{"id":1354,"date":"2012-07-04T16:39:00","date_gmt":"2012-07-04T16:39:00","guid":{"rendered":"http:\/\/localhost\/projects\/horsesforsources\/ito-bpo-security-disasters_070412\/"},"modified":"2012-07-04T16:39:00","modified_gmt":"2012-07-04T16:39:00","slug":"ito-bpo-security-disasters_070412","status":"publish","type":"post","link":"https:\/\/www.horsesforsources.com\/ito-bpo-security-disasters_070412\/","title":{"rendered":"It\u2019s a miracle we’re yet to see any BPO\/ITO security disasters"},"content":{"rendered":"
Name the one person who’s never present in an outsourcing business case evaluation, provider down-selection or contract terms meeting, but has a real vested interested in the discussion? \u00a0And no, it’s not your shrink.<\/strong><\/p>\n <\/p>\n Having the Chief Security Officer (CSO) show-up during your outsourcing meetings is akin to your inviting a cardiac specialist to a no-holds-barred steak dinner with all the trimmings. \u00a0The CSO is the ultimate party-pooper, the much-derided control-freak who cares little for business outcomes, only the potential disasters that may arise along the way. \u00a0Why bring them along to put a spanner in the works (unless that’s your agenda….)?<\/p>\n HfS Research Director, Jim Slaby<\/a>, never shy to call out the inanities of today’s quirky corporate cultures, has been working under cover to find out how the CSO party-poopers were being engaged in the whole outsourcing experience….<\/p>\n Managing Security and Risk in BPO Engagements<\/strong><\/span><\/p>\n The most overlooked, swept-aside and brushed-under-the-carpet issue in outsourcing is the lame effort most buyers make to manage their exposure to security risk in outsourcing engagements. As a self-styled security nerd, I\u2019m frequently horrified by the lip service that many outsourcing buyers and providers give to security. Bring up the \u201cS\u201d word with buyers and their eyes glaze over; ask providers for a briefing on the security capabilities of their outsourcing offerings and they run a mile. Why is this topic so eagerly avoided in today\u2019s global business environment? In an increasingly regulated world full of increasingly sophisticated security threats, aren\u2019t buyers and providers alike courting disaster here?<\/p>\n