Information Security Research Library

Powered by


Organizations are increasingly partnering with others to accomplish various goals, such as broadening product offerings, reducing costs, and increasing focus on main business. However, outsourcing services increase security risks, lead to regulatory compliance problems and increase your compliance burden.

This security school gives you an overview of the security issues associated with outsourced services and technologies, and policies that can help. Discover the top 5 pitfalls of partner security management and check out these security lessons today.

Listen to this Podcast and hear Richard Mackey explain:

  • How to create a policy for and classify information based on its sensitivity
  • The typical "set and forget" agreements that most organizations put in place and their repercussions
  • How organizations can create periodic and triggered reviews of partners
  • And much more


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.