Companies Home Search Profile

Cybersecurity Outsourcing: Vendor Selection and Management

Focused View

Kip Boyle

1:05:56

85 View
  • 01 - Outsourcing cybersecurity.mp4
    01:05
  • 02 - What you should know.mp4
    00:58
  • 01 - What is outsourcing.mp4
    02:05
  • 02 - Why outsource.mp4
    02:26
  • 03 - Why outsource cybersecurity.mp4
    02:15
  • 04 - What are the benefits of outsourcing.mp4
    02:23
  • 05 - How is managing outsourced work different from managing staff.mp4
    02:13
  • 06 - What are the risks of outsourcing cybersecurity.mp4
    02:00
  • 07 - The seven steps to successfully outsourcing cybersecurity work.mp4
    02:01
  • 01 - What should you outsource.mp4
    02:23
  • 02 - Examples of work to outsource.mp4
    02:15
  • 03 - Case study 1 Identify candidate work to outsource.mp4
    02:16
  • 01 - Outcomes.mp4
    02:32
  • 02 - How the work gets done.mp4
    01:47
  • 03 - Service Level Agreements (SLA).mp4
    02:17
  • 04 - Case study 2 Document requirements.mp4
    01:27
  • 01 - What is an MSSP.mp4
    01:22
  • 02 - Recognize and manage conflicting goalsprofit vs. outcomes.mp4
    02:02
  • 03 - How do I evaluate an MSSP.mp4
    02:19
  • 04 - Case study 3 Select a vendor.mp4
    01:57
  • 01 - How do I contract with a vendor.mp4
    02:17
  • 02 - Tips for contracting with a vendor.mp4
    02:33
  • 03 - Case study 4 Contract with the vendor.mp4
    01:35
  • 01 - Plan and perform transition to the vendor.mp4
    02:39
  • 02 - Tips for transitioning to the vendor.mp4
    02:37
  • 03 - Case study 5 Implement the agreement.mp4
    02:19
  • 01 - Manage by Service Level Agreements (SLA).mp4
    01:52
  • 02 - Manage by contractual terms.mp4
    02:06
  • 03 - Case study 6 Manage the vendor.mp4
    02:04
  • 01 - How to renew the agreement.mp4
    02:10
  • 02 - When to not renew the agreement.mp4
    01:24
  • 03 - Case study 7 Renew the agreement.mp4
    01:24
  • 01 - Next steps.mp4
    00:53
  • Description


    Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 33
    • duration 1:05:56
    • English subtitles has
    • Release Date 2023/10/15

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness