As Program Manager and Technical Product Owner, I found TD Bank with CrowdStrike, Qualys, Akamai, ServiceNow, and every security tool a compliance programme could need. Compliance rates sat at 38%. The problem was not the tools. It was the total absence of a governance model connecting them. I built the operating model that turned seven disconnected tools into a defensible, auditable compliance programme.
Following the regulatory fine, leadership invested in every available security tool. CrowdStrike, Qualys, Akamai, ServiceNow CMDB, SCCM, Dynatrace. Each worked exactly as designed. Six months later, compliance rates sat at 38%. The tools detected thousands of vulnerabilities. Detection without ownership is just a longer list of unresolved problems. Nobody could answer the four questions that matter in a regulated environment: who owns remediation? Who approves exceptions? Who escalates when SLAs breach? What evidence do regulators see when they ask about control effectiveness? This is the governance story, not the platform story. The discipline underneath the technology.
The governance model was built on a simple principle: ownership must be defined at every step, workflow must be automated where possible, SLAs must be enforced where automation is not possible, and every stakeholder must have exactly the visibility they need without requiring someone to produce it for them.
The sequencing was deliberate. The governance operating model was defined on paper before any technology was deployed. No automation went live until ownership was clear. No dashboard was built until the data layer was accurate. Phased delivery shipped governance value continuously rather than waiting 18 months for a complete system.
Measured at 18 months. Validated through OCC consent order reviews, third-party audits, and internal compliance reporting across all seven integrated systems.
Complex programmes. Regulated environments. High-stakes stakeholder landscapes. That is where I do my best work.