Skip to content
Jaime Pauline

How an engagement works

Most engagements follow the same shape — diagnose first, build the foundation that survives an audit, then operate as your security function until you outgrow me.

Engagement phases

  1. Week 1

    Diagnose

    • Current-state risk read
    • Gap analysis against your relevant frameworks (GxP, SOX, NIST, ISO, HIPAA, PCI as applicable)
    • Quick-wins list with audit-cycle priority weighting
  2. Month 1

    Foundation

    • Core policy set with control-owner assignments
    • Incident response plan with executive escalation paths
    • Baseline TPRM process with vendor risk classification
  3. Quarter 1

    Operate

    • Monthly security review cadence in place
    • Quarterly audit-committee or board report cycle
    • Awareness training program
    • Control-evidence collection running ahead of next audit window
  4. Ongoing

    Mature

    • Annual program review with framework re-mapping
    • Hire planning toward in-house security function
    • Documented exit roadmap when full-time leadership is warranted

Methodology

Four principles I run every engagement on.

01

Risk-driven, not framework-driven.

Frameworks are how auditors verify your program; risk is what your program actually addresses. I run the program for risk, then map it to whichever framework your buyers and regulators care about — not the other way around.

02

Audit-ready, not audit-anxious.

Every artifact I produce is shaped to survive auditor scrutiny: documented decisions, control-owner sign-off, evidence-of-control, change-control attestation. The audit becomes confirmation, not discovery.

03

Board-ready, jargon-light.

Your audit committee and board don't need a CISSP study guide. They need a one-page picture of where you stand, what's next, and what changed since last quarter. I write for that audience.

04

Honest scope, honest exit.

A vCISO engagement should end. The job is to mature your security program to the point where you don't need me — and to tell you when that point arrives.

Scope, honestly

What you get

  • Monthly written deliverables

    Policies, decisions, reports — not just meetings.

  • Audit-committee-ready quarterly briefings

    One-page picture of where you stand, what's next, what changed.

  • Documented control-owner assignments

    Every control has a named owner and an evidence trail.

  • Clear engagement scope and clear endpoint

    You'll always know what I'm doing this month and how the engagement ends.

What I won't do

  • Sell you tools.

    No vendor referral fees. Tool recommendations are independent and scoped to your scale.

  • Run penetration tests myself.

    Conflict of interest. I scope, broker the right firm, and triage findings — but a separate set of eyes is the point.

  • Take federal classified work.

    No security clearance, intentional. If your scope requires it, I'll refer you to someone who's cleared.

  • Be your full-time CISO in disguise.

    A fractional engagement only works if it's actually fractional. If your needs are full-time, I'll tell you and help you hire.

Most engagements start with a 30-minute conversation about your audit cycle.

Book a 30-min call