Corporate Governance, Ethics Oversight & Compliance Management

Governance is the word directors like to use when they really mean: “We’ve organized it.” And then I look you straight in the eye and I don’t ask whether it sounds tidy, but whether it is true. Organized for whom, and organized against what? Because I have seen too often how an organization lulls itself to sleep with structure: committees, charters, dashboards, policy documents, and a compliance portal that gleams like a display case. And meanwhile—down there, beneath that polished surface—someone is doing exactly what they please. Someone who rates “results” above boundaries. Someone who treats dissent as a personal insult. Someone who has enough influence in a single meeting to mute an alarm, slide a report into a drawer, and reduce a risk owner to a rubber stamp. And you? You think: “But we have governance, don’t we?” Until the moment the world stops asking what you meant and starts asking what you can prove. Until pressure arrives. Pressure from outside, pressure from within, pressure from that one email that leaks, from that one report that suddenly isn’t “an incident” but “a pattern,” from that one regulator who doesn’t want to hear that you take it seriously, but wants to see that you took it seriously when it was still uncomfortable.

And then the ground shifts. Because sometimes you come to me as the injured party. You are the one who suffered harm because non-conforming conduct was made possible by weak or selective governance: a manager who built a private universe, a culture in which “difficult” meant “dangerous,” controls that existed on paper but were bypassed in practice. But just as often you come to me because you are being accused. Not because your own hands were in the mud, but because you were “above.” Because you are said to be responsible. Because you were expected to see what others have cleverly concealed. You can feel the mechanism already: you walked in as the person seeking protection, and you risk walking out as the person who “should have prevented it.” And there—precisely there—my work begins. Not with a sermon, not with moral acrobatics, but with a system that stays upright under pressure. I turn governance, ethics oversight, and compliance management into a single defensive line you can not only explain, but prove. Because I know how the modern world operates: fast, harsh, impatient, and merciless in its hunger for a scapegoat or a scalp. I don’t offer soothing words. I offer provability. And I show you how to take back control, even when you think control has been out of your hands for a long time.

Board Oversight & Tone at the Top

I start with the board and the CEO, because that is where illusions are most stubborn and consequences most severe. You can have a hundred policy documents, an ethics committee with impeccable agendas and neat minutes, a compliance officer producing reports the way a bakery produces rolls, but if the tone at the top is not congruent—if words and deeds do not align—everything beneath is stage dressing. And stage dressing does not hold when something explodes. It becomes dangerous: it creates expectations you cannot meet, and expectations today are not a soft promise; they are ammunition. I want you to understand that tone at the top is not a motivational speech at a quarterly meeting. It is what happens when it becomes difficult: when a high performer crosses the line, when a commercial opportunity smells like risk, when someone raises an internal warning and you would rather not hear it because it threatens your planning, your targets, your reputation.

I insist—yes, insist—that oversight becomes tangible. Not “we discussed it,” but “we decided,” and then: “we monitored.” Not “we didn’t know,” but “we organized signals so we had to see them.” You need to imagine how the outside world looks at you when things go wrong. They do not ask: “Were you busy?” They ask: “What did you do when you knew, and what did you do when you could have known?” And that second question is the trap. That is where the accusation of negligence lives: you could have known. You should have asked. You should have pushed through. That is why I build a board rhythm in which uncomfortable information is not treated as noise but as raw material for oversight. I want you to do more than “receive” incidents; I want you to show, structurally, that you search for risks, test them, and escalate them—not because you enjoy problems, but because problems otherwise begin to enjoy you.

And yes, I speak to you directly, because this is where self-deception is most expensive. If you are a director, you cannot live on trust alone. You cannot settle for “I assume management has this under control.” You must assume nothing without verification. That is not cynicism; it is maturity. I make the board effective by making it uncomfortable—properly. By forcing the right questions, normalizing counter-voices, protecting the CEO from the seductions of their own echo. And at the same time I offer hope, because I know this is possible: a board that does not freeze when bad news arrives, but functions precisely then. A board that is not a post-hoc explanation machine, but a pre-emptive intervention machine. A board that, when people ask “where was the oversight?”, does not collapse into silence, but can show a trail of actions no one can wipe away.

Compliance Frameworks & Internal Controls

From there I move to compliance frameworks and internal controls, because this is where the grand performance is often most refined. Here, polished words sit closest to daily reality—and precisely for that reason this is where failure breeds. People imagine controls as a magic wall. But controls are nothing without behavior, and behavior is nothing without consequences. I don’t care what exists; I care what works. I want proof that controls do not merely exist, but resist pressure, resist haste, resist the temptation to make “an exception.” And I want you to understand how treacherous those exceptions are: today an exception for an important client, tomorrow an exception because the system is inconvenient, the day after an exception because “this is how we’ve always done it.” And before you realize it, you no longer have a control environment but a culture of shortcuts.

I build internal controls the way I build defensive works: with redundancy, with escalation, with clear ownership, and with an audit trail that does not rely on memory or good intentions. The CFO plays a key role here, because financial processes are the bloodstream of the organization. But I do not let the CFO hide behind reconciliations and periodic reporting. I want visibility into exceptions, manual interventions, override rights, unusual transactions, unusual timing. And I want the CIO and CISO to stop being treated as technical side characters and to be recognized as guardians of the integrity of the information on which decisions are made. Because what is governance worth if your data is unreliable? What is compliance worth if logs are missing, access rights are unmanaged, and incidents are discovered only when it is already too late?

And then we reach the hard core: escalation. Not on paper, but in reality. I want an organization where non-compliance is not handled with a shrug, but triggers an automatic mechanism that wakes someone up. And I want that mechanism to work precisely when the breach is “sensitive”—when it concerns someone with power, revenue, status. Especially then. Because that is where governance fails most often: not in the small things, but in the difficult ones. I shape the framework so the board cannot later say “we only heard about it late,” because the system had to reach them earlier. And I shape it so that, when you are accused, you can show you did not merely have rules—you had a functioning machine that converts rules into detection, detection into action, and action into documentation that does not strangle you, but saves you.

Regulatory Compliance & Reporting

Regulatory compliance and reporting is the domain where many directors either overestimate themselves or hide. They overestimate themselves by thinking compliance is mainly a legal puzzle—something General Counsel and the CCO will “handle.” Or they hide behind complexity: “It’s international, it’s complicated, there are many rules.” All of that is true—and that is precisely why it is not an excuse but a risk factor. In a changing world, where regulators move faster and information spreads faster than your internal memos, reporting is not an administrative burden but a strategic defensive line. Those who report too late, too incompletely, or inconsistently lose not only trust but control. And control—you know it—determines whether you are an actor or an object in the story others will write about you.

I organize regulatory interaction not as panic, but as discipline. I want you to know in advance who speaks, who decides, who documents, and who guards what is and is not disclosed. General Counsel must steer legal positioning and privilege protection—without allowing privilege to become a smoke screen. It is a thin line: protect what must be protected, but do not conceal what will later be framed as a cover-up. I want the CFO and the CCO to carry one consistent narrative: data, facts, risk analysis, mitigation, follow-up. Not as theatre, but as controlled transparency. Transparency not as submission, but as an instrument: you choose what to show because you have it under control, not because you have been caught.

And I build reporting so it does not depend on heroes or improvisation. I have seen enough organizations where one person “knows everything,” and when that person is gone, reality evaporates. That is not governance; that is dependency. I want reporting lines to be reproducible, data lineage to be clear, definitions consistent, metrics not massaged to paint a prettier picture. Because understand this: when an incident occurs, every gap between your words and your data becomes a wedge others will drive in. And yet—this is where hope also lives. Because when you organize this properly, you can shorten a crisis, reduce penalties, soften reputational damage, and create internal calm. Not through silence, but through mature, demonstrable control. I turn reporting into a shield, not a weight.

Anti-Fraud, Anti-Bribery & AML Programs

Fraud, bribery, money laundering—these are words directors sometimes whisper, as if the words themselves contaminate the room. As if naming the risk invites it. But today’s world does not whisper; it shouts. And those who refuse to think out loud get overtaken brutally. I treat anti-fraud, anti-bribery, and AML not as a compliance component you “must” have because the rules say so, but as a realistic acceptance of human nature and organizational temptation. Where money flows, pressure forms. Where pressure forms, rationalization follows. And where rationalization follows, a slide begins. Not always with villains—often with respectable people who decide it is acceptable to cut a corner “just this once.” That is precisely where your system must intervene.

I design these programs around three principles: detection that cannot be managed away, due diligence that cannot be bought off by urgency, and incident response that is not delayed by fear. The CCO and CRO must create policy that is workable, not merely legally elegant. The CFO must ensure transactions are traceable, exceptions visible, third parties kept out of the back door. General Counsel must ensure procedures stand legally, while preventing paralysis by paperwork. And the CEO must show that integrity is not a slogan pasted into an annual report, but a boundary guarded when it costs. Because credibility is not built in easy decisions, but in expensive ones.

And I tell you this confrontationally because I want to protect you: when a fraud or bribery allegation lands, people don’t only look at the perpetrator. They look at the organization. At incentives. At warnings that were ignored. At audits that were softened. At training that was “done” on paper. That is why I build programs that do not consist of a yearly e-learning people click through, but of a system of awareness, testing, controls—and above all: follow-through. Follow-through is the difference between theatre and oversight. And here too there is hope: if you can demonstrate that you actively prevented, detected, investigated, and corrected, the story changes. You are no longer the organization that “failed,” but the organization that intervened. It is not a guarantee you will have no problems—but it is a guarantee you will not be powerless when problems arrive.

Risk Management Integration

Finally, in this first sequence, I bring everything back to the place where it most often falls apart: risk management. Compliance and governance are still too often treated as separate islands. Beautiful islands, each with its own inhabitants, its own language, its own reports. Meanwhile the organization sails as one ship—and it springs leaks precisely where the islands refuse to speak to each other. I integrate compliance risks into enterprise risk management so they don’t surface only when damage becomes visible, but are treated as strategic risks with financial, operational, and reputational impact. I don’t want you to use risk scoring as a ritual, but as a decision-making instrument. I don’t want scenario analyses made for a drawer, but for action. I don’t want stress tests reserved for banks, but applied to any organization that thinks “it won’t happen to us.”

I force the C-suite to do more than react—to anticipate. The CRO and CCO must move together: identify high-risk processes, measure control effectiveness, and escalate deviations in a way that does not depend on personal courage, but is embedded in the system. The CFO must make financial exposure visible: fines, remediation costs, contract risks, insurance issues, reputational damage that translates into revenue and funding. And the CIO and CISO must integrate digital risks, because digital vulnerability today is not an IT problem but a governance problem. A data breach is not merely technical—it is evidence of failed oversight if you have not organized it. And note my words: I speak deliberately about non-compliance with the GDPR as a real board-level risk, because it is exactly that—not a legal detail, but a measurable, demonstrable failure when processes, logging, access control, and incident response are not in order.

And when you tell me: “But we have a risk register,” I tell you: a register is a list. I want a system that moves. That learns. That adjusts. That shows who knew what, when, and what was done with it. I want risk ownership not to evaporate into committees, but to be carried by people with mandate and accountability. And I want your organization to develop a culture in which uncomfortable information is not pushed down but processed—exactly as I told you earlier. That is the core. The changing world does not punish the existence of risks; it punishes the denial of them. I offer you hope because mature risk integration removes the strain: you don’t have to pretend you are perfect; you only have to be able to show you were awake, you intervened, and you wore your defensive line not as decoration, but as an instrument.

Third-Party & Supply Chain Compliance

I’m going to tell you this without detours: you can believe you have everything in order internally, and still go down because of someone who isn’t on your payroll. The third party. The supplier. The agent. The distributor. The “consultant” who supposedly only makes introductions. The IT partner who gets access to your systems. The logistics link you never see in a board paper because people label it “operational”—as if operational could not be a governance risk. And then it happens: a sanctions breach through a back route, a bribery signal involving an intermediary abroad, a data breach via a subcontractor, an invoice stream that doesn’t add up but is terribly “convenient.” And you look at your own org chart and think: it isn’t there. Of course it isn’t there. That is the problem. Your supply chain is where responsibility loves to dissolve into distance: “We didn’t know, they did it.” But the world no longer accepts that kind of polite denial. People lay the chain alongside your policy and ask one question: why did you allow this?

That is why I do not build third-party compliance as an extra step in procurement, but as a defensive line with the same discipline as your internal controls. Due diligence that is not a checklist someone ticks because they have to, but a risk-based investigation that goes deeper when the profile demands it. Contracts that do not merely contain elegant clauses, but enforceable audit rights, clear termination triggers, and concrete obligations for training, reporting, and incident notification. And I want you to understand why this matters so much: contracts are not the goal, they are the anchor. When an argument erupts later, the anchor is the difference between “you could have prevented it” and “you organized it, monitored it, and intervened.” I do not park General Counsel in a corner to “just check”; I put that role at the center so that agreements hold up legally and remain usable in practice. And I pull in the CFO and the CCO because money flows and integrity risks always find each other—even when you would rather look away.

But I go beyond paper. I want monitoring. I want you not only to select up front, but to control in between. I want you to organize signals: unusual payments, abnormal margins, unexplained subcontracting, sudden changes in ownership, odd requests to “sign quickly,” pressure to avoid audits. And I want the CIO and CISO to treat third-party access as a strategic risk: who enters where, with which rights, with which logging, and with what exit when the relationship ends? Because even a respectable supplier can be acquired on Tuesday by a party you would never have chosen to work with—and your systems will be the last to notice unless you organize it. Yes, this is confrontational. But it is also hopeful, because the gains here are enormous: by making chain compliance mature, you prevent being judged later on naïveté. You will be judged on maturity. And maturity is provable.

Data Governance & Privacy Compliance

Data is the new blood of organizations, and I still see directors treating it like water: something that simply runs through the pipes until there is a leak. And then, suddenly, everyone is awake—too late. The familiar panic follows: incident response, press questions, customers wondering what you are doing with their information, internal emails in which people nervously hunt for a story that will hold. And in that frenzy your greatest enemy appears: inconsistency. Because whoever speaks in panic speaks in variations. Whoever speaks in variations gets caught in contradictions. And then it is no longer “an incident,” but a symptom of failed leadership. That is why I organize data governance and privacy compliance as a system that does not begin when there is a breach, but that is visible precisely when there is no breach—because then it runs quietly, reliably, and under control.

I focus on the hard core: privacy-by-design that is not a slogan in a policy, but a technical and process reality that has been built in. Data retention that is not a theoretical schedule, but is actually enforced. Access management governed not by habit (“he’s had those rights for years”), but by necessity and periodic revalidation. Logging and audit trails that do not disappear at the exact moment you need them most. And I speak deliberately about non-compliance with the GDPR as a board-level risk that translates quickly into reputation damage, costs, and personal exposure. Not because I want to scare you, but because I want to wake you up. Because in a world where one dataset can leak and be reinterpreted in a single afternoon as “structural negligence,” having a policy is worth nothing without demonstrable execution.

I bind the CIO and CISO to governance as if it were self-evident—because it is. This is not “IT,” this is oversight. I let General Counsel secure what is legally possible and what is not, but I do not allow legal caution to decay into indecision. I have the CFO model the financial impact—not just fines, but remediation, downtime, claims, reputational damage, and the extra costs of everything you will have to do at speed afterwards. And I ensure you have escalation procedures that do not collapse into “we first had to figure out what exactly happened.” Of course you must find out what happened. But you must also show that you were organized to find out. The difference is huge: one is improvisation, the other is maturity. And here there is hope, because an organization that demonstrably controls data governance can act faster in a crisis, communicate more transparently, and correct more credibly. Credibility buys time. Time buys control.

Training, Awareness & Ethical Culture

You can have the best controls, the finest frameworks, the sharpest reports, and still fail if your culture teaches people to stay silent. Let me say something unpleasant: in many organizations compliance is a language people speak to preserve calm, not to find truth. People “do” training, they “have” awareness, they “encourage” speak up—while everyone knows exactly which type of report is career-dangerous. This is not always malicious; sometimes it is mere laziness: people want no hassle, no delay, no argument. But the changing world does not reward laziness. It punishes it. That is why I build training and awareness not as an HR ritual, but as a behavioral program the board can defend when someone later says: “That organization encouraged this.”

I design training as an instrument that makes people feel something: the boundary, the consequence, the reality. Not only “these are the rules,” but “this is how you recognize pressure, how you recognize rationalization, how you recognize the moment you start believing a small deviation is acceptable.” I tie awareness to concrete work processes: onboarding, performance management, promotion criteria, bonus structures, and the way leadership responds to dissent. Because if you punish dissent while preaching speak up, you are not preaching—you are lying—and the world sees through that faster than you think. I position the CEO and the board so they do not merely say integrity matters, but prove it when it hurts: by correcting a high performer, by pausing a deal, by treating internal escalation not as irritation but as information.

And then I measure it. I do not measure whether people “completed the training”; I measure whether behavior changes. I measure willingness to report, follow-up quality, turnaround times, patterns in incidents, repeat behavior, and above all the quality of leadership response. Because employees don’t watch your policy; they watch what happens when someone takes the policy seriously. I make that response predictable: report, triage, investigation, decision, follow-up, feedback. And I make sure this process still works when you yourself are under fire, when you are being accused. Because then it is crucial that you can show you did not have a culture of looking away, but a culture of acting. That is the hope I offer you: you do not have to be perfect, you have to be demonstrably honest in your ability to correct. In this era, that is rare. And rarity is believed.

Internal & External Audits

For many organizations audits are theatre with fixed roles: the auditor asks, the business sighs, finance delivers stacks, and finally a report appears that people “follow up” with a plan mainly designed to survive the next report. That is not an audit function; it is an audit ritual. And rituals have one major problem: they create a false sense of safety. I treat internal and external audits as a weapon, not a formality. A weapon that protects you when you have been harmed by non-conforming conduct, because it can find signals before damage explodes. And a weapon that protects you when you are accused, because you can show you subjected yourself to structured testing, you took findings seriously, and you used remediation not as cosmetics but as correction.

I organize audits around risk, not around convenience. I want scope and depth to be determined not by “where did we look last year,” but by “where can it go wrong this year.” I want audit findings not to end in a spreadsheet of action items with no ownership, but in a governance-driven follow-up with deadlines, escalation, and evidence of completion. And I want the board to be visible in this: not as the recipient of a summary, but as an actor who pushes through critical points. I bring the CFO, CCO, CRO, and General Counsel together so findings don’t get stuck between departments. CFO for financial reliability, CCO/CRO for compliance and risk, General Counsel for legal strategy and privilege where necessary, CIO/CISO for digital substantiation. Because an audit without data, logging, and technical underpinning is often an audit based on feelings—and feelings do not hold.

And I make audit follow-up hard. Not hard in tone, but hard in structure. “We’re going to improve it” is nothing. “We improved it, and here is the evidence” is everything. I build a remedial action framework in which every measure is measurable, testable, and retestable. I ensure audit and management do not remain in a polite dance, but that friction is allowed—because friction is often the only way truth surfaces. And I offer you hope because audits, when used properly, do not only protect you from incidents; they also give you calm: you know where you stand. You know what you don’t know. And you have a mechanism to discover it before the outside world discovers it for you.

Crisis Management & Regulatory Response

Crisis management is the moment your entire governance system is tested, and I have rarely seen people be honest about that in advance. Sometimes they run a scenario, they have a playbook, they know the phone numbers. But when the crisis really arrives, the playbook turns out to be too neat, too linear, too optimistic. The outside world doesn’t wait. The media doesn’t wait. Internal chat groups don’t wait. A regulator doesn’t wait. And worst of all: your own organization doesn’t wait, because in uncertainty people start inventing stories for themselves. In that situation crisis management is not a project; it is command. And command requires clarity: who decides, who speaks, who investigates, who documents, and who ensures no one makes mistakes that later become bigger than the original mistake.

That is why I build crisis response as an integrated machine: the CEO and the board steer strategically, General Counsel guards the legal route, the CFO runs the financial impact, the CCO/CRO drive remedial actions, the CIO/CISO organize technical incident response and forensics. But I do not let anyone get away with silo thinking. In a crisis truth is rarely neatly divided. A data breach has legal, technical, operational, and reputational components at the same time. A fraud case hits finance, HR, compliance, and external reporting at the same time. And that is why I create one coordination point and one line of facts, so you don’t get conflicting internal versions that later read externally as lies. I also ensure escalation does not depend on “we first need to align internally.” Alignment is good. Delay is fatal. The difference is discipline: you align on facts, and you organize facts faster than the crisis can take over.

And now comes the confrontational, necessary part: in today’s world “we take this seriously” is a sentence nobody believes anymore. People believe you only when you show you acted before you spoke publicly. That is why I make crisis management provable: timelines, decision logs, communication templates that remain consistent, ready-to-deploy procedures for self-reporting where necessary, and a lessons-learned process that does not end in a pretty report but in real changes to governance and controls. I offer you hope because a crisis doesn’t only destroy; a crisis can also repair—if you take back control. If you can show you did not duck, you did not wipe away, you did not evaporate into committees, but you acted. And when you are the one harmed, this helps you ground your story in facts. When you are the one accused, this helps you show you did not neglect—you led. In this era, that is the difference between an organization that gets written off and an organization that stays standing.

Areas of Focus

Previous Story

Supporting the transformation of clients’ organizations

Next Story

ESG Compliance, Investigations & Sustainability Risk Management

Latest from Practice Areas