From the course: Cybersecurity Outsourcing: Vendor Selection and Management

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Next steps

Next steps

- [Instructor] Congratulations, you finished the course. Thanks for powering all the way through. Now you know the seven steps to successfully outsource cyber security work. I encourage you to share this course with other members of your team, so everyone will have a common approach for outsourcing cyber security tasks. If you want to know more about putting together an outsourcing business case watch Writing a Business Case with Mike Figliuolo right here in the video library. If you want to know more about guiding people through big changes at work, pick up a copy of Managing Transitions by William Bridges. Finally, subscribe to the Cyber Risk Management Podcast where I help you stay up to date on the latest cyber security ideas and strategies. Thanks again, and be sure to reach out to me on LinkedIn if you need any help.

Contents