The Security Leadership Gap Is Structural
The cybersecurity talent shortage is not a cyclical hiring challenge. It is a structural market failure, and it is getting worse.
The ISC2 2024 Cybersecurity Workforce Study found that the global cybersecurity workforce gap has reached 4.8 million unfilled positions — a 19.1% year-over-year increase. The total active workforce stands at approximately 5.5 million professionals, representing just 0.1% growth. The gap is now nearly as large as the workforce itself.
The numbers behind the headline are equally sobering:
- 67% of organisations report staffing shortages in their cybersecurity teams (ISC2 2024)
- 90% of organisations identify skills gaps within their existing security staff (ISC2 2024)
- Europe experienced a -0.7% workforce reduction in 2024, meaning the continent actually lost cybersecurity professionals in absolute terms (ISC2 2024)
For European businesses specifically, the picture is stark. ENISA estimates a deficit of approximately 300,000 cybersecurity professionals across the EU. Their 2024 NIS Investments study — conducted across 1,350 organisations in all 27 EU member states — found that 59% of SMEs struggle to secure qualified cybersecurity talent.
These figures represent a fundamental constraint. When the majority of small and mid-sized enterprises cannot hire the security expertise they need, the traditional model of building an in-house security function simply does not work for most organisations. The question becomes not whether to seek external security leadership, but how to structure it effectively.
The Cost of a Full-Time CISO
Even when qualified candidates are available, the economics of a full-time CISO hire present a formidable barrier for mid-market companies.
| Market | Average Total Compensation | Source |
|---|---|---|
| United States | USD 565,000 | IANS Research 2024 (n=755) |
| Europe (global survey) | USD 595,000 | Heidrick & Struggles 2024 Global CISO Survey |
| Germany (base salary) | ~EUR 145,000 | Glassdoor/SalaryExpert 2024 |
| Netherlands (base salary) | ~EUR 143,000 | Glassdoor/SalaryExpert 2024 |
| France (base salary) | ~EUR 131,000 | Glassdoor/SalaryExpert 2024 |
European base salaries tell only part of the story. Employer social contributions add 25-35% on top of gross salary, depending on the jurisdiction. When benefits, equity, tooling budgets, conference attendance, and ongoing training are included, the fully loaded annual cost of a mid-market CISO in Europe reaches EUR 220,000 to EUR 350,000 or more.
Retention compounds the problem. IANS Research found that CISOs who switch employers see an average compensation increase of 31%, creating persistent upward pressure on salaries across the market.
We examine the financial case for fractional security leadership in detail — including pricing tiers, cost savings analysis, and break-even calculations — in our analysis of fractional CISO ROI.
What a Virtual CISO Actually Delivers
A common misconception is that a virtual CISO is simply a consultant who writes policies and disappears. In practice, an effective vCISO engagement follows a structured progression through three phases, each building on the last.
Phase 1 — Discovery and Baseline (Weeks 1-8)
The first phase establishes where the organisation stands. This typically includes:
- Security posture assessment: a comprehensive evaluation of current controls, technologies, processes, and organisational practices
- Maturity assessment: measurement against an established framework — ISO 27001, NIST CSF 2.0, or CIS Controls v8 — to create a quantifiable baseline
- Risk register development: identification, classification, and prioritisation of risks across the business, including operational, regulatory, and third-party risks
- Regulatory obligation mapping: inventory of applicable laws, directives, and standards based on the organisation's sector, geography, and client requirements
- Stakeholder interviews: conversations with leadership, IT, legal, operations, and product teams to understand the security culture and decision-making dynamics
- Prioritised gap report: a deliverable that translates assessment findings into actionable recommendations, ranked by risk severity and implementation effort
The output of Phase 1 is not a generic slide deck. It is a documented, evidence-based picture of where the organisation is today and where the most significant gaps exist.
Phase 2 — Roadmap and Foundation (Months 2-6)
With the baseline established, the vCISO builds the security programme architecture:
- Multi-year security roadmap with measurable milestones, budget estimates, and resource requirements — typically spanning 18 to 36 months
- Policy framework: incident response plan, access control policy, data protection policy, acceptable use policy, vendor management policy, and related documentation tailored to the organisation's context
- Governance structure: establishment of a security steering committee, definition of reporting cadence to the board or executive team, and clarification of roles and responsibilities
- Board and executive reporting template: a standardised format for communicating security posture, programme progress, risk status, and resource needs in business language
- Quick wins: immediate-impact improvements such as multi-factor authentication rollout, access control hygiene (removing orphaned accounts, enforcing least privilege), patch management SLAs, and email security hardening
Phase 2 transforms the gap analysis into an operating programme with clear ownership and accountability.
Phase 3 — Ongoing Programme Oversight (Month 6+)
The long-term engagement phase is where the vCISO functions as a true member of the leadership team:
- Regular board reporting: quarterly or monthly security updates translated into risk and business language
- Compliance programme management: ongoing oversight of certification readiness, audit preparation, evidence collection, and remediation tracking
- Incident response planning: development and execution of tabletop exercises, scenario testing, and response playbook refinement
- Supply chain and vendor risk oversight: assessment of third-party security posture, contract security requirements, and ongoing monitoring of critical suppliers
- Annual risk assessment refresh: reassessment of the risk register against changes in the threat landscape, business operations, and regulatory environment
- Regulatory change monitoring: tracking new and evolving regulations — NIS2 transposition timelines, DORA technical standards, AI Act requirements — and assessing their impact on the organisation
A key operational advantage of the vCISO model: a qualified provider can be operational within two to six weeks, compared to the three to six months typically required to recruit, hire, and onboard a full-time CISO.
Engagement Models
Virtual CISO engagements are not one-size-fits-all. The market has matured to offer several distinct models, each suited to different organisational needs and maturity levels.
| Model | Structure | Best For | Typical Duration |
|---|---|---|---|
| Retainer | Fixed monthly hours (10, 20, 30, or 40 hours/month) | Ongoing strategic leadership and governance | 12+ months |
| Project-based | Bounded scope and deliverables | Certification readiness, programme builds | 1-12 months |
| Hourly / Ad hoc | On-demand advisory | Occasional guidance, second opinions | As needed |
| Hybrid | vCISO strategy + MSSP operations | Organisations needing both leadership and execution | 12+ months |
Retainer engagements provide the most consistent value for growing organisations. A fixed monthly allocation of hours — typically 10 to 40 hours depending on complexity — ensures regular strategic oversight, board reporting, and programme management. Most providers require a 12-month minimum commitment to allow sufficient time for meaningful programme development.
Project-based engagements are appropriate for bounded objectives: SOC 2 readiness (typically 3-6 months), ISO 27001 gap assessment and remediation (6-12 months), security programme build-out (4-8 months), or incident response support following a breach (1-3 months).
Hybrid engagements — combining vCISO strategic oversight with managed security service provider (MSSP) operational delivery — are increasingly common. The vCISO owns strategy, governance, and board communication; the MSSP handles day-to-day monitoring, alert triage, and operational execution.
A critical structural consideration: the vCISO should report to the CEO or board, not to the IT director or CTO. This preserves the independence necessary for effective risk oversight. The vCISO owns strategy and governance; internal IT owns operational execution. Blurring these lines undermines both functions.
The Regulatory Trigger
For many European organisations, the decision to engage a vCISO is no longer purely strategic. It is a legal obligation.
NIS2 Directive (Article 20) requires that management bodies of essential and important entities must approve cybersecurity risk management measures, oversee their implementation, and can be held personally liable for infringements. This is not delegable to the IT department. The directive explicitly requires that members of management bodies follow training to gain sufficient knowledge and skills to identify risks and assess cybersecurity risk management practices.
DORA Regulation (Article 5) imposes parallel obligations on financial entities: the management body must define, approve, oversee, and be responsible for the implementation of the ICT risk management framework. Members must actively maintain their knowledge through regular training on ICT risks.
The scale of these obligations is significant:
- The European Commission estimates that 160,000+ entities now fall within NIS2 scope
- ENISA's 2024 NIS Investments study found that 89% of NIS2-scope organisations need additional staff to meet compliance requirements
- Competent authorities under NIS2 have the power to temporarily ban individuals from exercising management functions in cases of non-compliance
These are not theoretical risks. As EU member states complete NIS2 transposition and enforcement mechanisms activate, organisations without qualified security leadership face both institutional penalties and personal consequences for their directors.
The full scope of director exposure under these regulations — including the specific liability mechanisms, enforcement powers, and practical implications for board members — is examined in our analysis of personal liability under NIS2 and DORA.
The regulatory driver is unambiguous: these are legal obligations with personal consequences for the individuals who lead organisations. A vCISO provides the expertise to fulfil them.
Six Signals It Is Time
While the regulatory and economic arguments are compelling in the abstract, the decision to engage a vCISO is often triggered by concrete operational signals. If any of the following apply to your organisation, the need is immediate rather than prospective.
1. Enterprise customers are asking about your security posture. Security questionnaires are appearing in procurement processes. Prospects are requesting SOC 2 Type II reports or ISO 27001 certificates as a condition of doing business. Sales cycles are stalling because you cannot demonstrate adequate security controls. This is revenue at risk, not a compliance exercise.
2. A certification deadline is approaching. Whether driven by customer requirements, regulatory obligations, or strategic goals, preparing for ISO 27001, SOC 2, or sector-specific certifications requires experienced security leadership to scope the programme, manage the gap remediation, coordinate with auditors, and maintain the management system post-certification.
3. You have experienced an incident or near-miss. A ransomware attempt, a data exposure, a phishing compromise that was caught at the last moment — post-incident response requires rapid access to senior security leadership. Organisations without it tend to make expensive reactive decisions under pressure.
4. The board or investors are asking questions. Private equity portfolio companies, venture-backed startups approaching Series B and beyond, and organisations preparing for exit or IPO increasingly face security scrutiny from their investors. Directors need confidence that cybersecurity risk is being managed by qualified professionals, not improvised by the development team.
5. You are entering a regulated market. Financial services (DORA), critical infrastructure and essential services (NIS2), healthcare, AI systems (EU AI Act) — each brings specific cybersecurity obligations that require specialist knowledge to interpret and implement.
6. Security decisions are being made by non-security people. This is perhaps the most insidious signal. When engineering teams are making risk acceptance decisions without security expertise, when patch management is driven by convenience rather than threat intelligence, when vendor selection does not include security assessment — the organisation is accumulating technical and compliance debt that compounds over time. By the time the consequences become visible, the remediation cost has multiplied.
How to Evaluate a Provider
The vCISO market has grown rapidly, and quality varies significantly. Five criteria separate effective providers from the rest.
1. Industry experience. Look for verifiable experience in your sector. A vCISO who has guided similar organisations through similar challenges — not just generic advisory across every industry — will deliver value faster and avoid costly learning curves. Ask for sector-specific references.
2. Framework expertise. Certifications matter as a baseline signal: CISSP, CISM, CRISC, ISO 27001 Lead Auditor, and similar credentials indicate minimum knowledge thresholds. More important is demonstrated experience implementing and maintaining the specific frameworks relevant to your organisation.
3. Delivery model clarity. Before engaging, you should understand exactly what you are purchasing: hours per month, availability and response time commitments, reporting cadence, escalation procedures, and measurable milestones. Vague proposals produce vague outcomes.
4. Integration approach. The most effective vCISO engagements are not isolated advisory relationships. They integrate with your existing IT team, your legal function, your product development process, and your executive reporting cadence. Ask how the provider has worked alongside internal teams in previous engagements.
5. Outcome orientation. Evaluate providers based on what they have achieved for comparable organisations — measurable improvements in security posture, successful certifications, reduced incident response times, improved board confidence — not based on the volume of meetings or reports they produce.
Red flags to watch for:
- No structured methodology or engagement framework
- One-size-fits-all packages with no customisation to your sector or maturity level
- No discussion of when you would outgrow the vCISO model and transition to a full-time hire
- An inability to articulate specific outcomes from previous engagements
- Overemphasis on tool sales rather than strategic advisory
- No clear approach to knowledge transfer and internal capability building
The best vCISO providers build capability within the organisations they serve. They transfer knowledge, develop internal talent, and create structures that endure beyond the engagement. They build capability, not dependency.
The Path Forward
The convergence of a structural talent shortage, escalating regulatory obligations, and increasingly sophisticated threat actors has made strategic security leadership a necessity for every growing organisation. The traditional model — wait until you can afford a full-time CISO — leaves companies exposed during their most vulnerable growth phases.
A virtual CISO provides immediate access to senior security expertise, structured programme development, regulatory compliance guidance, and board-level communication. It is not a compromise solution. For the majority of mid-market organisations, it is the optimal solution — one that delivers the leadership they need at the stage they are in, while building the foundation for whatever comes next.
The organisations that thrive in the current environment are not necessarily those with the largest security budgets. They are those that secure the right expertise at the right time, structure it effectively within their governance model, and treat cybersecurity as a leadership responsibility rather than a technical afterthought.
For most growing companies, a virtual CISO is the most direct path to achieving exactly that.
Sources
-
ISC2, 2024 Cybersecurity Workforce Study, 2024. isc2.org/research/workforce-study
-
ENISA, NIS Investments 2024, European Union Agency for Cybersecurity, 2024. enisa.europa.eu/publications/nis-investments-2024
-
Heidrick & Struggles, 2024 Global Chief Information Security Officer Survey, 2024. heidrick.com/en/insights/cybersecurity/2024-global-ciso-survey
-
IANS Research & Artico Search, 2024 CISO Compensation and Budget Benchmark Study, 2024. iansresearch.com
-
Directive (EU) 2022/2555 (NIS2), Article 20 — Governance. Official Journal of the European Union, L 333, 27 December 2022.
-
Regulation (EU) 2022/2554 (DORA), Article 5 — Governance and Organisation. Official Journal of the European Union, L 333, 27 December 2022.
-
European Commission, Impact Assessment for the NIS2 Directive, SWD(2020) 345 final, 2020.
-
Glassdoor & SalaryExpert, CISO salary data for Germany, Netherlands, and France, accessed February 2026.
-
Cynomi, The Rise of the Virtual CISO: Market Trends and Adoption, 2024. cynomi.com
-
NIST, Cybersecurity Framework 2.0, National Institute of Standards and Technology, February 2024. nist.gov/cyberframework
-
ENISA, Cybersecurity Skills Development in the EU, European Union Agency for Cybersecurity, 2024. enisa.europa.eu