Security Outsourcing: Vendor Selection and Management
Offered By: LinkedIn Learning
Course Description
Overview
Learn how and why to outsource your cybersecurity program. Find out how to select manage vendors for maximum value.
Syllabus
Introduction
- Outsourcing cybersecurity
- 2024 update
- What you should know
- What is outsourcing?
- Why outsource?
- Why outsource cybersecurity?
- What are the benefits of outsourcing?
- How is managing outsourced work different from managing staff?
- What are the risks of outsourcing cybersecurity?
- The seven steps to successfully outsourcing cybersecurity work
- What should you outsource?
- Examples of work to outsource
- Case study 1: Identify candidate work to outsource
- Outcomes
- How the work gets done
- Service Level Agreements (SLA)
- Case study 2: Document requirements
- What is an MSSP?
- Recognize and manage conflicting goals—profit vs. outcomes
- How do I evaluate an MSSP?
- Case study 3: Select a vendor
- How do I contract with a vendor?
- Tips for contracting with a vendor
- Case study 4: Contract with the vendor
- Plan and perform transition to the vendor
- Tips for transitioning to the vendor
- Case study 5: Implement the agreement
- Manage by Service Level Agreements (SLA)
- Manage by contractual terms
- Case study 6: Manage the vendor
- How to renew the agreement
- When to not renew the agreement
- Case study 7: Renew the agreement
- Next steps
Taught by
Kip Boyle
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network