From the course: Cybersecurity Outsourcing: Vendor Selection and Management

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Case study 1: Identify candidate work to outsource

Case study 1: Identify candidate work to outsource

From the course: Cybersecurity Outsourcing: Vendor Selection and Management

Start my 1-month free trial

Case study 1: Identify candidate work to outsource

- [Instructor] Let's look at how one organization went through the outsourcing process. As their company grew, the information security team realized there was too much work to do. They needed more people. Senior decision makers would not allow new staff positions, however. But they were able to get approval to outsource some of their work, and they were asked to submit a business case to get the ball rolling. Their first step was to perform an analysis to see which of their tasks were core and which ones were not. Working over a couple of days, they inventoried all their tasks. For each task, they documented the frequency of occurrence. They assigned a low, medium or high risk rating. Then they determined whether the task was a core competency for them or not. For each task, they ask themselves, could a less experienced and less expensive team accurately perform the tasks with predetermined rules and guidelines, and what kind of loss would they suffer if the task was not done…

Contents