Advisory
Phase active
01 Design
All critical digital infrastructure, software, and data flows are controlled by foreign vendors. The organisation has no ability to audit, interrupt, or substitute any component. A vendor decision, sanction, or outage is indistinguishable from a national crisis.
Infrastructure
Our edge
Our entry point: the Sovereignty Risk Assessment. Clients at Level 0 cannot accurately map their own exposure — we deliver that map. In 4 weeks we produce a three-dimension dependency map, top-5 kill-switch register, and a 30-day action list. In 8 weeks, the complete six-dimension picture.
+ University
Phase active
Status at this level — across all six dimensions
Key moves to reach this level
Our edge
Our differentiator: sovereign-native observability (OpenTelemetry / Prometheus / Grafana) — no Datadog, no foreign SaaS in the monitoring path. Your telemetry stack is itself sovereign from day one.
University enters here
University co-investigator signs onto assessment reports — converting consultant findings into jointly validated academic conclusions. Graduate researchers handle dependency-mapping legwork at research-assistant rates. First cohort of train-the-trainers candidates identified from top students.
Level 2
+ University
Phase active
+ University
Phase active
03 Stress Test →
The stress test is passed. This is the only level gated by certified proof, not just implementation. RTO under 4 hours signed. National peak load validated. Phase 4 — Train the Trainers — now begins: credentialing your people through KAUST so they own this without us.
+ University
Your hardware, your software, your sovereignty?