READ TIME: 5 minutes
WHO IT'S FOR: IT leaders faced with trade-offs to make for their cybersecurity program; IT contributors evaluating co-managed and outsourced options; or, anybody with limited (dedicated) cybersecurity staff who need to consider how to attribute resources (internal and otherwise) to achieve core coverage.
WHAT'S IN IT: A description of a proposed allocation of in-house, co-managed and outsourced resources across three core cybersecurity functions. A template to evaluate them for your organization, along with sample data of how you might populate it. And, a list of resources to explore further.
HOW IT HELPS: This asset provides you with a framework, template, example and information to make your own cybersecurity allocation across core security functions. This is especially helpful when resources are scarce.