Security Outsourcing: Vendor Selection and Management
Posted by Superadmin on October 20 2020 09:44:26

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


001-Outsourcing cybersecurity



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


002-What you should know



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


003-What is outsourcing



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


004-Why outsource



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


005-Why outsource cybersecurity



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


006-What are the benefits of outsourcing



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


007-How is managing outsourced work different from managing staff



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


008-What are the risks of outsourcing cybersecurity



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


009-The seven steps to successfully outsourcing cybersecurity work



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


010-What should you outsource



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


011-Examples of work to outsource



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


012-Case study 1 Identify candidate work to outsource



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


013-Outcomes



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


014-How the work gets



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


015-Service Level Agreements SLA



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


016-Case study 2 Document requirements



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


017-What is an MSSP



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


018-Recognize and manage conflicting goals profit vs outcomes



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


019-How do I evaluate an MSSP



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


020-Case study 3 Select a vendor



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


021-How do I contract with a vendor



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


022-Tips for contracting with a vendor



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


023-Case study 4 Contract with the vendor



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


024-Plan and perform transition to the vendor



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


025-Tips for transitioning to the vendor



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


026-Case study 5 Implement the agreement



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


027-Manage by Service Level Agreements SLA



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


028-Manage by contractual terms



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


029-Case study 6 Manage the vendor



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


030-How to renew the agreement



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


031-When to not renew the agreement



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


032-Case study 7 Renew the agreement



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion

Security Outsourcing: Vendor Selection and Management

Created by Kip Boyle


033-Next steps



Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Topics include:

Benefits of outsourcing
Examples of work to outsource
Reasons to outsource cybersecurity
Preparing to outsource cybersecurity
Managing outsourced work vs. managing staff
Risks of outsourcing cybersecurity
Document requirements
Selecting a vendor
Managing a vendor

      
Course Contents
01 Introduction 02 Prepare to OutSource Cybersecurity Work 03 Identify Candidate Work to Outsource 04 Document Requirements 05 Select Vendor 06 Contract with Vendor 07 Implement the Agreement 08 Managing the Vendor 09 Renewing the Vendor 10 Conclusion