All articles Security Leadership

4 Questions I Ask in Every Fractional CISO Interview

How to choose a fractional CISO using four questions that separate operators from consultants. From someone who's been on both sides.

Nick Shevelyov

Nick Shevelyov

Founder, vCSO.ai · Former Chief Security Officer, Silicon Valley Bank

Published

Read time

11 min

Share

Most fractional CISO hiring processes are broken the same way.

The committee reviews resumes. They count certifications. They check for CISSP, CISM, maybe a Big Four pedigree. They ask about years of experience and industry verticals. Then they pick the candidate who pattern-matches to what a security executive “should” look like on paper.

And six months later, the engagement is foundering. The board deck is a recycled template. The incident response plan is a PDF nobody has tested. The “strategic advisor” is billing hours against a vague scope and delivering PowerPoints that don’t connect to business risk. I’ve watched this play out at PE portfolio companies, growth-stage SaaS firms, and community banks. The failure mode is always the same: the hiring committee optimized for credentials when they should have been testing for operational judgment.

I’ve been on both sides of this table. I spent fifteen years as CSO at Silicon Valley Bank, and I’ve sat on hiring committees evaluating fractional CISO candidates for companies that needed strategic cybersecurity leadership but couldn’t justify or couldn’t find a full-time hire. Over the years, I’ve distilled the evaluation down to four questions. They’re not clever. They’re not designed to trip anyone up. They’re designed to reveal whether someone has actually been in the chair or just advised from the sidelines.

If you’re evaluating how to choose a fractional CISO, these four questions will tell you more in thirty minutes than a stack of resumes will tell you in a week.

The Incident Question Every Fractional CISO Must Answer

“Walk me through the worst incident you owned end-to-end. Skip the resolution — focus on the first 48 hours.”

The word that does the work here is “owned.”

Not “were involved in.” Not “helped respond to.” Owned. End-to-end. I want to hear about the call they made at midnight, the team they marshaled before the sun came up, the board member they briefed while the forensics were still running. I want the first 48 hours because that’s where the real decisions live — before the playbook kicks in, before the consultants arrive, before anyone has a clean picture of what happened.

Operators light up when they hear this question. They’ve been carrying these stories for years. They remember the specific timestamp when they escalated, the debate over whether to pull systems offline, the moment they realized the initial scope was wrong by an order of magnitude. The details are granular and sequenced because they lived them.

Consultants stumble. They’ll describe an incident they “supported” or “advised on.” They’ll jump to the resolution because that’s the part they documented in the after-action report. The first 48 hours are hazy because they showed up on day three when someone called for help.

Red flag: “We identified the indicators of compromise and initiated our incident response plan.” That’s a sentence from a case study, not from someone who was in the room.

Green flag: “I called our outside counsel at 11 PM because I needed to invoke privilege before we brought in the forensic team. Then I woke up the CFO because we had a board meeting in 36 hours and I needed her to know we might be disclosing.” That’s the granularity of someone who owned the outcome.

This question connects directly to the governance layer I discussed in the CISO as a service piece — if you’re trusting someone with incident governance, you need to know they’ve actually governed an incident, not just written the playbook someone else would follow.

The Board Deck That Reveals a Fractional CISO’s Real Skill

“Show me your last board deck. We don’t need to read it together — I want to see the structure and how you frame residual risk.”

I don’t care what’s in the deck. I care about how it’s built.

A board deck is translation work. The fractional CISO’s job is to take a complex, evolving, deeply technical risk landscape and render it in a language that directors can act on. That’s not a presentation skill. That’s a cognitive discipline. And the structure of the deck reveals whether someone has developed it.

What I’m looking for: Does the deck lead with business risk or with threats? There’s a crucial difference. Leading with threats — “Nation-state actors are targeting our sector, ransomware is up 300%” — is fear-selling. It’s what MSSPs do in quarterly business reviews. Leading with business risk — “Our three highest-exposure areas are X, Y, and Z, here’s how each connects to revenue, regulatory posture, and operational continuity, and here’s our residual risk after current controls” — is governance.

Does the deck quantify anything, or is it all qualitative heat maps? Red-yellow-green matrices are the most common evasion technique in board reporting. They look like measurement. They’re actually opinion wearing a color scheme. A candidate who can show me even one slide where risk is expressed as a calibrated estimate or a dollar-denominated exposure range has already separated themselves from 80 percent of the field.

Red flag: A 40-slide deck with a detailed threat landscape section and no articulation of what residual risk the board is actually accepting.

Green flag: An 8-slide deck where the second slide frames the top three risks in business terms, the fifth slide shows what’s changed since last quarter, and the last slide asks the board a specific question about risk appetite. That’s an operator who understands the audience.

The how to choose a fractional CISO guide covers the broader evaluation framework, but this single artifact — the board deck — is the fastest diagnostic I’ve found. It tells you how someone thinks, not just what they know.

The Framework Trick Question

“Which framework do you start with for a Series B SaaS company, and why?”

This is the trick question.

There’s no right answer. NIST CSF, SOC 2, ISO 27001 — all defensible starting points depending on the company’s customer base, regulatory landscape, contractual obligations, and go-to-market motion. A B2B SaaS company selling into enterprise might need SOC 2 first because customers are asking for it. A company with European customers might need ISO 27001 for market access. A company in a regulated industry might need NIST CSF as the internal organizing framework while pursuing SOC 2 as the external attestation.

The question isn’t testing knowledge. It’s testing rigidity.

Candidates who answer with immediate certainty — “Always start with SOC 2” or “NIST CSF, every time” — are telling me they’ve built a practice around one framework and they’ll apply it regardless of context. That’s a consultant with a methodology, not an operator with judgment.

The best answers I’ve heard start with “It depends on…” and then walk through the variables: Who are your customers, and what are they asking for in security questionnaires? What’s your regulatory exposure? Where are you in the fundraising cycle, and what will Series C investors expect? Are there contractual requirements from existing customers that create a de facto mandate? What’s the existing control maturity — are we building from zero or formalizing what’s already there?

No silver bullet, no silver buckshot. The framework decision is a strategic choice that depends on the business, and a fractional CISO who doesn’t ask those questions before answering is going to build you the wrong program.

Understanding what a fractional CISO actually does versus what a consultant does starts right here — with the question of whether they adapt to your context or force you into theirs.

The SOW Clause That Separates Fractional CISO Operators from Consultants

“What’s the SOW clause you negotiate hardest on?”

This question separates people who’ve been burned from people who haven’t thought about it yet.

Every operator who’s been in a fractional engagement that went sideways can point to the SOW clause that caused the pain. Maybe scope crept because “strategic advisory” wasn’t bounded. Maybe the escalation path was undefined, so when an incident hit, nobody knew whether the fractional CISO was responsible for crisis management or just consulting from the side. Maybe the termination clause was structured so that walking away from a bad engagement meant paying a penalty that made no sense.

Operators negotiate on scope boundaries and escalation paths because those are the joints where engagements fracture. They negotiate on what happens when something goes wrong — because something always goes wrong. They negotiate on the named-operator clause because they know the bait-and-switch problem: the senior partner sells the engagement, and a junior associate shows up to run it.

Consultants negotiate on hourly rates and travel expenses. That’s not wrong — it’s just revealing. If the hardest negotiation point is how much per hour and who pays for the flight, the engagement hasn’t been structured around accountability. It’s been structured around billing.

Red flag: “I don’t usually get into the contract details — my firm handles that.” That’s someone who’s never had to live with the consequences of bad SOW language.

Green flag: “I always insist on a defined escalation path for incidents and a clause that specifies minimum hours of my direct involvement versus delegation to my team. I learned that the hard way on an engagement where the client thought they were getting me and instead got a junior analyst for 80 percent of the hours.” That’s someone who negotiates from scar tissue.

The difference between a fractional CISO and a full-time CISO isn’t just cost structure — it’s the contract that governs the relationship. The SOW is where the engagement either works or quietly fails.

What the Four Questions Reveal Together

Each question tests a different dimension: incident ownership, board-level communication, strategic adaptability, and contractual accountability. But the four together reveal one thing: whether the candidate is an operator or a consultant wearing an operator’s title.

The distinction matters because the fractional CISO model only works when the person in the role carries the weight of accountability. A consultant delivers recommendations. An operator owns outcomes. When the board asks “who is responsible for our cybersecurity posture?” — the fractional CISO needs to be the person who can answer that without hedging, because they’ve done it before, at scale, under pressure.

The credential stack — CISSP, CISM, CRISC, whatever alphabet soup the resume carries — tells you someone passed a test. These four questions tell you whether they’ve been tested.

I think about building security leadership the same way I think about building teams more broadly: the right horses for the right courses at the right time. A fractional CISO is a specific kind of horse for a specific kind of course. The interview is where you determine whether the horse has actually run the race or just trained for it.

For context on what distinguishes the virtual CISO label from the fractional CISO label, the terminology is less important than what these four questions surface. Call the role whatever you want. The operational depth is what matters.

Frequently Asked Questions

How many interviews should a fractional CISO evaluation process include?

Three is the right number for most organizations. The first is the strategic conversation — these four questions, plus whatever the hiring committee needs to assess culture fit. The second is a working session with your CTO or head of engineering, because that’s the relationship that determines daily effectiveness. The third is a reference check conversation, not a call to the names the candidate provided, but to the people you find through your own network who’ve worked alongside them. More than three rounds signals indecision. Fewer than two is gambling.

Should we require specific certifications from a fractional CISO?

Certifications tell you someone studied for a test. They don’t tell you someone can lead a program under pressure. A CISSP demonstrates baseline knowledge. It doesn’t demonstrate the judgment to brief a board at 2 AM or the composure to manage an incident where the scope is expanding faster than you can contain it. I’ve met operators with no CISSP who run exceptional programs, and I’ve met CISSP holders who couldn’t manage an actual incident. Use certifications as a baseline filter, not a selection criterion. The virtual CISO cost guide explains how to evaluate the total value of an engagement beyond credential checklists.

What if a fractional CISO candidate has great answers but no board-level references?

That’s a significant gap. Board reporting is not a skill you develop in theory — it’s built through repetition, feedback, and the particular pressure of presenting to people who control your budget and your mandate. A candidate who has never presented to a board can grow into it, but you’ll be paying for that learning curve. If you’re a company where board reporting is a primary deliverable — and for most fractional engagements, it should be — prioritize candidates who can provide a board member as a reference. If they’ve genuinely done the work, at least one director will remember them.

Can these questions work for evaluating a full-time CISO hire too?

Every one of them translates directly. The incident question, the board deck question, the framework question, and the SOW question — swap “SOW clause” for “the organizational boundary you negotiate hardest on” and you have the same diagnostic for a full-time hire. The four questions test operational judgment, and operational judgment doesn’t change with the employment model. Whether you’re hiring fractional or full-time, what you’re really evaluating is whether this person has been in the chair when it mattered.


The real question at the end of a fractional CISO interview isn’t whether someone has the right certifications or the right number of years on the resume. It’s whether you’d want them in the room at 2 AM when everything is on fire and the board is calling.

If the answer isn’t an immediate yes, keep looking.


Nick Shevelyov is the founder of vCSO.ai and former Chief Security Officer of Silicon Valley Bank. He advises boards, PE/VC firms, and growth-stage companies on fractional CISO advisory services.

Share this article