one practitioner who can speak to a regulator, a programme board, and a plant engineer in their own language. Engagements are small, direct, and accountable.

Reach out if there is a specific decision, programme, or assessment where that is useful.

“Security is a business discipline first and a technical one second. Treat it the other way around and you get a shelf of controls that satisfy an auditor and protect nobody.”

— M.S.
13Contact

Start a conversation.

Send a short note about the engagement, the regulation, or the system in question. I reply personally, usually within two working days.

Reply typically within 2 working days