Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Learn how and why to outsource your cybersecurity program. Find out how to select manage vendors for maximum value.
Tags
Syllabus
Introduction
- Outsourcing cybersecurity
- What you should know
- What is outsourcing?
- Why outsource?
- Why outsource cybersecurity?
- What are the benefits of outsourcing?
- How is managing outsourced work different from managing staff?
- What are the risks of outsourcing cybersecurity?
- The seven steps to successfully outsourcing cybersecurity work
- What should you outsource?
- Examples of work to outsource
- Case study 1: Identify candidate work to outsource
- Outcomes
- How the work gets done
- Service Level Agreements (SLA)
- Case study 2: Document requirements
- What is an MSSP?
- Recognize and manage conflicting goals—profit vs. outcomes
- How do I evaluate an MSSP?
- Case study 3: Select a vendor
- How do I contract with a vendor?
- Tips for contracting with a vendor
- Case study 4: Contract with the vendor
- Plan and perform transition to the vendor
- Tips for transitioning to the vendor
- Case study 5: Implement the agreement
- Manage by Service Level Agreements (SLA)
- Manage by contractual terms
- Case study 6: Manage the vendor
- How to renew the agreement
- When to not renew the agreement
- Case study 7: Renew the agreement
- Next steps
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/84dad9bd89f5.jpeg)
Security Outsourcing: Vendor Selection and Management
Affiliate notice
-
TypeOnline Course
-
Provider
Learn how and why to outsource your cybersecurity program. Find out how to select manage vendors for maximum value.
Introduction
- Outsourcing cybersecurity
- What you should know
- What is outsourcing?
- Why outsource?
- Why outsource cybersecurity?
- What are the benefits of outsourcing?
- How is managing outsourced work different from managing staff?
- What are the risks of outsourcing cybersecurity?
- The seven steps to successfully outsourcing cybersecurity work
- What should you outsource?
- Examples of work to outsource
- Case study 1: Identify candidate work to outsource
- Outcomes
- How the work gets done
- Service Level Agreements (SLA)
- Case study 2: Document requirements
- What is an MSSP?
- Recognize and manage conflicting goals—profit vs. outcomes
- How do I evaluate an MSSP?
- Case study 3: Select a vendor
- How do I contract with a vendor?
- Tips for contracting with a vendor
- Case study 4: Contract with the vendor
- Plan and perform transition to the vendor
- Tips for transitioning to the vendor
- Case study 5: Implement the agreement
- Manage by Service Level Agreements (SLA)
- Manage by contractual terms
- Case study 6: Manage the vendor
- How to renew the agreement
- When to not renew the agreement
- Case study 7: Renew the agreement
- Next steps
Loading...
Saving...
Loading...