Negotiating Cloud Security Requirements with Vendors
California State University,
Fullerton, California
CONTENTS
19.2 Structure-centric negotiation
19.3 Strategy-centric negotiation
19.4 Process-centric negotiation
19.5 Behavior-centric negotiation
19.1 INTRODUCTION
Organizations of all kinds are increasingly adopting cloud-based services to meet their information technology needs. In the wake of many very visible and embarrassing information security breaches, organizations are also increasingly aware of security-related issues with respect to their information assets. The simultaneous rise of these two phenomena ...
Get Cloud Computing Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.