How an engagement works
Most engagements follow the same shape — diagnose first, build the foundation that survives an
audit, then operate as your security function until you outgrow me.
Engagement phases
-
Week 1
Diagnose
- Current-state risk read
- Gap analysis against your relevant frameworks (GxP, SOX, NIST, ISO, HIPAA, PCI as applicable)
- Quick-wins list with audit-cycle priority weighting
-
Month 1
Foundation
- Core policy set with control-owner assignments
- Incident response plan with executive escalation paths
- Baseline TPRM process with vendor risk classification
-
Quarter 1
Operate
- Monthly security review cadence in place
- Quarterly audit-committee or board report cycle
- Awareness training program
- Control-evidence collection running ahead of next audit window
-
Ongoing
Mature
- Annual program review with framework re-mapping
- Hire planning toward in-house security function
- Documented exit roadmap when full-time leadership is warranted
Methodology
Four principles I run every engagement on.
01
Risk-driven, not framework-driven.
Frameworks are how auditors verify your program; risk is what your program actually addresses. I run the program for risk, then map it to whichever framework your buyers and regulators care about — not the other way around.
02
Audit-ready, not audit-anxious.
Every artifact I produce is shaped to survive auditor scrutiny: documented decisions, control-owner sign-off, evidence-of-control, change-control attestation. The audit becomes confirmation, not discovery.
03
Board-ready, jargon-light.
Your audit committee and board don't need a CISSP study guide. They need a one-page picture of where you stand, what's next, and what changed since last quarter. I write for that audience.
04
Honest scope, honest exit.
A vCISO engagement should end. The job is to mature your security program to the point where you don't need me — and to tell you when that point arrives.
Scope, honestly
What you get
-
Monthly written deliverables
Policies, decisions, reports — not just meetings.
-
Audit-committee-ready quarterly briefings
One-page picture of where you stand, what's next, what changed.
-
Documented control-owner assignments
Every control has a named owner and an evidence trail.
-
Clear engagement scope and clear endpoint
You'll always know what I'm doing this month and how the engagement ends.
What I won't do
-
Sell you tools.
No vendor referral fees. Tool recommendations are independent and scoped to your scale.
-
Run penetration tests myself.
Conflict of interest. I scope, broker the right firm, and triage findings — but a separate set of eyes is the point.
-
Take federal classified work.
No security clearance, intentional. If your scope requires it, I'll refer you to someone who's cleared.
-
Be your full-time CISO in disguise.
A fractional engagement only works if it's actually fractional. If your needs are full-time, I'll tell you and help you hire.
Most engagements start with a 30-minute conversation about your audit cycle.
Book a 30-min call