Posted on
in Presentations
Every organization must answer the question of which functions in their information security program to outsource. When faced with that question, how do you decide what stays and what goes? What criteria would you evaluate your program against to mark certain functions off-limits? This session will focus on the scars and successes of others to flesh out best practices in security outsourcing.
Security Strategy & Architecture
professional development & workforce risk management security architecture security services managed security services
Topic
Security Strategy & Architecture
Subtopic
professional development & workforce
risk management
security architecture
security services
managed security services
Share With Your Community