From the course: Cybersecurity Outsourcing: Vendor Selection and Management

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

How the work gets done

How the work gets done

From the course: Cybersecurity Outsourcing: Vendor Selection and Management

Start my 1-month free trial

How the work gets done

- [Instructor] We've talked about the importance of outcomes. But because we're dealing with cyber security, it does matter how the vendor does the work. In this video, I'll explain why that's important, and how to get the insight you need. But first, let me give you a couple of examples of why how the work gets done matters. Here's the first example. Some outsourcers in the name of high productivity and low costs give their people more computer permissions than they need. But this violates the Principle of Least Privilege, which is a common cause of expensive data breaches. Here's the second example. I've seen well intentioned people put the user ID and password of new accounts into their help desk ticketing system. Why did they do that? Because they were so focused on closing the ticket that they didn't stop to consider that everyone with access to the system can read the persons password. This improper handling of sensitive data could cause an expensive incident that will make…

Contents