{"id":3861,"date":"2017-02-09T14:28:00","date_gmt":"2017-02-09T14:28:00","guid":{"rendered":"http:\/\/localhost\/projects\/horsesforsources\/experts-security-gurus-offer-advice-for-non-technical-buyers_020917\/"},"modified":"2017-02-09T14:28:00","modified_gmt":"2017-02-09T14:28:00","slug":"experts-security-gurus-offer-advice-for-non-technical-buyers_020917","status":"publish","type":"post","link":"https:\/\/www.horsesforsources.com\/experts-security-gurus-offer-advice-for-non-technical-buyers_020917\/","title":{"rendered":"Ask the Experts: Security Gurus Offer Their Advice for Non-technical Buyers"},"content":{"rendered":"
<\/p>\n
A big challenge for sourcing specialists is needing to rely on security domain experts internally to judge provider quality. The internal team, already working on their day jobs, often doesn’t have as much time to devote to the selection and negotiation process as sourcing leaders want. It’s important for sourcing teams to get smarter about security themselves to lessen their dependence on domain experts for preliminary RFP screening and downselecting.<\/p>\n
In our upcoming security services Blueprint, we asked the client references (themselves security experts) what advice they’d give non-technical teams on buying security services. Some of them are general sourcing best practices, and some are very specific to security. But they’re all important to ensuring the success of your security services engagement. Here are some of their key recommendations: <\/p>\n
Bottom line: Don’t be intimidated by the lack of deep technical security knowledge. It’s important to bring in domain experts as much as possible, but sourcing teams can dramatically improve their own efforts by making sure they focus on the business side of security. <\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":" A big challenge for sourcing specialists is needing to rely on security domain experts internally to judge provider quality. The…<\/p>\n","protected":false},"author":1,"featured_media":3862,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92],"tags":[458],"organization":[],"ppma_author":[896],"class_list":["post-3861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-risk","tag-it-security"],"yoast_head":"\n