Video

Video: How to Determine Which Security Services to Outsource

Much to the chagrin of every security leader, no one has an unlimited budget that allows them to procure all of the cybersecurity resources they need. This is why CISOs and other infosec leaders need to focus on where they need the most help and get the most benefit out of every dollar spent. It’s a common challenge, and one Nuspire explored more in its annual study assessing CISO buying trends.    

In this brief video, you’ll get a glimpse into the most compelling aspects of Nuspire’s study, including CISOs’ biggest concerns when it comes to running their cybersecurity programs and the security services they’re willing to outsource. You’ll also receive practical advice for how to determine the most important concerns you may have about your business and whether you can tackle those concerns internally or need to outsource to a third party.  

More about Nuspire’s annual study on CISO buying trends 

Nuspire’s first annual study surveyed 200 CISOs and IT decision-makers (ITDMs) to explore pain points, priorities and buying trends. The study found that only 4% of CISOs and ITDMs manage all of their cybersecurity needs in-house, which means outsourcing clearly is a big part of cybersecurity plans and programs.  

Since CISOs’ budgets are constrained, they have to prioritize where to put their purchasing power. This study helps identify those priorities by exploring CISOs’ top challenges, such as hiring/retention, employee training and remote work; CISOs’ four security must-haves when it comes to outsourcing services; as well as the priorities CISOs prefer to tackle in-house.  

The study was gathered using two methodologies: (1) traditional survey questions that ask respondents to choose one answer or all that apply, and (2) the Duo™ MaxDiff approach that asks respondents to make a choice based on two dimensions of interest instead of one.  

Click below to watch the video

Featured Videos

Trust our realistic, practical methods of solving your cybersecurity challenges.