The Truth About Outsourcing Security
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the complexities and realities of outsourcing security in this 57-minute conference talk from TROOPERS10. Delve into two approaches to outsourcing, examining instant gratification versus organizational leadership. Understand the stages of partnering, from pursuit and honeymoon phases to maturity and transformation. Learn about the importance of subject matter experts, shared versus bespoke solutions, and the challenges of aligning players. Gain insights on becoming business-relevant, acting as an impact player, and navigating contracts and ADs. Discover strategies for constant improvement and transformation in security outsourcing.
Syllabus
Intro
Two approaches to outsourcing
Instant gratification
Organizational leadership
Subject matter experts
Stages of partnering
The pursuit
Honeymoon phase
Shared vs bespoke
Lovefest
Lessons learned
Players are not aligned
Maturity
GRC
Be Business Relevant
Becoming an Impact Player
The Contract
The ADs
Transformation
Constant improvement
Summary
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube