preview

Outsourcing Information Security Consultants

Better Essays

Introduction
Outsourcing is a technique for companies to reassign specific responsibilities to external entities. There are several motivations for outsourcing including organizational, improvement, cost, and revenue advantages (Ghodeswar & Vaidyanathan, 2008).
The assignment research objectives were (a) to gain insight into securing strategic partnerships in the information technology (IT) arena; (b) to understand the choices made to reduce information and security risks by exploring the different outsourcing techniques, and; (c) to understand how business process associated with outsourcing will stimulate awareness on how the process is interlinked with human behaviors. The topics covered include an evaluation of the specifications …show more content…

Leveraging a personalized build versus purchase determination, company managers can ascertain if outsourcing specific processes amounts to a shrewd strategic decision (Marquis, 2011). Occasionally, business process outsourcing (BPO) is the proper option for persistent internal activities (Hackney, 2011). Without a doubt, BPO permits a company to concentrate on its primary competencies and benefit from price efficiencies produced by the commoditization of information technology (IT) services (Ghodeswar & Vaidyanathan, 2008). One customary outsourcing candidate is a company’s IT security operations. A current client, The NYS Office of Mental Health, has taken the initial steps to begin outsourcing many of its security functions. Outsourcing IT security brings about a significant change in the style of governance, considerable changes in the internal processes of the business, and substantial changes in the business methods utilized to do business with the external environment (Fehr, 2012).

Research regarding strategic partner selection suggests that a universal process for selecting a partner is to pinpoint the basis for collaborating, determine the criterion for potential partner assessment, evaluate and prioritize potential partners, and select the most suitable match (Fehr, 2012). Many information security (INFOSEC) consulting firms strive to build long-term strategic partnerships with client organizations (ISO/IEC, 2008). These

Get Access