Using a Managed Security Service Provider in 2020: Everything You Need to Know

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Despite the maturity of the managed security services provider (MSSP) market, security professionals and vendors often fail to sync up as true, successful partners. Whilst the role of the MSSP has been called into use in recent months as a result of managed services being required for a largely remote workforce, the MSSP is also needed when a company has weaknesses in its defense.

In this webinar, we will consider how MSSP relationships work, explore how MSSPs are being effectively used and assess what services they are (or should be) offering in the new decade.

Key takeaways:

  • Where an MSSP can aid your team’s strengths and weaknesses
  • How to choose an MSSP that works for you and your security program’s capabilities and limitations
  • How to manage an MSSP relationship, and what you should expect from MSSPs
  • Where an MSSP can aid you in a time of business continuity


Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Becky Pinkard

Becky Pinkard

CISO, Aldermore

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Infosecurity Magazine here: Please see Infosecurity Magazine’s privacy policy for more information.