To Source or Not to Source? Is That Really the Question?


Posted on in Presentations

Every organization must answer the question of which functions in their information security program to outsource. When faced with that question, how do you decide what stays and what goes? What criteria would you evaluate your program against to mark certain functions off-limits? This session will focus on the scars and successes of others to flesh out best practices in security outsourcing.

Participants
Kevin Fuller

Executive Director, Office of the CISO, Optiv

Security Strategy & Architecture

professional development & workforce risk management security architecture security services managed security services


Topic

Subtopic


Share With Your Community