SlideShare a Scribd company logo
Outsourcing Security Management Vendor Selection Basics. Nick Krym, 03-20-2005
Common Drivers for Outsourcing High / prohibitive start up costs Establishing security infrastructure Establishing processes and procedures Hardware, networking, software licensing Complex and long ramp up Resource acquisition (hard to find expertise, complex certifications, etc.) Establishing security infrastructure Establishing processes and procedures High / prohibitive cost of operations 24x7 SOC staffing Resource retention R&D and staying current
Scope of Security Management Managed Security Services Providers (MSSP) also known as Managed Security Monitoring (MSM) Vendors typically offer the following services: 24x7 security monitoring through dedicated SOCs Monitoring security infrastructure covers variety of components such as firewalls, intrusion detection sensors and antivirus systems and analyzing the data they generate for indications of security problems  Periodic scanning of various nature for the perimeter and internal components of data centers and corporate networks Ongoing configuration of the security infrastructure components  Prevention and remediation of security vulnerabilities and recovery from incidents  Consulting services that include various types of audits, ethical hacking, development of security audit remediation plans, disaster recovery and business continuity planning
Making Outsourcing Decision Outsourcing security is not appropriate for every organization.  Making decision on outsourcing should be based on a typical “buy vs. build” analysis as it applies to products and services. For many small organizations do not need to go through buy vs. build analysis as the answer is quite obvious.  As sheer expense of building SOC and staffing it on 24x7 is more than enough to move straight to vendor selection. For large companies as well as organizations with security being a core part of the business decision should be based on comprehensive research and Cost / ROI analysis.
Finding “Right” Vendor Develop the team and the process Information Security Committee  Vendor selection team Vendor selection process Vendor selection process highlights Learn what Managed Security Services Providers (MSSP) have to offer (also consider Managed Security Monitoring (MSM) abbreviation for your Google search).  Possibly issue an RFI to get additional insights Define drivers specific to your organization Define selection criteria Build RFP around your selection criteria Create a target list (use Gartner materials if available or just Google)  Issue RFP to selected group of vendors Shortlist vendors to 2-3 prospective partner Negotiate Terms & Conditions Make final selection Tips for successful execution  Define budgets upfront  Secure organizational commitment Secure executive sponsorship Make process and selection criteria as transparent as possible Don’t burn the bridges with vendors as your final selection may not work out through the painful process of “integration”
Gartner Magic Quadrants
Scope of MSSP Agreement The scope of a typical MSSP agreement includes  Security and Availability monitoring and analysis for various security devices such as firewall and intrusion detection system (IDS) Security and Availability monitoring and analysis for other devices and components that are critical to business operations Firewall and IDS configuration and management. Periodic vulnerability scanning for multiple components of the monitored network Periodic application penetration testing / ethical hacking  Zero day alerts and other information services Various consulting services, typically related to remediation of items discovered during scans and audits
Common Selection Criteria General business considerations Overall KPIs (number of customers, revenue, profitability, etc.)  Company financial stability Company track record in multiple aspect of service Customer retention / customer satisfaction Company position vis-à-vis competition  Technical Expertise / Technology Overall company expertise, thought leadership Company expertise in areas of security relevant to your needs Individual staff expertise and certification level Vendor Neutrality. Is the vendor business model tied to specific products? Low Install Impact. Network requirements for service deployment. Vendor Maturity Process maturity / SOC certification Exposure to various clientele with diverse needs Global Intelligence / View. Global customer base providing visibility into threats. Network visibility / Overall coverage (number of devices under management)
Common Selection Criteria, cont. Vendor Security Infrastructure Typical SLA.  Infrastructure scalability guarantees SOC redundancy, business continuity and disaster recovery Vendor Service Capabilities  Is Managed Security Monitoring a core competency?  Is business model focused on services? Proven Systems / Processes. Time-to-market delivering new services and features and ticket Handling. Organizational Capabilities  Staffing / recruiting capabilities and track record Process and cultural compatibility with your organization Account and project management capabilities  Bottom Line Presales: Staff / Proposal Overall annualized cost of the solution Contract terms  Customer references Brand recognition / Association impact

More Related Content

PPT
A Guide to Managed Security Services
PDF
Infosec 2014 - Considerations when choosing an MSSP
PPTX
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
PDF
CO$T BENEFIT OF MSSP
PDF
Its Not You Its Me MSSP Couples Counseling
PPTX
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
PPSX
Next-Gen security operation center
A Guide to Managed Security Services
Infosec 2014 - Considerations when choosing an MSSP
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
CO$T BENEFIT OF MSSP
Its Not You Its Me MSSP Couples Counseling
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
Next-Gen security operation center

What's hot (20)

PPSX
Security policies
PDF
IT SECURITY ASSESSMENT PROPOSAL
PPTX
Security operation center
PPTX
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
Vulnerability Scans & Penetration Test Comparison Chart
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
Rothke secure360 building a security operations center (soc)
PDF
Sample network vulnerability analysis proposal
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
Building Security Operation Center
PPTX
An introduction to SOC (Security Operation Center)
PDF
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
PPT
SLVA - Security monitoring and reporting itweb workshop
PPTX
Building a SOC - hackmiami 2018
PPTX
Cybersecurity Audit
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Governance of security operation centers
ODP
Providing a Flexible Approach to the Inflexible World of Information Security...
PPTX
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Security policies
IT SECURITY ASSESSMENT PROPOSAL
Security operation center
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Security Operations Center (SOC) Essentials for the SME
Vulnerability Scans & Penetration Test Comparison Chart
Rothke rsa 2012 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Sample network vulnerability analysis proposal
Security operations center-SOC Presentation-مرکز عملیات امنیت
Building Security Operation Center
An introduction to SOC (Security Operation Center)
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
SLVA - Security monitoring and reporting itweb workshop
Building a SOC - hackmiami 2018
Cybersecurity Audit
Effective Security Operation Center - present by Reza Adineh
Governance of security operation centers
Providing a Flexible Approach to the Inflexible World of Information Security...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Ad

Viewers also liked (18)

PDF
To MSSP or not to MSSP IISF 2015
PPTX
C&W Product Portfolio
PDF
Citrix Day 2012: ShareFile
PDF
Outsourcing: A Security Perspective
PDF
IT OUTSOURCING ASSURANCE
PPT
VSynergize Outsourcing Pvt Ltd
PDF
Outsourcing it security yes, it’s still your problem
PDF
OUTSOURCING ASSURANCE
PDF
Webinar: Data warehouse na nuvem da AWS
PDF
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
PPTX
Dizzion Channel Partner Training blow sales objections out of the water
PDF
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
PDF
MSP Sales Best Practice | How to Close Sales Leads
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
PDF
MT 70 The New Era of Incident Response Planning
PDF
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
PPT
Extend Your Market Reach with IBM Security QRadar for MSPs
PPT
Trends in network security feinstein - informatica64
To MSSP or not to MSSP IISF 2015
C&W Product Portfolio
Citrix Day 2012: ShareFile
Outsourcing: A Security Perspective
IT OUTSOURCING ASSURANCE
VSynergize Outsourcing Pvt Ltd
Outsourcing it security yes, it’s still your problem
OUTSOURCING ASSURANCE
Webinar: Data warehouse na nuvem da AWS
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Dizzion Channel Partner Training blow sales objections out of the water
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Best Practice | How to Close Sales Leads
Security Outsourcing - Couples Counseling - Atif Ghauri
MT 70 The New Era of Incident Response Planning
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
Extend Your Market Reach with IBM Security QRadar for MSPs
Trends in network security feinstein - informatica64
Ad

Similar to Outsourcing Security Management (20)

PPT
How to Evaluate a Managed Services Firm
PPT
Why Outsource Application Management?
PDF
Choose The Right IT Services Ebook WPGC
PPT
Security For Outsourced IT Contracts
PPTX
Vendor_Mgmt_101_IIMC_v2
PPTX
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
PDF
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
PDF
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PDF
6 Steps to Bringing a Security Offering to Market
PPTX
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
PDF
Si InfoSecMiddleEastLR0516
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PDF
How to make managed services work
PDF
Securing Your Business: A Comprehensive Guide to Managed Security Services
PDF
How Do I Choose the Right Managed SOC Provider
PPT
Ppt Template
PDF
Choosing it managed service provider
PPT
Managed Services Marketing
PPTX
Managed IT Presentation
How to Evaluate a Managed Services Firm
Why Outsource Application Management?
Choose The Right IT Services Ebook WPGC
Security For Outsourced IT Contracts
Vendor_Mgmt_101_IIMC_v2
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
6 Steps to Bringing a Security Offering to Market
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Si InfoSecMiddleEastLR0516
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
How to make managed services work
Securing Your Business: A Comprehensive Guide to Managed Security Services
How Do I Choose the Right Managed SOC Provider
Ppt Template
Choosing it managed service provider
Managed Services Marketing
Managed IT Presentation

More from Nick Krym (14)

PPTX
Are you ready to outsource
PPS
10 Golden Rules Of Bargaining
PPT
Sexual Harassment Avoidance
PDF
Management - Termination, Downsizing, Layoffs
PPT
Introducing Offshore Concepts
PPT
Sexual Harassment Avoidance
PDF
Management - Developing Employees
PDF
Employee Performance Managment
PDF
Team Management I - Basics
PDF
Team Management II - Decisions And Problem Solving
PDF
Team Management III - Conflict Resolution
PDF
Common Sense Management - Recruitment & Casting
PDF
Common Sense Management - Introduction
PDF
Doing Business On Internet -- HIPAA Challenge
Are you ready to outsource
10 Golden Rules Of Bargaining
Sexual Harassment Avoidance
Management - Termination, Downsizing, Layoffs
Introducing Offshore Concepts
Sexual Harassment Avoidance
Management - Developing Employees
Employee Performance Managment
Team Management I - Basics
Team Management II - Decisions And Problem Solving
Team Management III - Conflict Resolution
Common Sense Management - Recruitment & Casting
Common Sense Management - Introduction
Doing Business On Internet -- HIPAA Challenge

Recently uploaded (20)

PDF
Booking.com The Global AI Sentiment Report 2025
PDF
How to Get Funding for Your Trucking Business
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
PDF
How to Get Approval for Business Funding
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
Introduction to Generative Engine Optimization (GEO)
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PPTX
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Booking.com The Global AI Sentiment Report 2025
How to Get Funding for Your Trucking Business
Slide gioi thieu VietinBank Quy 2 - 2025
Lecture 3344;;,,(,(((((((((((((((((((((((
Charisse Litchman: A Maverick Making Neurological Care More Accessible
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Principles of Marketing, Industrial, Consumers,
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
How to Get Approval for Business Funding
Daniels 2024 Inclusive, Sustainable Development
Comments on Crystal Cloud and Energy Star.pdf
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
Astra-Investor- business Presentation (1).pptx
Introduction to Generative Engine Optimization (GEO)
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...

Outsourcing Security Management

  • 1. Outsourcing Security Management Vendor Selection Basics. Nick Krym, 03-20-2005
  • 2. Common Drivers for Outsourcing High / prohibitive start up costs Establishing security infrastructure Establishing processes and procedures Hardware, networking, software licensing Complex and long ramp up Resource acquisition (hard to find expertise, complex certifications, etc.) Establishing security infrastructure Establishing processes and procedures High / prohibitive cost of operations 24x7 SOC staffing Resource retention R&D and staying current
  • 3. Scope of Security Management Managed Security Services Providers (MSSP) also known as Managed Security Monitoring (MSM) Vendors typically offer the following services: 24x7 security monitoring through dedicated SOCs Monitoring security infrastructure covers variety of components such as firewalls, intrusion detection sensors and antivirus systems and analyzing the data they generate for indications of security problems Periodic scanning of various nature for the perimeter and internal components of data centers and corporate networks Ongoing configuration of the security infrastructure components Prevention and remediation of security vulnerabilities and recovery from incidents Consulting services that include various types of audits, ethical hacking, development of security audit remediation plans, disaster recovery and business continuity planning
  • 4. Making Outsourcing Decision Outsourcing security is not appropriate for every organization. Making decision on outsourcing should be based on a typical “buy vs. build” analysis as it applies to products and services. For many small organizations do not need to go through buy vs. build analysis as the answer is quite obvious. As sheer expense of building SOC and staffing it on 24x7 is more than enough to move straight to vendor selection. For large companies as well as organizations with security being a core part of the business decision should be based on comprehensive research and Cost / ROI analysis.
  • 5. Finding “Right” Vendor Develop the team and the process Information Security Committee Vendor selection team Vendor selection process Vendor selection process highlights Learn what Managed Security Services Providers (MSSP) have to offer (also consider Managed Security Monitoring (MSM) abbreviation for your Google search). Possibly issue an RFI to get additional insights Define drivers specific to your organization Define selection criteria Build RFP around your selection criteria Create a target list (use Gartner materials if available or just Google) Issue RFP to selected group of vendors Shortlist vendors to 2-3 prospective partner Negotiate Terms & Conditions Make final selection Tips for successful execution Define budgets upfront Secure organizational commitment Secure executive sponsorship Make process and selection criteria as transparent as possible Don’t burn the bridges with vendors as your final selection may not work out through the painful process of “integration”
  • 7. Scope of MSSP Agreement The scope of a typical MSSP agreement includes Security and Availability monitoring and analysis for various security devices such as firewall and intrusion detection system (IDS) Security and Availability monitoring and analysis for other devices and components that are critical to business operations Firewall and IDS configuration and management. Periodic vulnerability scanning for multiple components of the monitored network Periodic application penetration testing / ethical hacking Zero day alerts and other information services Various consulting services, typically related to remediation of items discovered during scans and audits
  • 8. Common Selection Criteria General business considerations Overall KPIs (number of customers, revenue, profitability, etc.) Company financial stability Company track record in multiple aspect of service Customer retention / customer satisfaction Company position vis-à-vis competition Technical Expertise / Technology Overall company expertise, thought leadership Company expertise in areas of security relevant to your needs Individual staff expertise and certification level Vendor Neutrality. Is the vendor business model tied to specific products? Low Install Impact. Network requirements for service deployment. Vendor Maturity Process maturity / SOC certification Exposure to various clientele with diverse needs Global Intelligence / View. Global customer base providing visibility into threats. Network visibility / Overall coverage (number of devices under management)
  • 9. Common Selection Criteria, cont. Vendor Security Infrastructure Typical SLA. Infrastructure scalability guarantees SOC redundancy, business continuity and disaster recovery Vendor Service Capabilities Is Managed Security Monitoring a core competency? Is business model focused on services? Proven Systems / Processes. Time-to-market delivering new services and features and ticket Handling. Organizational Capabilities Staffing / recruiting capabilities and track record Process and cultural compatibility with your organization Account and project management capabilities Bottom Line Presales: Staff / Proposal Overall annualized cost of the solution Contract terms Customer references Brand recognition / Association impact