Information Security Practices: InfoSec Vendor Management

InfoSec 2023    |    Beginner
  • 13 videos | 1h 24m 34s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Everything comes with pros and cons, and outsourced information security is no exception. Leaders contemplating outsourcing information security products and services will need to trade potential time and money savings for other potential gaps. In this course, explore information security outsourcing, security vendor relationships, and major considerations and challenges associated with outsourcing information security. Next, discover common downsides to outsourcing security services, key steps to consider when choosing a security vendor, and explore vendor risk management. Finally, learn about vendor contracts and the importance of having sound contract language when dealing with security vendors. Upon completion, you'll be able to identify common InfoSec vendors and providers and best practices for outsourcing InfoSec products or services.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline outsourcing information security services, products, and solutions
    Identify some of the major considerations and challenges when considering outsourcing information security
    Recognize what security vendors are and list the common related services they offer
    Name the key steps to consider when choosing a security vendor
    Identify the risks potentially posed by third-party vendors
    Outline vendor risk management and how it can be used to deal with the monitoring and management of risks resulting from third-party vendor products and services
  • Recognize the typical lifecycle of a vendor relationship
    Outline critical parts to include when creating a vendor risk management checklist
    List best practices to follow for vendor risk management
    Identify the importance of having sound contract language when dealing with security vendors
    List common information security vendors to consider
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 17s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 53s
    Upon completion of this video, you will be able to outline outsourcing information security services, products, and solutions. FREE ACCESS
  • Locked
    3.  Considerations and Challenges of Outsourcing
    6m 5s
    After completing this video, you will be able to identify some of the major considerations and challenges when considering outsourcing information security. FREE ACCESS
  • Locked
    4.  Security Vendors
    9m 11s
    In this video, recognize what security vendors are and list the common related services they offer. FREE ACCESS
  • Locked
    5.  The Security Vendor Selection Process
    8m 56s
    In this video, we will name the key steps to consider when choosing a security vendor. FREE ACCESS
  • Locked
    6.  Risks Associated with Third-Party Vendors
    11m 14s
    Upon completion of this video, you will be able to identify the risks potentially posed by third-party vendors. FREE ACCESS
  • Locked
    7.  Vendor Risk Management
    7m 10s
    After completing this video, you will be able to outline vendor risk management and how it can be used to deal with the monitoring and management of risks resulting from third-party vendor products and services. FREE ACCESS
  • Locked
    8.  The Vendor Management Lifecycle
    6m 6s
    In this video, recognize the typical lifecycle of a vendor relationship. FREE ACCESS
  • Locked
    9.  Parts of the Vendor Risk Management Checklist
    7m 9s
    In this video, we will outline critical parts to include when creating a vendor risk management checklist. FREE ACCESS
  • Locked
    10.  Best Practices for Vendor Risk Management
    5m 38s
    Upon completion of this video, you will be able to list best practices to follow for vendor risk management. FREE ACCESS
  • Locked
    11.  Contracts and Contract Language
    5m 21s
    In this video, we will identify the importance of having sound contract language when dealing with security vendors. FREE ACCESS
  • Locked
    12.  Information Security Vendors
    7m 36s
    After completing this video, you will be able to list common information security vendors to consider. FREE ACCESS
  • Locked
    13.  Course Summary
    57s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.0 of 7 users Rating 4.0 of 7 users (7)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.2 of 6 users Rating 4.2 of 6 users (6)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 1361 users Rating 4.5 of 1361 users (1361)
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 4.3 of 33 users Rating 4.3 of 33 users (33)