{"id":1354,"date":"2012-07-04T16:39:00","date_gmt":"2012-07-04T16:39:00","guid":{"rendered":"http:\/\/localhost\/projects\/horsesforsources\/ito-bpo-security-disasters_070412\/"},"modified":"2012-07-04T16:39:00","modified_gmt":"2012-07-04T16:39:00","slug":"ito-bpo-security-disasters_070412","status":"publish","type":"post","link":"https:\/\/www.horsesforsources.com\/ito-bpo-security-disasters_070412\/","title":{"rendered":"It\u2019s a miracle we’re yet to see any BPO\/ITO security disasters"},"content":{"rendered":"
Name the one person who’s never present in an outsourcing business case evaluation, provider down-selection or contract terms meeting, but has a real vested interested in the discussion? \u00a0And no, it’s not your shrink.<\/strong><\/p>\n Having the Chief Security Officer (CSO) show-up during your outsourcing meetings is akin to your inviting a cardiac specialist to a no-holds-barred steak dinner with all the trimmings. \u00a0The CSO is the ultimate party-pooper, the much-derided control-freak who cares little for business outcomes, only the potential disasters that may arise along the way. \u00a0Why bring them along to put a spanner in the works (unless that’s your agenda….)?<\/p>\n HfS Research Director, Jim Slaby<\/a>, never shy to call out the inanities of today’s quirky corporate cultures, has been working under cover to find out how the CSO party-poopers were being engaged in the whole outsourcing experience….<\/p>\n Managing Security and Risk in BPO Engagements<\/strong><\/span><\/p>\n The most overlooked, swept-aside and brushed-under-the-carpet issue in outsourcing is the lame effort most buyers make to manage their exposure to security risk in outsourcing engagements. As a self-styled security nerd, I\u2019m frequently horrified by the lip service that many outsourcing buyers and providers give to security. Bring up the \u201cS\u201d word with buyers and their eyes glaze over; ask providers for a briefing on the security capabilities of their outsourcing offerings and they run a mile. Why is this topic so eagerly avoided in today\u2019s global business environment? In an increasingly regulated world full of increasingly sophisticated security threats, aren\u2019t buyers and providers alike courting disaster here?<\/p>\n If you work in the enterprise security space long enough, you come to understand Scott Adams\u2019s Dilbert parody of an evil, sadistic Chief Security Officer (CSO), a pointy-eared fellow called Mordac<\/a>, the Preventer of Information Services. Mordac embodies the stereotype of intrusive, overly arcane IT security regimes, the kind that seem designed to hinder useful business processes and add layers of complexity to simple tasks, to say nothing of inflating costs and frankly boring you to death.<\/p>\n For instance, why exactly does your password need to be at least eight characters and include a mix of uppercase, lowercase, numbers and special characters? (Actually, that\u2019s not considered great password practice any more: eight characters are pretty easy to crack with brute force, and users have a tendency to scribble hard-to-remember passwords on Post-It notes.) Or, why won\u2019t IT let you connect your iPad to the corporate network when it is less vulnerable to endpoint malware than your Windows laptop? What\u2019s the point of this restrictive new company policy on employee use of social media?<\/p>\n Of course, you probably have an inkling that it\u2019s a scary world out there, full of criminals who look at your databases of customer \/ patient \/ payment-card information like a pack of hungry wolves gazes at a flock of baby lambs. You may recognize that, despite the intricate defenses your CSO has erected around your company\u2019s precious data assets, many breaches occur at the hands of malicious insiders — but as often through the garden-variety laziness and inattention of otherwise well-meaning employees. You may know rather less about emerging new threats, like the gangs of elite programmers whom the Chinese military is giving unlimited time and funds to discover new ways to penetrate and crash your systems, part of a new strategic front in the geopolitical struggle for world dominance.<\/p>\n And have you considered how many people are touching your critical data assets, with multiple providers comprising hundreds of thousands of employees around the globe managing many of your back office business and IT operations? Have you given any thought to what their subcontractors are doing, whether they present any data privacy or compliance risks that aren\u2019t covered by your contract with your primary provider? Feeling any agita<\/em> yet?<\/p>\n<\/p>\n