preview

Outsourcing Information Security Consultants

analytical Essay
1798 words
1798 words
bookmark

Introduction
Outsourcing is a technique for companies to reassign specific responsibilities to external entities. There are several motivations for outsourcing including organizational, improvement, cost, and revenue advantages (Ghodeswar & Vaidyanathan, 2008).
The assignment research objectives were (a) to gain insight into securing strategic partnerships in the information technology (IT) arena; (b) to understand the choices made to reduce information and security risks by exploring the different outsourcing techniques, and; (c) to understand how business process associated with outsourcing will stimulate awareness on how the process is interlinked with human behaviors. The topics covered include an evaluation of the specifications of information security consultants to become strategic partners assisting in the reduction of information or security risks, an examination of four factors that were omitted in the specifications that add value to the selection process, and an explanation of the value of the four factors.

Specifications

Information Security (INFOSEC) consultants help client companies through strategic partnerships (Ghodeswar & Vaidyanathan, 2008). A short review of United States outsourcing creates a prospective baseline for outsourcing endeavors of private institutions (Ghodeswar & Vaidyanathan, 2008). Despite the fact that the vendor has accountability and duties (detailed in the statement of work), the client is predominantly in charge of supervising strategic partnerships (Ghodeswar & Vaidyanathan, 2008).
Evaluate the Specifications of Information Security Consultants (vendors) to Become a Strategic Partner Assisting in the Reduction of Information or Security Risks
Due to economic demands...

... middle of paper ...

...e of practice for information security management (1st ed.). Geneva, Switzerland: ISO/IEC.
ITGI. (2012). COBIT 5.0. Rolling Meadows: ISACA.
Marquis, K. (2011). Insourcing and outsourcing for U.S. Department of Defense IT projects: A model (Tech.). Retrieved http://www.dtic.mil/dtic/tr/fulltext/u2/a549027.pdf
Ray, M., & Ramaswamy, P. (2007). GTAG: Information Technology Outsourcing (Vol. 7).
Altamonte Springs, Florida: The IIA.
Reinhard, J. (2012). IT Governance Integration. Internal Auditor, 69(4), 51-54.
Rossiter, C. (2011). How internal audit adds value to the governance process. Protiviti, Inc.
Retrieved from http://www.protiviticonsulting.com/en-US/Pages/How-Internal-Audit-
Adds-Value-to-the-Governance-Process.aspx
Tutorialpoint. (2014). Statement of work. Tutorialpoint. Retrieved from
http://www.tutorialspoint.com/management_concepts/statement_of_work.htm

In this essay, the author

  • Explains that a universal process for selecting partners is to pinpoint the basis for collaborating, determine the criterion for potential partner assessment, evaluate and prioritize potential partners, and select the most suitable match.
  • Recommends examining a minimum of four factors that were omitted in the specifications that add value to the selection process.
  • Explains that despite the specification centered on the motivations for outsourcing, the process to manage a vendor affiliation must be the chief concern.
  • Explains that feeble vendor selection can lead to financial risk, deficient service levels, and undesirable payment conditions. the control objectives for information and related technology (cobit) is a governance model to reduce operational and compliance risk.
  • Explains that it governance provides more than just regulatory compliance but assures an organization they are functioning properly.
  • Analyzes the literature review to assess various forms of outsourcing, drivers, and processes. the research uncovered that strategic partnerships have a clear lifecycle.
  • Explains that outsourcing is a technique for companies to reassign specific responsibilities to external entities. the assignment research objectives were to gain insight into securing strategic partnerships in the it arena.
  • Evaluates the specifics of information security consultants to become a strategic partner assisting in the reduction of information or security risks.
Get Access