SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
SESSION ID:
#RSAC
Lakshmi Hanspal
Are you thinking about IT
Outsourcing ?
Top Reasons, Risks and Rewards
TECH-F03
PayPal Inc.
@lakshmihanspal
The views expressed in this presentation are my own, and not those of
PayPal Holdings, Inc. or any of its affiliates
#RSAC
How do you approach “IT Outsourcing” ?
2
#RSAC
Our Journey Today
3
Trends in Outsourced IT Services
Top Reasons to Outsource IT
Top Risks in IT Outsourcing
Top Rewards in IT Outsourcing
Key takeaways for you
#RSAC
Trends in Outsourced IT Services
4
Outsourced
IT services
Network
(Buildout /
Monitoring)
Help Desk /
Customer
Support
Data
Centers
(Web scale)
Content
Creation &
Hosting
(Business
Apps)
Which IT services are
being outsourced ?
What is the predicted
trend for 2016 and
beyond ?
IoT
Security
Big Data
Analysis
Vulnerability
Mgmt
(Scanning
and Pen
Test)
Threat
Intelligence
(Crowd
sourced)
#RSAC
Reduce
Cost
Focus On
Core
Speed to
Market
IT Talent
Efficiency
Conserve
Capital
Competitive
Edge
Top Reasons to Outsource IT
What are current
business drivers?
What are trending
business drivers?
#RSAC
Top Risks in IT Outsourcing
6
REPUTATIONAL
TRANSACTIONAL
OPERATIONAL
CONTRACTUAL
COMPLIANCE
IP Theft, Breach
Confidentiality, Insider Threat
Functional Misfit, Scalability, Business
Continuity, Risk Transparency,
Language, Culture, Timezone
Vendor Lock-in, Vendor
Performance, Fees/Costs
Sub-contracting
International,
Regional, Functional
What risks should
you consider?
How does trending of
business drivers
affect these risks?
#RSAC
Top Rewards to IT Outsourcing
What are the benefits
to outsourcing?
Are these perceived
or actual rewards ?
How can they be
measured ?
0 100
20
10
30
40
80
90
70
60
50
Bottom Line
0 100
20
10
30
40
80
90
70
60
50
Technology
0 100
20
10
30
40
80
90
70
60
50
People
0 100
20
10
30
40
80
90
70
60
50
Operations
Retention
of Talent
Business
Focus
State of
the Art
Risk
Aligned
Predictable
Opex
Redirect
Capital
Agile
Scalable
#RSAC
Key takeaways for you – Near Term
8
For your existing outsourced services, understand roles and
responsibilities for:
Breach notification
Vulnerability management and reporting
Key management
Identity management and provisioning (apps and users)
Administration and access control
Identify and align with business and regulatory constraints
#RSAC
Key takeaways for you - Strategic
9
For your next outsourcing opportunity:
Clearly identify and articulate the compelling
business drivers for steering in this direction
Strive for risk transparency on associated risks
when someone else is running your critical part of
the business
Enumerate and measure the benefits expected to
be reaped
#RSAC
Interested in More Info on Outsourcing Trends?
10
Coming Soon: Outsourcing Trends Publication
Series
March 2016: Crowd Sourced Threat Intelligence
April 2016: IoT Security
May 2016: Big Data Analysis
June 2016: Vulnerability and Pen Testing
https://www.paypal-engineering.com
#RSAC
Q & A
Lakshmi Hanspal
lhanspal@yahoo.com
@lakshmihanspal

Weitere ähnliche Inhalte

Mehr von Priyanka Aash

Mehr von Priyanka Aash (20)

Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Are You Thinking about IT Outsourcing? Top Reasons, Risks and Rewards

  • 1. SESSION ID: #RSAC Lakshmi Hanspal Are you thinking about IT Outsourcing ? Top Reasons, Risks and Rewards TECH-F03 PayPal Inc. @lakshmihanspal The views expressed in this presentation are my own, and not those of PayPal Holdings, Inc. or any of its affiliates
  • 2. #RSAC How do you approach “IT Outsourcing” ? 2
  • 3. #RSAC Our Journey Today 3 Trends in Outsourced IT Services Top Reasons to Outsource IT Top Risks in IT Outsourcing Top Rewards in IT Outsourcing Key takeaways for you
  • 4. #RSAC Trends in Outsourced IT Services 4 Outsourced IT services Network (Buildout / Monitoring) Help Desk / Customer Support Data Centers (Web scale) Content Creation & Hosting (Business Apps) Which IT services are being outsourced ? What is the predicted trend for 2016 and beyond ? IoT Security Big Data Analysis Vulnerability Mgmt (Scanning and Pen Test) Threat Intelligence (Crowd sourced)
  • 5. #RSAC Reduce Cost Focus On Core Speed to Market IT Talent Efficiency Conserve Capital Competitive Edge Top Reasons to Outsource IT What are current business drivers? What are trending business drivers?
  • 6. #RSAC Top Risks in IT Outsourcing 6 REPUTATIONAL TRANSACTIONAL OPERATIONAL CONTRACTUAL COMPLIANCE IP Theft, Breach Confidentiality, Insider Threat Functional Misfit, Scalability, Business Continuity, Risk Transparency, Language, Culture, Timezone Vendor Lock-in, Vendor Performance, Fees/Costs Sub-contracting International, Regional, Functional What risks should you consider? How does trending of business drivers affect these risks?
  • 7. #RSAC Top Rewards to IT Outsourcing What are the benefits to outsourcing? Are these perceived or actual rewards ? How can they be measured ? 0 100 20 10 30 40 80 90 70 60 50 Bottom Line 0 100 20 10 30 40 80 90 70 60 50 Technology 0 100 20 10 30 40 80 90 70 60 50 People 0 100 20 10 30 40 80 90 70 60 50 Operations Retention of Talent Business Focus State of the Art Risk Aligned Predictable Opex Redirect Capital Agile Scalable
  • 8. #RSAC Key takeaways for you – Near Term 8 For your existing outsourced services, understand roles and responsibilities for: Breach notification Vulnerability management and reporting Key management Identity management and provisioning (apps and users) Administration and access control Identify and align with business and regulatory constraints
  • 9. #RSAC Key takeaways for you - Strategic 9 For your next outsourcing opportunity: Clearly identify and articulate the compelling business drivers for steering in this direction Strive for risk transparency on associated risks when someone else is running your critical part of the business Enumerate and measure the benefits expected to be reaped
  • 10. #RSAC Interested in More Info on Outsourcing Trends? 10 Coming Soon: Outsourcing Trends Publication Series March 2016: Crowd Sourced Threat Intelligence April 2016: IoT Security May 2016: Big Data Analysis June 2016: Vulnerability and Pen Testing https://www.paypal-engineering.com
  • 11. #RSAC Q & A Lakshmi Hanspal lhanspal@yahoo.com @lakshmihanspal