{"id":3487,"date":"2016-01-28T16:09:14","date_gmt":"2016-01-28T16:09:14","guid":{"rendered":"https:\/\/www.certitrek.com\/nlpa\/2016\/01\/28\/cyber-security-and-selecting-a-provider\/"},"modified":"2023-05-31T07:45:50","modified_gmt":"2023-05-31T11:45:50","slug":"cyber-security-and-selecting-a-provider","status":"publish","type":"post","link":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/","title":{"rendered":"Cyber Security and Selecting a Provider"},"content":{"rendered":"<p><em>Special thanks to Source One Management Services for this guest post<\/em><\/p>\n<p>Don\u2019t miss updates on Procurement &amp; Supply Chain, Subscribe here!<\/p>\n<p>In today\u2019s world of seemingly constant data breaches, cyber security has become a major topic of discussion in the media with new revelations of hacks occurring daily, but also a critical concern for organizations everywhere. While all businesses work to be as secure as possible, it is agreed that no organization can be completely secure. Preventing attacks, quickly identifying successful attacks, detecting advanced persistent threats, and monitoring systems activity in order to deter intrusions can result in significant business benefits.<\/p>\n<p>That said, how does a company go about sourcing a cyber security provider? Here are five considerations for selecting the best firm for your organization:<\/p>\n<p><strong>1. Market Category Expertise \u2013 <\/strong>In a domain such as cyber security, where basic guidelines have yet to be fully implemented, dealing with a vendor that has a distinct level of market understanding becomes a key differentiator. Providers are able to better assist in ensuring compliance with mandatory industry and government security requirements. In addition, they are able to leverage industry specific proprietary intellectual property (IP) assets such as tools, software, platforms and key strategic alliances to create the best security methodologies and frameworks.<\/p>\n<p>As most of my initiatives are with healthcare organizations, ensuring patient safety and security is always a key concern. As access to patient sensitive information becomes exposed with the use of mobile devices, security is seen more as a risk to be proactively managed rather than an isolated activity driven by compliance needs or the resolution of previous security incidents. Having a true market category experience allows providers to demonstrate the ability to understand the clients\u2019 unique needs as such.<\/p>\n<p><strong>2. Diverse Industry Experience \u2013<\/strong> Servicing clients from various fields provides additional security intel and diverse experiences. Organizations in differing industries may have been exposed to certain cyber threats which may not have been previously considered while building a solution with a provider who only deals with one industry. Be sure to consider how the firm\u2019s experience lends credibility to its service capabilities. On the surface, take a look at certifications, references, and overall track record. In doing so, consider how the provider\u2019s experience can be applied to your organization, this includes assessing threats you are and aren\u2019t aware of.<\/p>\n<p><strong>3. Solution Scalability \u2014<\/strong> Providers should be able to provide a fully customizable solution which assures alignment with any organization wide security policies, resources and risks.<\/p>\n<p><strong>4. End to End Solution \u2014<\/strong> The supplier of choice should also offer a complete cyber security solution. Starting with features such as multi-factor authentication all the way to continuous security system audits. While it is advantageous to have a \u201cone-stop shop\u201d for multiple fraud prevention services, it is equally important for a provider to focus on the issues of compliance, integrity, vulnerability, and continuity through auditing. Receiving a unified solution can also simplify security where necessary by offering a single platform.<\/p>\n<p><strong>5. Change Leader \u2014<\/strong> As previously mentioned, cyber security is still an emerging area. Those providers heavily investing in new innovation services with a range of new products in the pipeline are those proactively managing future cyber security concerns.<\/p>\n<p>Ultimately, when selecting a managed security service provider, choose a provider you trust. While outsourcing the tactical tasks related to security can lessen the burden on internal resources, someone within your organization should still serve as the security \u201cowner\u201d or lead. Be sure to clearly identify the responsibilities for both your organization and the service provider. Finally, do your due diligence. Don\u2019t be shy when it comes to asking difficult questions or insist on facility tours to ensure the security provider can meet your needs.<\/p>\n<p><strong>Recommended Reading<\/strong><\/p>\n<p><a class=\"row-title\" href=\"https:\/\/www.certitrek.com\/nlpa\/blog\/fun-new-video-about-procurement-talent-management\/\" aria-label=\"\u201cFun, New Video About Procurement Talent Management\u201d (Edit)\">Fun, New Video About Procurement Talent Management<\/a><br \/>\n<a class=\"row-title\" href=\"https:\/\/www.certitrek.com\/nlpa\/blog\/supplier-diversity-training\/\" aria-label=\"\u201cNew Online Course Reflects Strategic Emergence of Supplier Diversity\u201d (Edit)\">New Online Course Reflects Strategic Emergence of Supplier Diversity<\/a><br \/>\n<a class=\"row-title\" href=\"https:\/\/www.certitrek.com\/nlpa\/blog\/preparing-your-supply-chain-for-the-unexpected\/\" aria-label=\"\u201cPreparing your Supply Chain for the Unexpected\u201d (Edit)\">Preparing your Supply Chain for the Unexpected<\/a><br \/>\n<a class=\"row-title\" href=\"https:\/\/www.certitrek.com\/nlpa\/blog\/sourcing-negotiations-where-is-the-line-between-too-hard-not-hard-enough\/\" aria-label=\"\u201cSourcing Negotiations:  Where Is The Line Between \u201cToo Hard\u201d &amp; \u201cNot Hard Enough\u201d\u201d (Edit)\">Sourcing Negotiations: Where Is The Line Between \u201cToo Hard\u201d &amp; \u201cNot Hard Enough\u201d<\/a><br \/>\n<a class=\"row-title\" href=\"https:\/\/www.certitrek.com\/nlpa\/blog\/resist-the-blame-the-supplier-knee-jerk-reaction\/\" aria-label=\"\u201cResist The \u201cBlame The Supplier\u201d Knee-Jerk Reaction\u201d (Edit)\">Resist The \u201cBlame The Supplier\u201d Knee-Jerk Reaction<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Special thanks to Source One Management Services for this guest [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":4070,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3487","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-procurement"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.4 (Yoast SEO v19.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security and Selecting a Provider - Next Level Purchasing Association (NLPA)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security and Selecting a Provider\" \/>\n<meta property=\"og:description\" content=\"Special thanks to Source One Management Services for this guest [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"Next Level Purchasing Association (NLPA)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NextLevelPurchasing\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-28T16:09:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T11:45:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/11\/nlpa-images-080.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"686\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Galo Matagay\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nextlevelpurch\" \/>\n<meta name=\"twitter:site\" content=\"@nextlevelpurch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Galo Matagay\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/\"},\"author\":{\"name\":\"Galo Matagay\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/72d094fab77892483dfa6e061cb27eaa\"},\"headline\":\"Cyber Security and Selecting a Provider\",\"datePublished\":\"2016-01-28T16:09:14+00:00\",\"dateModified\":\"2023-05-31T11:45:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/\"},\"wordCount\":669,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#organization\"},\"articleSection\":[\"Procurement\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/\",\"url\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/\",\"name\":\"Cyber Security and Selecting a Provider - Next Level Purchasing Association (NLPA)\",\"isPartOf\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#website\"},\"datePublished\":\"2016-01-28T16:09:14+00:00\",\"dateModified\":\"2023-05-31T11:45:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.certitrek.com\/nlpa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security and Selecting a Provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#website\",\"url\":\"https:\/\/www.certitrek.com\/nlpa\/\",\"name\":\"Next Level Purchasing Association (NLPA)\",\"description\":\"The Next Level Purchasing Association\",\"publisher\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.certitrek.com\/nlpa\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#organization\",\"name\":\"Next Level Purchasing Association (NLPA)\",\"url\":\"https:\/\/www.certitrek.com\/nlpa\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/08\/NLPA-logo-small-1.png\",\"contentUrl\":\"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/08\/NLPA-logo-small-1.png\",\"width\":149,\"height\":50,\"caption\":\"Next Level Purchasing Association (NLPA)\"},\"image\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/next-level-purchasing-association\/\",\"https:\/\/www.youtube.com\/channel\/UCrNZYjcLcaNA4xMKQHEGamw\",\"https:\/\/www.facebook.com\/NextLevelPurchasing\/\",\"https:\/\/twitter.com\/nextlevelpurch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/72d094fab77892483dfa6e061cb27eaa\",\"name\":\"Galo Matagay\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34d4be7be9c43eeb480e7e32739c2f3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34d4be7be9c43eeb480e7e32739c2f3f?s=96&d=mm&r=g\",\"caption\":\"Galo Matagay\"},\"description\":\"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean consequat rutrum ipsum quis iaculis. Duis non porta purus, tincidunt tristique mi. Cras eleifend tincidunt mollis. Aliquam egestas velit vitae interdum egestas. Aliquam vel lorem egestas lectus porttitor volutpat nec sit amet enim. Nullam bibendum vestibulum imperdiet.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security and Selecting a Provider - Next Level Purchasing Association (NLPA)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security and Selecting a Provider","og_description":"Special thanks to Source One Management Services for this guest [&hellip;]","og_url":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/","og_site_name":"Next Level Purchasing Association (NLPA)","article_publisher":"https:\/\/www.facebook.com\/NextLevelPurchasing\/","article_published_time":"2016-01-28T16:09:14+00:00","article_modified_time":"2023-05-31T11:45:50+00:00","og_image":[{"width":1600,"height":686,"url":"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/11\/nlpa-images-080.jpg","type":"image\/jpeg"}],"author":"Galo Matagay","twitter_card":"summary_large_image","twitter_creator":"@nextlevelpurch","twitter_site":"@nextlevelpurch","twitter_misc":{"Written by":"Galo Matagay","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/#article","isPartOf":{"@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/"},"author":{"name":"Galo Matagay","@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/72d094fab77892483dfa6e061cb27eaa"},"headline":"Cyber Security and Selecting a Provider","datePublished":"2016-01-28T16:09:14+00:00","dateModified":"2023-05-31T11:45:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/"},"wordCount":669,"commentCount":0,"publisher":{"@id":"https:\/\/www.certitrek.com\/nlpa\/#organization"},"articleSection":["Procurement"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/","url":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/","name":"Cyber Security and Selecting a Provider - Next Level Purchasing Association (NLPA)","isPartOf":{"@id":"https:\/\/www.certitrek.com\/nlpa\/#website"},"datePublished":"2016-01-28T16:09:14+00:00","dateModified":"2023-05-31T11:45:50+00:00","breadcrumb":{"@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/cyber-security-and-selecting-a-provider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.certitrek.com\/nlpa\/"},{"@type":"ListItem","position":2,"name":"Cyber Security and Selecting a Provider"}]},{"@type":"WebSite","@id":"https:\/\/www.certitrek.com\/nlpa\/#website","url":"https:\/\/www.certitrek.com\/nlpa\/","name":"Next Level Purchasing Association (NLPA)","description":"The Next Level Purchasing Association","publisher":{"@id":"https:\/\/www.certitrek.com\/nlpa\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.certitrek.com\/nlpa\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.certitrek.com\/nlpa\/#organization","name":"Next Level Purchasing Association (NLPA)","url":"https:\/\/www.certitrek.com\/nlpa\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/logo\/image\/","url":"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/08\/NLPA-logo-small-1.png","contentUrl":"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/08\/NLPA-logo-small-1.png","width":149,"height":50,"caption":"Next Level Purchasing Association (NLPA)"},"image":{"@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/next-level-purchasing-association\/","https:\/\/www.youtube.com\/channel\/UCrNZYjcLcaNA4xMKQHEGamw","https:\/\/www.facebook.com\/NextLevelPurchasing\/","https:\/\/twitter.com\/nextlevelpurch"]},{"@type":"Person","@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/72d094fab77892483dfa6e061cb27eaa","name":"Galo Matagay","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34d4be7be9c43eeb480e7e32739c2f3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34d4be7be9c43eeb480e7e32739c2f3f?s=96&d=mm&r=g","caption":"Galo Matagay"},"description":"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean consequat rutrum ipsum quis iaculis. Duis non porta purus, tincidunt tristique mi. Cras eleifend tincidunt mollis. Aliquam egestas velit vitae interdum egestas. Aliquam vel lorem egestas lectus porttitor volutpat nec sit amet enim. Nullam bibendum vestibulum imperdiet."}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/posts\/3487"}],"collection":[{"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/comments?post=3487"}],"version-history":[{"count":3,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/posts\/3487\/revisions"}],"predecessor-version":[{"id":17660,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/posts\/3487\/revisions\/17660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/media\/4070"}],"wp:attachment":[{"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/media?parent=3487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/categories?post=3487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/tags?post=3487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}