Outsourcing is a technique for companies to reassign specific responsibilities to external entities. There are several motivations for outsourcing including organizational, improvement, cost, and revenue advantages (Ghodeswar & Vaidyanathan, 2008).
The assignment research objectives were (a) to gain insight into securing strategic partnerships in the information technology (IT) arena; (b) to understand the choices made to reduce information and security risks by exploring the different outsourcing techniques, and; (c) to understand how business process associated with outsourcing will stimulate awareness on how the process is interlinked with human behaviors. The topics covered include an evaluation of the specifications of information security consultants to become strategic partners assisting in the reduction of information or security risks, an examination of four factors that were omitted in the specifications that add value to the selection process, and an explanation of the value of the four factors.
Information Security (INFOSEC) consultants help client companies through strategic partnerships (Ghodeswar & Vaidyanathan, 2008). A short review of United States outsourcing creates a prospective baseline for outsourcing endeavors of private institutions (Ghodeswar & Vaidyanathan, 2008). Despite the fact that the vendor has accountability and duties (detailed in the statement of work), the client is predominantly in charge of supervising strategic partnerships (Ghodeswar & Vaidyanathan, 2008).
Evaluate the Specifications of Information Security Consultants (vendors) to Become a Strategic Partner Assisting in the Reduction of Information or Security Risks
Due to economic demands...
... middle of paper ...
practice for information security management (1st ed.). Geneva, Switzerland: ISO/IEC.
ITGI. (2012). COBIT 5.0. Rolling Meadows: ISACA.
Marquis, K. (2011). Insourcing and outsourcing for U.S. Department of Defense IT projects: A
model (Tech.). Retrieved http://www.dtic.mil/dtic/tr/fulltext/u2/a549027.pdf
Ray, M., & Ramaswamy, P. (2007). GTAG: Information Technology Outsourcing (Vol. 7).
Altamonte Springs, Florida: The IIA.
Reinhard, J. (2012). IT Governance Integration. Internal Auditor, 69(4), 51-54.
Rossiter, C. (2011). How internal audit adds value to the governance process. Protiviti, Inc.
Retrieved from http://www.protiviticonsulting.com/en-US/Pages/How-Internal-Audit-
Tutorialpoint. (2014). Statement of work. Tutorialpoint. Retrieved from
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- QUESTION 1. Critically evaluate the competitive advantage that can be gained by companies through IS/IT outsourcing. Provide suitable example to support your answer. The phenomenon of outsourcing has significantly affected the information technology or information system industry over recent decades. This is because, the constantly changing modern business environment forces companies to adapt and accept new practices. Outsourcing allows modern companies worldwide to concentrate on their core activities and ain a competitive edge in the marketplace.... [tags: management strategies]
1805 words (5.2 pages)
- Outsourcing Business Processes Summary This paper captures the most prominent services and issues associated with today's outsourcing environment. Outsourcing is the modern business term for having other companies accomplish basic business processes rather than doing them inhouse. While outsourcing has always been an important business option, modern technical capabilities are fast making outsourcing a critical requirement in competitive, cost conscious industries. However, our recent experience with terrorist challenges indicates that a second look is needed to ensure that outsourcing risks are still acceptable.... [tags: Globalization essays, research papers]
1994 words (5.7 pages)
- What is it our company can do for yours. This is the motto of an organization devoted to outsourcing. These days no good company has done without some amount of outsourcing. Outsourcing is a cost saving method that companies employ by utilizing less labor and overhead in house. Instead companies pay much less to an outside firm to handle some of the duties that are more menial in nature, but important enough for management to consider necessary. To that end, just about any task can be outsourced, including the Human Resources Department.... [tags: Human Resource Management ]
1668 words (4.8 pages)
- Since the beginning of technology, the security levels have dramatically increased making the computers and information technology very secure places to store information. In the beginning computer security focused mainly on securing the computer and the physical system. But with everything becoming more and more mobile, security isn’t just about the physical system anymore…it’s also about securing the information that is constantly running between systems and being stored in clouds. This is information security.... [tags: Computer security, Information security, Security]
732 words (2.1 pages)
- Information security refers to all of the approaches and policies designed to protect a corporation’s information and facts machine from unauthorized access, use, disclosure, disruption modification, or destruction. it 's a standard term that may be used regardless of the shape the data might also take. As for information protection, people typically divided it into two components, which are the IT safety and facts assurance. Sometimes referred as computer security, information technology security has been information security applied to technology, which most often some form of computer system.... [tags: Computer, Computer security, Information security]
983 words (2.8 pages)
- Institutions of higher learning are increasingly using Information and Communication systems in administration, teaching, learning and research. This infrastructure needs to be available, secure and well protected. It therefore becomes crucial for information security practitioners in public universities to implement effective information security programs. Information security focuses on technological issues and important elements of an organization such as people, process, business strategies etc., which also mandates the need for information security.... [tags: Information security, Security, Computer security]
1097 words (3.1 pages)
- Introduction: Business today retains a variety of problems, a major one of these problems are breaches in information and consequently society has come up with Information security to help secure peoples privacy. In order to understand why we have information security, one has to first apprehend the value of information. Typical information stored by different businesses and individuals will consist of an assortment of hypersensitive information that revolves around their employees, financial status, earnings, plans for the future, personal information etc.... [tags: Information Security]
1469 words (4.2 pages)
- The famous cryptographer Bruce Schneier once said that “[p]eople often represent the weakest link in the security chain and are chronically responsible for the failure of security systems” (Schneier, 2000). The practice of Information Security Management is employed by businesses through a variety of standards, best practices, and frameworks to combat this issue. Their adoption of best practices in the public domain allows businesses to strive for improvements through their own interpretation. These best practices are sourced from standards such as ISO/IEC 27000, proprietary knowledge and public frameworks such as COBIT, Six Sigma, or ITIL.... [tags: Information security, Security]
1160 words (3.3 pages)
- As relates to the Issue of Information Security programs, the Department of Health and Human Sciences has formulated various different policies aimed at governing information handling and security as concerns all the departments’ resources. Common in the list of policies are the Policy on Information and Technology security for Remote Access which was established to ensure the information and technology departments resources are appropriately protected during the authorization of remote accessibility to the automated information and system of the department of human and health services.... [tags: Information security, Security, Confidentiality]
1094 words (3.1 pages)
- Why do we need management’s support for information security. Doesn’t IT own information security. The technical side is important, but management’s role cannot be overlooked. Thornton states that management has to drive information security. Why does management need to drive this policy. The management team is legally responsible for any breaches that occur. Plus, senior management has a fiduciary responsibility to the company’s assets. Our management can provide the necessary resources, including finances and personnel, needed to implement policy.... [tags: Information Security Essays]
2590 words (7.4 pages)