Positioning the roles, interfaces & processes in the InfoSec scene