Archive

Operating Portfolio

A record of selected systems, trust surfaces, governance patterns, and platform work I have designed, shaped, or operationally led.

Taken together, this work reflects a consistent focus on making trust visible, shaping how it is communicated, and embedding governance into the systems that carry it - across both enterprise environments and independent work.

Names and implementation details are intentionally softened. The point is to preserve the work, the decisions, and the through-lines behind it.

What this is

A working archive of built capability across trust, governance, delivery, observability, and platform leadership - showing how these ideas are applied in practice.

How to read it

Grouped by theme, intentionally abstracted, and focused on what was built, why it mattered, and what changed.

What to expect

Recurring themes, selected systems, and a partial record of decisions, delivery, and built work across enterprise and independent contexts.

Through-lines
  • Interpretation over exposure
  • Control without noise
  • Calm operating surfaces
  • Evidence over assertion
  • Delivery with governance discipline

These entries are intentionally abstracted. They are designed to preserve the shape of the work, the decisions involved, and the operating themes behind it without turning the archive into a public-facing showcase.

Trust surfaces

Work focused on how trust is presented, interpreted, and experienced through public-facing systems, service communication, and digital interfaces. These entries centre on the design of surfaces where control, reliability, and organisational posture become visible.

Trust surface Case study

Status surface architecture

Designed and implemented a two-surface status model separating public trust communication from operational investigation, with monitoring-provider output treated as input rather than final product.

Status Trust Service Design

Context: A standard provider-shaped status page exposed checks, but not meaning, and did not suit different audiences equally well.

What I did: Defined a signal-to-surface architecture, normalised upstream monitor data, introduced intentional service roll-up logic, and split presentation into a calm public view and a more investigative operations view.

Why it mattered: It proved that status can function as a trust surface rather than a branded wrapper around monitoring output.

What changed: Service condition became clearer, public communication became more deliberate, and operational visibility improved without forcing both audiences through the same interface.

Related writing: Owning the Status Surface · What owning the status surface looks like

Trust surface Case study

ThreatScope Check - public trust instrument

Shaped ThreatScope Check as a calm, public-facing trust surface: a way to translate scattered technical signals into a more legible view of digital exposure, posture, and trust-related risk - without collapsing into alarm-driven security theatre.

ThreatScope Check Trust Surface Risk Translation

Context: Most public cyber tools either overwhelm with fragmented output or overstate certainty through simplistic scoring. Neither builds trust in the reader.

What I did: Defined the response model, evidence hierarchy, language, staged signal presentation, and method boundaries so the surface communicates posture in a more measured and usable way.

Why it mattered: The value was not in collecting signals. It was in turning them into a trust surface people could read without thinking like an operator or analyst.

What changed: The product moved toward an evidence-led public utility: more coherent, more legible, and more aligned to trust-building than a conventional checker or scorecard.

Public artefact: ThreatScope Check

Evidence & observability

Work focused on collecting, shaping, and interpreting technical signals over time. These entries deal with observatories, evidence models, reporting patterns, and the practical architecture needed to turn scattered data into something legible and useful.

Observatory Case study

.auDo - longitudinal domain observatory

Built a longitudinal observatory for the .au namespace - designed to capture domain and DNS state over time, preserve evidence across a fixed panel, and support interpretation rather than one-off lookup behaviour.

Observability Evidence Longitudinal Analysis

Context: One-off checks are useful but shallow. The domain layer is part of the public trust surface of Australian organisations, and it changes over time in ways a single lookup cannot see.

What I did: Shaped the collection model, cadence, storage pattern, analysis flow, reporting logic, and public-facing interpretation layer for a panel-based observational system. Built the full pipeline from collector to published report.

Why it mattered: Repeated observation turns scattered public signals into a credible longitudinal record - making pattern detection, governance-style interpretation, and sector comparison more possible.

What changed: What was previously invisible or anecdotal became trackable, structured, and publishable as a repeating evidence surface. The 30-day mark opens an interpretation layer the data could not support at day one.

Public artefact: .auDo observatory · Published reports

Evidence design Case study

Signal normalisation and evidence shaping

Built patterns for translating uneven technical inputs into a consistent internal evidence model suitable for interpretation, comparison, and calmer public output.

Normalisation Signals Interpretation

Context: Raw inputs from different providers, checks, and data sources rarely arrive in a form useful for direct presentation.

What I did: Defined internal shapes for signals, observation objects, service states, and confidence cues so heterogeneous inputs could be interpreted deliberately and compared over time.

Why it mattered: Without normalisation, system outputs inherit provider assumptions and become harder to compare, govern, or explain.

What changed: The architecture became more composable and the resulting surfaces more coherent.

Governance & operating models

Work focused on structure, decision-making, and the systems that help teams operate with more clarity and less ambiguity. These entries cover frameworks, operating models, delivery governance, and the practical mechanisms behind stronger technology leadership.

Governance Case study

Governance framework design and incident reduction

Designed and embedded a technology governance framework in a complex, mission-critical organisation - strengthening stakeholder engagement and materially reducing incident escalations.

Governance Incident Management Stakeholder Engagement

Context: Governance activity was reactive, escalation patterns were recurring, and stakeholder confidence in technology leadership was inconsistent.

What I did: Designed the framework structure, embedded operating cadences, clarified accountability lines, and introduced more deliberate patterns for escalation, communication, and stakeholder reporting.

Why it mattered: Governance is not just structure on paper. It only works if it changes behaviour - how decisions get made, how risk gets surfaced, and how trust between technology and the rest of the organisation is built or eroded.

What changed: Incident escalations reduced by 30%. Stakeholder engagement became more consistent and less dependent on individual relationships.

Related writing: The governance gap in digital systems

Risk translation Case study

Risk translation for mixed technical and non-technical audiences

Developed ways of expressing technology risk, control posture, and delivery implications in language that can travel across operational, management, and governance layers - including board-level reporting.

Risk Translation Board Reporting

Context: Technology risks were either over-technical for decision-makers or over-simplified for meaningful governance. Neither supported good decisions.

What I did: Framed risk in plain language, linked operational realities to governance concerns, and created communication patterns that preserved nuance without losing clarity across different levels of technical fluency.

Why it mattered: Poor translation weakens governance. Good translation helps decision-makers act without pretending the complexity is not real.

What changed: Discussions became more grounded and more useful. Leadership could engage with technology risk as a governance matter rather than a technical one.

Related writing: Translating technology risk for boards

Operating model Case study

Governance and delivery operating framework

Structured a practical operating model for technology delivery and governance work, with clear cadences, issue structures, escalation paths, reporting views, and team responsibilities.

Governance Delivery Operating Model

Context: Delivery and governance activity was at risk of becoming fragmented, overly reactive, and dependent on unwritten expectations.

What I did: Designed a working framework covering team responsibilities, board and backlog structure, reporting rhythms, escalation logic, and practical ways of working.

Why it mattered: Teams need more than tools. They need an operating shape that reduces ambiguity and supports trust between delivery, governance, and stakeholders.

What changed: Work became easier to classify, track, govern, and communicate, with stronger alignment between operational activity and management oversight.

Enterprise delivery

Work focused on leading complex technology programmes and platform change in large, mission-critical organisations. These entries reflect delivery at scale - where governance, budget discipline, stakeholder alignment, and enterprise risk intersect.

Programme delivery Case study

Digital experience platform transformation

Led delivery of a major digital experience platform transformation for a large national organisation - on schedule and 10% under budget.

Programme Delivery Platform Transformation Budget Governance

Context: The organisation's digital experience platform was due for a significant transformation affecting public-facing services, content architecture, and integration with internal systems.

What I did: Led the programme through planning, vendor management, delivery governance, and implementation - maintaining schedule discipline and driving budget performance to deliver 10% under forecast.

Why it mattered: Platform transformations in complex, mission-critical environments carry significant reputational and operational risk. Delivery on time and under budget in that context requires governance discipline as much as project management.

What changed: The organisation moved to a modern digital experience platform while preserving service continuity, on schedule, and without budget overrun.

Platform modernisation Case study

Workplace platform modernisation and AI adoption strategy

Led a workplace platform modernisation programme - achieving 95% staff adoption - and developed the business case and enterprise strategy for AI integration across the organisation.

Workplace Platforms Change Management AI Governance

Context: The organisation required a major uplift across workplace platforms alongside a credible strategy for how AI tools would be adopted responsibly at enterprise scale.

What I did: Led the workplace modernisation programme through to 95% staff adoption. Separately, developed the business case and enterprise adoption strategy for AI productivity tooling - covering governance, risk, policy, and rollout sequencing.

Why it mattered: Adoption at that scale does not happen without deliberate change management and a platform that people can trust. The AI strategy work positioned the organisation to move on AI without bypassing governance.

What changed: The organisation achieved near-universal platform adoption and has a grounded, governance-first strategy for AI integration rather than reactive experimentation.

Related writing: AI does not create a new domain of trust

Executive leadership Case study

Acting Head of Technology

Acted as Head of Technology for a large national organisation - providing continuity of leadership across technology strategy, delivery governance, and stakeholder engagement at executive level.

Executive Leadership Technology Strategy Organisational Continuity

Context: The organisation required continuity of technology leadership at an executive level during a period of planned CIO absence.

What I did: Stepped into the Head of Technology role - maintaining executive presence across leadership, board-level reporting, stakeholder engagement, and operational decision-making for the technology function.

Why it mattered: Leadership continuity in a mission-critical environment is a governance matter, not just an HR one. Maintaining visibility and stability across that period preserved confidence in the technology function.

What changed: The organisation maintained continuity of technology leadership, strategic momentum, and stakeholder confidence through the transition.

Service design Case study

Trust-oriented service catalogue and platform grouping

Reworked a multi-service environment into a more deliberate catalogue model, grouping services by meaning, priority, and relationship rather than by platform sprawl or legacy naming.

Information Design Service Catalogue Platform Thinking

Context: Multiple sites, services, and supporting systems had grown across time, making it harder to express what mattered most and how parts related to each other.

What I did: Designed a clearer catalogue structure, grouped services into intentional families, reordered surfaces by importance, and aligned service presentation to identity and operational value.

Why it mattered: Catalogue structure shapes perception. A poor grouping model creates noise. A strong one improves clarity, governance, and trust.

What changed: The service environment became easier to read, easier to manage, and better aligned to strategic narrative rather than inherited sprawl.