Manage Learn to apply best practices and optimize your operations.

Compliance and offshoring best practices: Expert podcast

Outsourcing to an offshore company doesn't mean you can forget about compliance regulations. Forrester's Khalid Kark offers tips on how to offshore and still be in compliance.

Offshore outsourcing for large companies can be cost-effective and transparent if properly planned and managed. Keeping up with compliance regulations, monitoring procedures and maintaining consistent management among all parties involved can be challenging for the CIO. In this podcast, Forrester Research Inc.'s Khalid Kark offers five best practices for CIOs to meet and maintain compliance regulations when outsourcing offshore.

ABOUT KARK: Kark is a leading expert in security management, compliance, best practices and services at Cambridge, Mass.-based Forrester. His research focuses on helping organizations make their information security programs more effective by aligning them with the business objectives while appropriately managing information security risks. Prior to Forrester, Kark consulted large global corporations in the telecom, health care, finance and entertainment industries on information security engagements. Download one of Kark's related research reports on security and privacy essentials for IT outsourcing deals.

Play now:
Download for later:

Compliance and offshoring best practices for CIOs

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As
This was last published in June 2008

Dig Deeper on Managing compliance teams

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

SearchSecurity

Close