All articles Risk Management

What Risk Management Consulting Actually Looks Like

Risk management consulting should change how you make decisions — not produce a binder. Here's what an operator-led engagement actually delivers.

Nick Shevelyov

Nick Shevelyov

Founder, vCSO.ai · Former Chief Security Officer, Silicon Valley Bank

Published

Read time

10 min

Share

What Risk Management Consulting Should Actually Deliver — And Why the Operator’s Perspective Changes Everything

A navigation chart is useless if you can’t read it. Worse than useless — it gives you confidence you haven’t earned. You plot the course, you set the heading, and you run aground on the shoal that was marked on the chart the whole time. The chart wasn’t wrong. The person reading it lacked the experience to distinguish between the critical and decorative features. Risk management consulting has the same structural problem. The industry produces an enormous volume of charts — assessments, matrices, heat maps, risk registers — and most of them are useless in the hands of those who receive them. Not because the analysis is wrong. Because the analysis doesn’t connect to decisions. I’ve spent 25+ years working on cyber risk from every chair in the room. Technical operator running an attack-and-penetration team early in my career. Strategic consultant at Deloitte. Fifteen years as Chief Security Officer of Silicon Valley Bank — four continents, regulatory examinations, nation-state campaigns, and the 2 AM incidents that test whether your risk framework actually works or just looks good in a boardroom. Since founding vCSO.ai, I’ve worked with dozens of companies that had risk assessments on file and no idea what to do with them. The gap isn’t information. It’s judgment. And the difference between cybersecurity risk management consulting that changes outcomes and the kind that produces a binder is almost entirely a function of whether the person leading the engagement has actually managed risk under pressure.

Why Most Risk Management Consulting Fails the Reality Test

The standard engagement follows a predictable pattern. A firm arrives, interviews your team, maps your environment against a framework (NIST CSF, ISO 27001, CIS Controls), and produces a gap analysis. The gap analysis identifies 40 to 80 findings, ranks them by severity (high/medium/low), and delivers them in a report nobody reads past page 12. The findings aren’t wrong. The structure is. The severity rankings are subjective. “High, medium, low” is theater, not measurement. My friend Doug Hubbard wrote a book called How to Measure Anything in Cybersecurity Risk that dismantles this practice with surgical precision. If your risk assessment can’t express findings in terms of probability and impact — in dollars, in days of disruption, in regulatory exposure — then you’re not assessing risk. You’re categorizing anxiety. The findings are disconnected from your business context. A finding that reads “multi-factor authentication is not enforced for all privileged accounts” means something different at a 200-person SaaS company than at a regulated financial institution. The control gap is the same. The business risk is orders of magnitude different. A good risk assessment connects every finding to a specific business outcome — revenue impact, regulatory consequence, deal-pricing implication — not just a framework requirement. Most firms don’t stay for the hard part. They deliver the assessment and leave. The client is holding a 70-page report with no idea which findings to address first, no understanding of the resource requirements, and no framework for making the tradeoff decisions that real risk management demands. The chart is on the desk. Nobody knows how to navigate by it. There’s a fourth problem nobody talks about. Most assessments are wired to find the gaps the framework knows about, not the ones that actually hurt. Charlie Munger said it best: “Show me the incentive, and I will show you the outcome.” A consultant compensated on engagement volume isn’t incentivized to surface the structural Red Swans — the controls you believe are managed but aren’t, the assumptions you’ve stopped questioning. They’re incentivized to populate the checklist. That’s the gap behind the gap.

What Cybersecurity Risk Management Consulting Should Deliver

Real risk management consulting doesn’t end with a report. It begins with one. Risk landscape, not risk list. The first deliverable should be a structured view of the organization’s risk, mapping threats to assets and business outcomes. Not a list of vulnerabilities. A landscape that shows how risks interact, where toxic combinations create outsized exposure, and which risks compound over time if left unaddressed. At SVB, I maintained a living risk landscape that connected technical findings to business-unit exposure. When the Federal Reserve examined our program, they didn’t ask “how many vulnerabilities do you have?” They asked, “Which risks are you choosing to accept, why, and how do you know the acceptance is calibrated?” That’s the question real cybersecurity governance answers. Quantified outcomes, not colored cells. The shift from qualitative to quantitative risk assessment is the single most important upgrade a security program can make. It’s also the one most risk advisory firms refuse to deliver, because it requires actual judgment — not just framework mapping. Quantitative risk assessment means expressing findings in terms the board can govern: annual loss expectancy, value at risk, return on security investment. Cyber risk management is portfolio management. You’re making probabilistic bets under uncertainty. You assess your value at risk quantitatively and qualitatively. You calculate ALE and determine what’s tolerable versus intolerable. You build controls to reduce the residual to an acceptable level. Whatever remains irreducible, you underwrite with cyber insurance. This isn’t a technology exercise. It’s capital allocation. Finance doesn’t report earnings as “high, medium, low.” Operations doesn’t measure uptime with a color-coded heat map. Cybersecurity shouldn’t be the one domain where measurement is optional. Decision architecture, not just findings. The most valuable output of an engagement isn’t a finding — it’s a decision framework. Which risks do you accept? Which do you mitigate? Which do you transfer? On what basis do you make those choices? Every risk decision is a resource allocation decision. A dollar spent on one control is a dollar not spent on another. A consultant who hands over findings without a prioritization framework has given you a menu without prices. You can see the options. You can’t make an economically rational choice between them. This is where the operator’s perspective changes everything. Someone who has sat in the chair — who has defended a risk acceptance to a Federal Reserve examiner, who has explained to a board why they’re investing $2M in identity security instead of endpoint detection — brings a pattern recognition no framework can replicate.

The Operator Gap in Risk Advisory Services

There’s a structural tension in this industry. The firms with the largest practices — the Big Four, the global consultancies — carry the brand recognition and the regulatory relationships. But the people staffing the engagements are typically three to five years out of graduate school, working from a playbook, rotating to the next client before the ink is dry on the deliverable. The people with the deepest operator experience — former CISOs, executives who’ve managed real programs under real pressure — tend to work in boutique practices or advisory roles. They’re harder to find, harder to scale, and harder to fit into a procurement process designed for vendor panels. I’m not disparaging the large firms. Some do excellent work at the technical assessment layer. But risk management consulting at the strategic layer — where the board needs to make decisions about risk appetite, security investment, and governance posture — requires the judgment that comes from having lived with the consequences of those decisions. Scar tissue, not syllabus. When I advise a company on its risk posture, I’m not mapping controls to a framework. I’m asking: if this company were my company, which three risks would keep me awake, and what would I do about them before the next board meeting? That’s a fundamentally different question than “which controls are missing from the checklist?” There’s a working assumption I bring to every engagement: roughly 20% of the controls you believe are operating are, at any given moment, partially or fully broken. The patch process hasn’t caught the new SaaS estate. The MFA rollout covers email, but missed the internal admin consoles. The DLP rule set was tuned three years ago for a data flow that no longer exists. Frameworks test capability. Operators test configuration and coverage. The Red Swans hide in the gap between the two.

When Risk Management Consulting Makes Sense

Not every company needs outside risk management consulting. There are inflection points where the internal perspective isn’t enough. Board pressure without internal depth. Your board is asking cybersecurity risk questions your team can’t answer in business terms. This is the most common trigger — and the most urgent. A board that isn’t getting credible risk reporting is governing blind, and the regulatory environment is increasingly unforgiving about that gap. The SEC’s disclosure rules make board oversight of cyber risk a matter of public record. Pre-M&A or fundraising. Investors and acquirers run cybersecurity due diligence. If you haven’t run it on yourself first, you’re negotiating from a position of ignorance. A risk assessment designed to anticipate the buyer’s questions — and to present your posture credibly — is worth multiples of its cost in terms of deal pricing. Post-incident recalibration. After a breach, the instinct is to throw money at the visible failure mode. A structured assessment after an incident does the harder work: identifying the systemic governance gap that allowed the incident, not just the technical vulnerability that enabled it. Pre-mortem thinking before incidents is ideal. The post-mortem review is where most companies discover the structural work they should have done earlier. First engagement with a fractional CISO. When we onboard a new CISO-as-a-service engagement, the risk assessment is the diagnostic on which everything else hangs. It tells us where the program is, where it needs to be, and what the roadmap looks like. A virtual CISO who doesn’t start with risk assessment is flying without a chart. Resilience is execution, held together by governance. Risk management consulting earns its keep when it sharpens execution and makes governance honest. Anything less is decoration. Forewarned is forearmed.


Frequently Asked Questions

How much does cybersecurity risk management consulting cost? Costs vary widely with scope and depth. A focused risk assessment from a boutique operator-led firm typically runs $25,000 to $75,000 for a mid-market company, depending on complexity and the depth of quantitative analysis required. Big Four engagements can run two to five times that, often with a larger team and a more templated approach. The question isn’t the fee — it’s the decision value of the output. A $50,000 assessment that changes how you allocate your $500,000 security budget has a 10x return. A $200,000 assessment that produces a binder no one reads yields a negative return. What’s the difference between a risk assessment and a compliance audit? A compliance audit evaluates whether your controls meet the requirements of a specific framework. A risk assessment evaluates whether your security posture adequately protects your business, given your actual threat landscape, risk appetite, and business context. They overlap — a well-designed compliance program is risk-informed — but they serve different purposes. An organization can be fully compliant and still carry unacceptable risk if the framework doesn’t cover its specific threat profile. How often should a company conduct a risk assessment? At minimum, annually — and any time there’s a material change to the business: M&A activity, significant infrastructure changes, new regulatory requirements, or a security incident. The assessment itself is a snapshot. What matters more is whether the risk landscape is maintained as a living artifact between formal assessments — updated as new threats emerge, new controls are deployed, and new business decisions shift the risk profile. Can risk management consulting help prepare for board presentations? Yes — and this is often the highest-value outcome. Boards don’t need to see a risk register. They need to understand the risk narrative: what the top risks are, how they’re being managed, and what investment decisions the board needs to make. Resilience is execution, held together by governance. Governance starts with the board understanding what it’s governing.


Nick Shevelyov — Founder, vCSO.ai · Former Chief Security Officer, Silicon Valley Bank. Work cited by the Federal Reserve as the textbook response to SolarWinds.

Share this article
Talk to us Tell us your needs →