Buyer's Guide
How to Choose a Fractional CISO
The right fractional CISO can compound across your security program for years. The wrong one will burn 12 months and leave you in the same position. Here's the framework I'd use to make the decision — based on having sat on both sides of the table.
The five questions to ask every candidate
These questions are the diagnostic. They distinguish operators who've actually carried the role from advisors who've consulted to others doing it.
1. "Walk me through the worst incident you've personally responded to."
A real operator can describe a specific event in detail: the timeline, the decisions, what they got right, what they got wrong. They'll mention the legal team, the cyber insurance carrier, the federal liaison, and the customer-comms posture. Vague answers ("I've handled many incidents") are a tell — they advise rather than respond. Press for specifics: the hour-by-hour of the first 48 hours, the call to the CEO, the regulatory notification decisions.
2. "How do you report to a board? Show me a sample."
A good fractional CISO has a board-reporting template they actually use. Ask to see it (anonymized). Look for: risk stated in dollars and business outcomes, not heat maps; explicit residual risk acknowledgment; a clear ask or decision the board needs to make. If the sample is full of CVE counts and kill-chain diagrams, the candidate talks to engineers, not directors.
3. "What's your view on our specific industry's regulatory landscape?"
Don't ask "do you have fintech experience" — every candidate will say yes. Ask them to talk through the three regulatory pressures they'd expect a company at your stage in your industry to face in the next 18 months. A candidate with real industry experience answers in seconds. A generalist hesitates and pivots to general advice.
4. "What does the first 90 days look like, and what does month 6 look like?"
A real operator has a phased plan: month 1 is inventory and gap analysis, months 2-3 are remediation and policy work, months 4-6 are operational cadence and board reporting. If the answer is the same across all three windows ("we'd do an assessment, then implement"), the candidate doesn't have a stage-aware plan.
5. "When and how does this engagement end?"
The right answer is: "When you hire a full-time CISO, or when you no longer need security leadership at this intensity." A fractional engagement that's structured to continue forever has the wrong incentives. Ask explicitly what the transition looks like and whether the firm helps source and onboard your full-time hire.
Red flags to watch for
Six patterns that distinguish weak engagements from strong ones:
- "I've advised CISOs" instead of "I've been the CISO." There's a real difference. Advisors are useful for specific projects. Carrying a program through real operator pressure — board meetings, regulator audits, live incidents — is a different skillset.
- Vague incident response answers. If the candidate can't walk you through a specific incident in detail, they probably haven't run one.
- Big discount with no scope change. A fractional CISO who'll cut their price 50% to win the deal — without reducing hours or scope — is either padding the original quote or planning to staff you with someone less senior than they implied.
- No board-reporting plan. Boards care about cyber. If the engagement doesn't include a board-reporting cadence, the engagement isn't operating at the right altitude.
- Generic deliverable list. If the proposal could be sent to any company at any stage in any industry, the firm hasn't thought about your specific needs. Custom scope is a sign of senior advisory; generic scope is a sign of productized delivery (which can still work, but you should know what you're buying).
- Auto-renewing engagement with no review cadence. The right structure has a quarterly check-in where both sides explicitly evaluate whether the engagement is working. Auto-renew without review means the firm is optimizing for revenue continuity, not your outcomes.
The interview process
A working interview cadence for a fractional CISO hire:
- Initial screen (CEO/founder, 30 min). Vibe check. Does this person speak business, not just security? Can they explain things to a non-technical audience? If you'd be uncomfortable putting them in front of your board, stop here.
- Deep working session (CEO + technical lead, 60 min). Walk them through your business, your security posture, your customers' expectations. Ask the five diagnostic questions above. They should be asking good questions back — about your business model, your customers, your threat model, your risk appetite.
- CTO/engineering working session (CTO + candidate, 30 min). Test technical fluency and working relationship. The fractional CISO will spend most hours working with engineering. If your CTO doesn't trust them, it won't work.
- Reference calls (you, 30 min each, two references). Don't skip this. Ask the diagnostic question: "Would you hire them again at scale?"
- Engagement letter review (legal, async). The contract terms below.
How to check references
Three calls, three questions each. Ask the first reference to refer you to a second one (a "back-channel" reference, someone the candidate didn't list).
The questions:
- What did this person actually do for you? Cross-check against what the candidate told you they did. Discrepancies tell you about the candidate's self-presentation.
- What did they not do well? Every operator has weaknesses. References who can articulate them give you the most reliable signal.
- Would you hire them again, and at what scale? The diagnostic. "Yes, at any company stage" is the strong answer. "Yes, at our stage" is fine. "Probably" or hesitation is informative.
Contract terms that matter
Six terms to read carefully and negotiate. Most boilerplate engagement letters cover these — the question is whether the language protects you or the firm.
1. Named operator clause
Your engagement letter should name the specific person leading the engagement. It should require written notification if they leave the firm or are reassigned, with the right to terminate without penalty if you don't accept the replacement. Without this clause, you signed up for a brand and the firm can rotate operators freely.
2. IP and work-product ownership
Anything produced for you — policies, runbooks, board reports, risk registers — should be your property to use, modify, and retain after the engagement ends. Some firms try to keep IP rights on "their methodology"; that's fine for the methodology itself, but the artifacts produced for you are yours.
3. Termination
30 to 60 days written notice without penalty after the first 6 months. The first 6 months is reasonable for onboarding investment; after that, both sides should be free to walk if it's not working.
4. Confidentiality and conflict of interest
Mutual NDA covering both directions. Specific clause on competitor work — does the firm work with your direct competitors at the same time? Some firms do; that's not automatically bad, but you should know.
5. Liability cap
Standard practice is to cap liability at fees paid in the prior 12 months. Don't sign engagement letters with higher caps unless you're paying for that risk. Don't sign letters with no liability framework at all — that makes recovery on a real failure messy.
6. Reference and case-study rights
Most firms want to cite you as a client publicly (logo on website, named case studies). Negotiate the wording, not the right itself. A typical compromise: logo and unnamed quote with prior approval, no specific deliverable details published.
Firm vs. individual operator
A standalone fractional CISO (working independently, not through a firm) is cheaper and more direct. A firm-based operator costs more but brings infrastructure: backup if your primary operator is unavailable, specialist support (assessment, compliance, incident response), and proprietary tooling. Trade-offs:
Hire an individual when
- Budget is tight and you can tolerate single-point-of-failure risk
- Your scope is narrow and well-defined (advisory + board reporting, no incident-response coverage needed)
- You have strong internal engineering depth that can handle execution
- You value direct, unfiltered access to one operator
Hire a firm when
- Security is mission-critical to your business and continuity matters
- You need broader scope (assessments, compliance, vendor management, incident response, M&A support)
- You're regulated and need bench depth for surge capacity (audits, regulator interactions)
- You want proprietary tooling that compresses the operator's hours
vCSO.ai operates on the firm-with-named-operator model: Nick Shevelyov is the named CISO on every engagement, supported by specialists in assessment, compliance, and operations. The firm uses proprietary tooling (Theodolite) to compress what would otherwise be weeks of consultant work. See "What is a fractional CISO?" for the role definition, or "vCISO vs fractional CISO" for the terminology distinctions.
Questions & answers
What questions should I ask a fractional CISO candidate?
How long should a fractional CISO engagement run?
Should I hire an individual fractional CISO or a firm?
What red flags should I watch for?
Should the fractional CISO write our security policies, or do we?
What contract terms matter most?
How do I check references on a fractional CISO?
When should I bring our CTO/CIO into the interview process?
Ready to talk to a fractional CISO?
Nick's team advises growth-stage companies, PE/VC sponsors, and cybersecurity product teams. First call is strategy, not vendor pitch. We reply within one business day.