http://www.cisoplatform.com/page/build-vs-buy-forrester-s-security-risk-practice-playbook

Why Read This Report
This report outlines a sourcing strategy and Forrester’s decision support solution for security and risk (S&R) executives working to build a high-performance security program and organization. We designed this report to help you make the decision to build or buy your security services. Interest in outsourcing security services is on the rise. In fact, according to our Forrsights Security Survey, from 2010 to 2011, there was a 14% increase in the level of interest in implementing security using third parties. At the same time, managed security service providers (MSSPs) report revenue growth in excess of 30%. To make an informed business decision, CISOs must assess and compare services that MSSPs could deliver with the services that the CISO could deliver with internal staff. Outsourcing appropriate security services to MSSPs can sometimes provide better security while also freeing up scarce resources to focus on what really matters.

( Read more:  CISO Guide for Denial-of-Service (DoS) Security)

 

Table Of Contents

  • CISO s Turn To Managed Services To Address Continuing Challenges
  • Build A Security Services Catalog Before You Outsource
  • Identify Possible Managed Services With The Security Sourcing Model
  • CISOs Must Still Proceed With Caution When Sourcing Security Services
  • Don’t Go It Alone: Partner With Sourcing And Vendor Management
  • WHAT IT MEANS
  • The Monkey Test
  • Supplemental Material

More:  Want to be an author? Nominations open for co-authors of CISO Handbook    

 

>> Download the Complimentary Forrester Report

 

 

 

IBM COMPLIMENTARY SECURITY HEALTH SCAN!

2hcdzc5.gif

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)