This page is the canonical mapping between named roles and the responsibilities, decisions, and approvals that are scattered across the policy library. It is the operational truth-of-record — distinct from the Information Security Roles & Responsibilities Policy, which states the principle of role assignment.
Update this page in the same PR as any policy change that adds, removes, or shifts a responsibility — otherwise the policies and the personnel matrix drift out of sync.

Role taxonomy

Neuroscale uses a deliberately small role set. Three tiers, plus regulatory aliases.
TierRolesPurpose
Tier 1 — Executive (6)CEO · CTO · CISO · CFO · General Counsel · CHROFinal accountability for their function. The buck stops here.
Tier 2 — Operational (6)Engineering Lead · Engineering On-call · Security On-call · Incident Manager · System Owner · Data OwnerDay-to-day ownership where segregation-of-duties matters. Today most are filled by an executive (noted below); they split out as the company grows.
Tier 3 — Label descriptors (4)Manager · Hiring Manager · Risk Owner · Vendor OwnerRelational labels used in policy text. Not roles you’d staff — just descriptions of who’s accountable for a specific item.
Governance bodies (2)Board of Directors · Executive TeamCollective decision-making bodies.
Regulatory aliases map to the above roles. They are kept for legal/audit clarity but they are not separate roles: DPO = General Counsel · Privacy Officer = General Counsel · IT Manager = CISO · Compliance Manager = CISO.

Personnel directory

Who currently fills each role. **(todo: name)** and **(todo: email)** mark slots to fill in once the position is staffed. The Email column is the named individual’s direct address — group aliases (security@, legal@, etc.) live in Email & shared contact aliases below.

Tier 1 — Executive

RoleHolderBackupReports toEmail
CEOIshan JadhwaniBoardBoard of Directorsishan.jadhwani@neuroscale.ai
CTOCameron WolfeCEOCEOcameron.wolfe@neuroscale.ai
CISOCameron WolfeCEOCEOcameron.wolfe@neuroscale.ai
CFOSayantani NandyCEOCEOsayantani.nandy@neuroscale.ai
General CounselVGC LLP (outside counsel of record; primary contact Brandt Mori; other engagement principals Avery B. Kotler, James L. Greeley)Brandt Mori — bmori@vgcllp.comCEOlegal@neuroscale.ai (routes to firm); firm general intake info@vgcllp.com
CHROSayantani NandyCEOCEOsayantani.nandy@neuroscale.ai
Role concentration. Cameron Wolfe holds CTO + CISO; Sayantani Nandy holds CFO + CHRO. SoD analysis and compensating controls: Role concentration & compensating controls. Executive-escalation backup is the CEO; operational backup is the relevant Tier-2 lead.

Tier 2 — Operational

Today most operational roles are filled by an executive. As Neuroscale grows these split out, and this table is updated.
RoleCurrently held bySplits out whenBackup
Engineering LeadCTOA VP Engineering or Director of Engineering is hiredEngineering On-call; CEO if executive escalation needed (CTO + CISO are one person today)
Engineering On-callBetter Stack rotation among senior engineers— (already a rotation)Secondary on-call
Security On-callCISOA security engineer is hiredEngineering On-call; CEO if executive escalation needed (CTO + CISO are one person today)
Incident ManagerDefault = CISO; on-call IRT lead acts when CISO unavailableAlways a per-incident assignment; no permanent splitEngineering On-call lead
System OwnerPer system — the named accountable engineer in the Vanta asset inventory— (always per-system)Engineering Lead
Data OwnerPer data domain — see table below— (always per-domain)CISO (security data)

Data-owner assignments (by domain)

Data domainOwner
Customer / product dataCTO
Source code, secrets, infraCTO
Financial / banking / billing dataCFO
HR / employee dataCHRO
Legal / contracts / litigation dataGeneral Counsel
Security event / incident / risk dataCISO
Marketing / public-website dataMarketing lead (Hanna Gillas); CEO as exec sponsor

Functional leads (non-InfoSec)

Named functional leads outside the Tier-1 InfoSec taxonomy who own audit-relevant data or processes (e.g., marketing-consent records under GDPR Art. 7(1) and CAN-SPAM).
FunctionHolderReports toEmail
MarketingHanna GillasCEOhanna.gillas@neuroscale.ai

Tier 3 — Label descriptors

These appear in policy text but aren’t roles you’d staff. Each resolves to a specific person depending on context.
LabelMeaningResolves to
ManagerAn employee’s direct supervisorPer-employee (HR system of record)
Hiring ManagerThe person who opened the requisition for a rolePer-req
Risk OwnerThe exec accountable for a specific entry in the risk registerPer-risk (an executive — usually the function lead)
Vendor OwnerThe employee who sponsors a vendor relationshipPer-vendor (the requestor on the vendor-risk-assessment intake)

Governance bodies

BodyMembersPurpose
Board of DirectorsIshan JadhwaniCyber-risk oversight; reviews InfoSec, privacy, compliance posture annually
Executive TeamCEO (Ishan Jadhwani), CTO/CISO (Cameron Wolfe), CFO/CHRO (Sayantani Nandy), General Counsel (outside counsel)Risk acceptance, breach determination, BC/DR activation, capital approval. Three named individuals plus outside GC, reflecting the role concentrations in Role concentration & compensating controls.

Email & shared contact aliases

AliasRoutes toUse for
security@neuroscale.aiCISO + Security On-callSecurity incidents, suspected compromise, vulnerability reports
legal@neuroscale.aiGeneral CounselLegal matters, contract questions, breach-notification questions
privacy@neuroscale.aiGeneral Counsel (acting as DPO / Privacy Officer)Data-subject requests, privacy questions, DPIAs
ethics@neuroscale.aiGeneral Counsel + CHROEthics complaints, Code-of-Conduct concerns, whistleblower reports
helpdesk@neuroscale.aiCISO (acting as IT Manager)IT support, account/access requests, lost devices
trust@neuroscale.aiCISO + CEOCustomer trust / SOC 2 / ISO 27001 inquiries from prospects and customers
people@neuroscale.aiCHRO + (Hiring Manager for candidate matters)All HR / People-Operations matters: workplace-violence non-emergency reports, HR complaints, applicant and candidate correspondence, background-check / FCRA / adverse-action responses, personnel-data contact for the CA Applicant Privacy Notice
press@neuroscale.aiCEO (or designated spokesperson)Inbound press / media inquiries — employees forward without comment per Customer Communications

Responsibility matrix

Every distinct responsibility found in the policy and procedure library, mapped to the role(s) that own it. Primary is accountable; Secondary is consulted or steps in when primary is unavailable.

Governance & oversight

ResponsibilityPrimarySecondarySource
Cyber-risk and internal-control oversightBoard of DirectorsExecutive TeamRoles & Responsibilities
Approve capital expenditure for security & privacy programsExecutive TeamCEORoles & Responsibilities
Align security/privacy posture with mission & risk appetiteExecutive TeamCEORoles & Responsibilities
Communication path from InfoSec program to BoardCISOCEORoles & Responsibilities
Acceptance & treatment of any organizational riskCEOCISORisk Management
Approve avoidance / remediation / transference / acceptance of items in the Risk RegisterCISOCEORisk Management
Annual risk assessment + report to leadershipCISOCTORisk Management
Maintain the risk registerCISORisk Owners (per entry)Risk Management
Management commitment for the IR planExecutive TeamCEOIncident Response

Information security

ResponsibilityPrimarySecondarySource
Oversight of security-controls implementationCISOCTORoles & Responsibilities
Design / develop / operate / maintain / monitor security controlsCISOEngineering LeadRoles & Responsibilities
Coordinate development & maintenance of security policies & standardsCISOGeneral CounselRoles & Responsibilities
Liaison to Board, law enforcement, internal audit, General CounselCISOCEORoles & Responsibilities
Identity management & access-control oversightCISOEngineering LeadAccess Control
Approve technical access & change requests for non-standard accessSystem OwnerCISOAccess Control
Maintain confidentiality / integrity / availability of owned systemsSystem OwnerCISORoles & Responsibilities
Quarterly access review (user / privileged / service)CISOSystem OwnersAccess Reviews
Provisioning / deprovisioning executionCISOEngineering On-callAccess Management
Approve privileged-access elevationCISOSystem OwnerAccess Management
Approve material changes to standard access bundlesCISOEngineering LeadAccess Management
Asset-inventory ownershipSystem OwnersCISOAsset Management
Endpoint protection / MDM / anti-malware operationCISOEngineering On-callOperations Security
Backup operations & annual restore testEngineering LeadCISOOperations Security
Logging / monitoring / alertingEngineering LeadCISOOperations Security
Vulnerability scanning & pen-testing programCISOEngineering LeadOperations Security
Key management (AWS KMS)CISOEngineering LeadCryptography
Full-disk encryption on endpointsCISOCryptography
Maintain TLS / SSL Labs A grade on public endpointsEngineering LeadCISOCryptography
Office physical security (badging, visitor management)CHROCISOPhysical Security
Anonymous-report intake (security weakness, policy violation)CISOGeneral CounselInformation Security

Engineering & change management

ResponsibilityPrimarySecondarySource
Oversight of InfoSec in the SDLCEngineering LeadCISORoles & Responsibilities
Significant code-change review/approval (PR review)Engineer (other than author)Engineering LeadSecure Development
Production change-management approvalEngineering LeadCISOOperations Security
Approve use of customer data in non-production environmentsCTOCISOSecure Development
Release-checklist sign-off prior to deployEngineering LeadEngineering On-callRelease Checklist
Vulnerability remediation within SLAEngineering LeadCISOVulnerability Management
Secrets management (HashiCorp Vault — cross-cloud secrets-of-record)Engineering LeadCISOSecrets Management
Annual secure-development trainingCTOCHROSecure Development
Outsourced-development supervisionEngineering LeadCISOSecure Development

Customer & service delivery

ResponsibilityPrimarySecondarySource
Operation of security tools/processes in customer prod environmentsCTOEngineering LeadRoles & Responsibilities
Customer data retention & deletion executionCTOEngineering LeadData Retention Matrix
External / customer communications during a disasterCEO (with CFO)CTOBusiness Continuity
Maintain continuity of services during a disasterCTOCISOBusiness Continuity
Customer asset return after service terminationCTOCFOAsset Management

People / HR

ResponsibilityPrimarySecondarySource
Ensure employees & contractors are qualified and competentCHROHiring ManagerHR Security
Background checks (Checkr)CHROCISOBackground Checks
Present policies & Code of Conduct to staffCHROGeneral CounselRoles & Responsibilities
Annual performance + Code-of-Conduct reviewManagerCHROHR Security
Annual security-awareness training (Vanta)CHROCISOHR Security
Code-of-Conduct enforcementCHROCEOCode of Conduct
Disciplinary process for policy violationsCHROManager + CISOHR Security
Onboarding workflow trigger and trackingCHROCISOOnboarding
Offboarding workflow triggerCHROCISOOffboarding
Internal communications during a disaster; physical health/safetyCHROCEOBusiness Continuity
Function-lead communications during a disasterFunction lead (CTO/CFO/CHRO/etc.)CHROBusiness Continuity
ResponsibilityPrimarySecondarySource
Determine if an incident has legal/regulatory exposure or is a reportable breachGeneral Counsel (with CEO + Executive Team)CEOIncident Response
Review & approve external breach notices in writingGeneral CounselCEOIncident Response
Final breach determination if consensus cannot be reachedCEOGeneral CounselIncident Response
Legal-hold determination & trackingGeneral CounselCISOData Management
Data-retention period setting (in consultation with Legal)Data OwnerGeneral CounselData Management
Compliance with contractual + regulatory commitments (SOC 2, ISO 27001, GDPR, CCPA)CISOGeneral CounselRoles & Responsibilities
Privacy-impact assessment (DPIA) sign-offGeneral Counsel (acting as DPO)CISODPIA
Data-subject request handlingGeneral Counsel (acting as Privacy Officer)CISOData Subject Rights
Whistleblower / ethics intakeGeneral Counsel + CHROCEOWhistleblower
Records retention for whistleblower reportsGeneral CounselCHROWhistleblower
Cooperate with customers, controllers, regulators during incidentsGeneral Counsel + Executive TeamCEOIncident Response

Finance & vendor management

ResponsibilityPrimarySecondarySource
Oversight of third-party risk-management processCFOCISORoles & Responsibilities
Review vendor service contractsCFOGeneral CounselRoles & Responsibilities
Approve vendor before contract signature (after diligence)CISO + CFOGeneral CounselVendor Risk Assessment
Vendor tiering & diligenceCISOVendor OwnerVendor Risk Assessment
Annual re-review of high-tier vendorsCISOVendor OwnerVendor Risk Assessment

Incident response

ResponsibilityPrimarySecondarySource
Primary decision-maker during the response periodIncident ManagerCISOIncident Response
Severity assignment (P0/P1/P2/P3)Security On-callIncident ManagerIncident Response
P0 escalation to executive teamSecurity On-callCISO + CTOIncident Response
Communication during the response periodIncident ManagerCISOIncident Response
IRT membership (engineers actively responding)Engineering On-callEngineering LeadIncident Response
Root-cause analysis on verified P0Incident ManagerCISOIncident Response
Decide whether to call a post-mortem meetingCISOCTOIncident Response
Internal-actor incident — direct line to CEOIncident ManagerCISOIncident Response
Annual IR-plan testCISOEngineering LeadIncident Response
Customer / regulator notification (post-determination)General Counsel + CEOExecutive TeamIncident Response
Mitigation & remediation directionExecutive Team + General CounselCISOIncident Response

Approval-authority matrix

What kinds of decisions require which role’s approval. If a decision isn’t listed, default to the policy owner of the relevant policy plus the CISO for any security-relevant change.
DecisionApprover(s)Source
Policy exception (any policy)CISOEvery policy’s Exceptions section
Risk acceptance — anyCEORisk Management
Risk acceptance — High (15–25 on the 5×5)CISO + CEORisk Management
Production access (privileged)System Owner + CISOAccess Control
Customer data in non-production environmentsCTO + CISOSecure Development
Material change to a policyPolicy owner + CISOInformation Security
Material change to standard access bundlesCISOAccess Management
Vendor with Confidential data accessCISO + CFOVendor Risk Assessment
Transfer of confidential data outside the companyData Owner (in writing)Data Management
Distribution of Restricted data outside the companyData Owner + executed contractData Management
Breach-reporting determinationCEO + General CounselIncident Response
External breach notice (final written approval)General CounselIncident Response
DPIA sign-offGeneral Counsel (acting as DPO)DPIA
Termination access-revocation override (extend retention beyond 24 business hours)CISOOffboarding
Hosting-provider outage responseCTO (with CISO and Executive Team)Business Continuity
Disclosure of incident details to a third partyGeneral Counsel or Executive TeamIncident Response
Capital expenditure for security/privacy programExecutive TeamRoles & Responsibilities
Acquisition of new vendor / cloud serviceCISO + CFOThird-Party Management

Cross-policy alias map

The policy library uses several legacy / regulatory labels that are not separate roles. Use this table to interpret them.
Label in policy textResolves toNotes
IT ManagerCISOUsed in Business Continuity and Incident Response. Splits when a dedicated IT lead is hired.
Compliance ManagerCISOWill become a dedicated role at scale.
Privacy OfficerGeneral CounselRequired by GDPR and several US privacy laws. Will become a dedicated role at scale.
DPO / Data Protection OfficerGeneral CounselRequired for some GDPR processing. Independence requirement may force a split for large-scale processing.
Incident ManagerDefault = CISO; on-call IRT lead acts when CISO unavailablePer-incident assignment, not a permanent role
System OwnerThe accountable engineering owner per the Vanta asset inventory
Data OwnerSee Data-owner assignments
Function leadCEO / CTO / CISO / CFO / General Counsel / CHROUsed in Business Continuity; generic for “the executive who runs the function”.
Executive TeamCEO + CTO + CISO + CFO + General Counsel + CHROReplaces “Executive Management / Staff / Leadership” wherever it appears.
Legal counselGeneral Counsel (and outside counsel where engaged)
Customer Success / CSMCTO (until a Customer Success function is hired)Used in Customer Communications, Open-Source & SBOM, AI Acceptable Use, Data Subject Rights. Splits when CS is staffed.
Sales / RevenueCEO (until a commercial lead is hired)Used in AI Acceptable Use, Records Retention Schedule. Splits when commercial lead is hired.
MarketingHanna Gillas (Marketing lead); CEO as exec sponsorUsed in Records Retention Schedule.
People Operations / People OpsCHROLetter signature blocks and procedural references in Adverse Action Letter, Background Checks.
ManagerAn employee’s direct supervisorPer HRIS
Hiring ManagerThe person who opened the requisitionPer req
Risk OwnerThe exec accountable for a specific entry in the risk registerPer risk
Vendor OwnerThe employee who sponsors a vendor relationshipPer vendor

How this page is maintained

  • Same-PR rule. Any PR that adds, removes, or shifts a role-level responsibility must update the corresponding row in the Responsibility matrix or Approval-authority matrix. PR review verifies this.
  • Personnel changes. When a named individual changes role (hire, promotion, departure), the Personnel directory is updated within 5 business days.
  • Annual review. This page is reviewed end-to-end at least annually as part of the policy review cycle, and after any material organizational change.
  • Owner. This page is owned by the CISO; the CHRO co-owns the personnel directory.
  • Distinct from the policy. This page does not replace the Information Security Roles & Responsibilities Policy — that policy describes the principle and the high-level role definitions; this page is the operational truth-of-record.
For live on-call contacts (incident escalation), see Key Contacts & On-Call.

Version history

VersionDateDescriptionAuthorApproved by
1.0May 8, 2026Initial versionCameron WolfeIshan Jadhwani