Cloud computing, traditional IT outsourcing, and business process outsourcing create challenges for traditional information security and demand a change in how security professionals evaluate risk and protect information, processes, and people. Along with new technologies come new threats, vulnerabilities, and new ways to mitigate those risks. This book offers the guidance to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and case studies describing the specifics of what to do and what not do in a variety of scenarios.
A Brief History
Risk with Security and Outsourcing
How to Address Risks
Information security management and staff; outsourcing managers; and IT management.