Security Outsourcing: Vendor Selection and Management
English | 1h 6m | Video 720p
Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience. Topics include: Benefits of outsourcing Examples of work to outsource Reasons to outsource cybersecurity Preparing to outsource cybersecurity Managing outsourced work vs. managing staff Risks of outsourcing cybersecurity Document requirements Selecting a vendor Managing a vendor HOMEPAGE https://www.lynda.com/IT-tutorials/Security-Outsourcing-Vendor-Selection-Management/2807863-2.html
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.