Information Security Practices: InfoSec Vendor Management
InfoSec 2023
| Beginner
- 13 videos | 1h 24m 34s
- Includes Assessment
- Earns a Badge
Everything comes with pros and cons, and outsourced information security is no exception. Leaders contemplating outsourcing information security products and services will need to trade potential time and money savings for other potential gaps. In this course, explore information security outsourcing, security vendor relationships, and major considerations and challenges associated with outsourcing information security. Next, discover common downsides to outsourcing security services, key steps to consider when choosing a security vendor, and explore vendor risk management. Finally, learn about vendor contracts and the importance of having sound contract language when dealing with security vendors. Upon completion, you'll be able to identify common InfoSec vendors and providers and best practices for outsourcing InfoSec products or services.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline outsourcing information security services, products, and solutionsIdentify some of the major considerations and challenges when considering outsourcing information securityRecognize what security vendors are and list the common related services they offerName the key steps to consider when choosing a security vendorIdentify the risks potentially posed by third-party vendorsOutline vendor risk management and how it can be used to deal with the monitoring and management of risks resulting from third-party vendor products and services
-
Recognize the typical lifecycle of a vendor relationshipOutline critical parts to include when creating a vendor risk management checklistList best practices to follow for vendor risk managementIdentify the importance of having sound contract language when dealing with security vendorsList common information security vendors to considerSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 17sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 53sUpon completion of this video, you will be able to outline outsourcing information security services, products, and solutions. FREE ACCESS
-
6m 5sAfter completing this video, you will be able to identify some of the major considerations and challenges when considering outsourcing information security. FREE ACCESS
-
9m 11sIn this video, recognize what security vendors are and list the common related services they offer. FREE ACCESS
-
8m 56sIn this video, we will name the key steps to consider when choosing a security vendor. FREE ACCESS
-
11m 14sUpon completion of this video, you will be able to identify the risks potentially posed by third-party vendors. FREE ACCESS
-
7m 10sAfter completing this video, you will be able to outline vendor risk management and how it can be used to deal with the monitoring and management of risks resulting from third-party vendor products and services. FREE ACCESS
-
6m 6sIn this video, recognize the typical lifecycle of a vendor relationship. FREE ACCESS
-
7m 9sIn this video, we will outline critical parts to include when creating a vendor risk management checklist. FREE ACCESS
-
5m 38sUpon completion of this video, you will be able to list best practices to follow for vendor risk management. FREE ACCESS
-
5m 21sIn this video, we will identify the importance of having sound contract language when dealing with security vendors. FREE ACCESS
-
7m 36sAfter completing this video, you will be able to list common information security vendors to consider. FREE ACCESS
-
57sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.