Frequently Asked Questions

I specialize in high-risk environments: critical infrastructure, energy, finance, insurance, SaaS platforms, and complex embedded systems. If a breach would be catastrophic, I’m your guy.

Yes. Legacy codebases don’t scare me. I reverse-engineer what others ignore, then build hardened layers around it while we work toward modernizing in place.

Absolutely. Whether you need a targeted threat model, architecture review, or a quick pre-audit security sanity check — I deliver fast, actionable results without fluff.

Yes. I can augment your team or operate solo. I’ve worked with Fortune 500 SOCs and also been the lone expert at a startup. I adjust to fit your internal dynamics.

Practical. Ruthless. Risk-based. I use the NIST SSDF, OWASP SAMM, and threat modeling as baselines — but I always tailor to your business context. Security without pragmatism is just theater.

Yes. I provide fractional CISO, architecture review, and security program advisory retainers. Perfect for organizations that need senior-level expertise without a full-time hire.

Straight hourly or fixed-scope deliverables — your call. No upcharges, no retainers unless requested, no fine print. You get technical expertise, not sales fluff.

If I’m not booked, yes — breach triage, IR guidance, or containment strategy. I can help stabilize fast and identify root causes if your internal team is overwhelmed.

I use what works, first and foremost. If you already have a tool stack in place I will do everything I can to accomodate it so long as it meets mission criteria.

Yes. I’ve handled hundreds of vendor risk questionnaires, pen test result briefings, SOC 2 alignment efforts, and customer security reviews. I’ll make sure you don’t get steamrolled.

© Black Watch Security. All Rights Reserved. Designed by HTML Codex