Learn how and why to outsource your cybersecurity program. Find out how to select manage vendors for maximum value.
Overview
Syllabus
Introduction
- Outsourcing cybersecurity
- 2024 update
- What you should know
- What is outsourcing?
- Why outsource?
- Why outsource cybersecurity?
- What are the benefits of outsourcing?
- How is managing outsourced work different from managing staff?
- What are the risks of outsourcing cybersecurity?
- The seven steps to successfully outsourcing cybersecurity work
- What should you outsource?
- Examples of work to outsource
- Case study 1: Identify candidate work to outsource
- Outcomes
- How the work gets done
- Service Level Agreements (SLA)
- Case study 2: Document requirements
- What is an MSSP?
- Recognize and manage conflicting goals—profit vs. outcomes
- How do I evaluate an MSSP?
- Case study 3: Select a vendor
- How do I contract with a vendor?
- Tips for contracting with a vendor
- Case study 4: Contract with the vendor
- Plan and perform transition to the vendor
- Tips for transitioning to the vendor
- Case study 5: Implement the agreement
- Manage by Service Level Agreements (SLA)
- Manage by contractual terms
- Case study 6: Manage the vendor
- How to renew the agreement
- When to not renew the agreement
- Case study 7: Renew the agreement
- Next steps
Taught by
Kip Boyle