Learn EDR Internals: Research & Development From The Masters
Master AI and Machine Learning: From Neural Networks to Applications
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how and why to outsource your cybersecurity program. Find out how to select manage vendors for maximum value.
Syllabus
Introduction
- Outsourcing cybersecurity
- 2024 update
- What you should know
- What is outsourcing?
- Why outsource?
- Why outsource cybersecurity?
- What are the benefits of outsourcing?
- How is managing outsourced work different from managing staff?
- What are the risks of outsourcing cybersecurity?
- The seven steps to successfully outsourcing cybersecurity work
- What should you outsource?
- Examples of work to outsource
- Case study 1: Identify candidate work to outsource
- Outcomes
- How the work gets done
- Service Level Agreements (SLA)
- Case study 2: Document requirements
- What is an MSSP?
- Recognize and manage conflicting goals—profit vs. outcomes
- How do I evaluate an MSSP?
- Case study 3: Select a vendor
- How do I contract with a vendor?
- Tips for contracting with a vendor
- Case study 4: Contract with the vendor
- Plan and perform transition to the vendor
- Tips for transitioning to the vendor
- Case study 5: Implement the agreement
- Manage by Service Level Agreements (SLA)
- Manage by contractual terms
- Case study 6: Manage the vendor
- How to renew the agreement
- When to not renew the agreement
- Case study 7: Renew the agreement
- Next steps
Taught by
Kip Boyle