Advisor

Outsourcing Guidelines for Centralizing Security

Posted April 4, 2007 | Leadership | Leadership |

Centralization of security is of increasing urgency as the threat environment continues to expand and as regulatory requirements take hold. A centralized security system is considerably easier to audit than a system where management is spread throughout the enterprise. It is also likely to improve oversight and analysis and to create a more robust environment. Roles and responsibilities are clarified, and maintaining security in interactions with outside organizations such as suppliers and outsourcing vendors is easier.

About The Author
Brian Dooley
Brian J. Dooley is an author, analyst, and journalist with more than 30 years' experience in analyzing and writing about IT trends. Mr. Dooley has written seven books, numerous user manuals, hundreds of reports, and more than 2,000 magazine features. He is the founder and past President of the New Zealand Chapter of the Society for Technical Communication and initiated the Graduate Certificate in Technical Communication program at Christchurch… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.