Episode 45 — Acquire resources with governance controls built into procurement decisions (2A3)

This episode explains how to acquire IT resources with governance controls embedded into procurement decisions so risk, compliance, and accountability are addressed before contracts are signed and systems are deployed. You’ll learn how governance influences procurement by defining required evidence, security and privacy requirements, service levels, audit rights, data ownership terms, and exit provisions that reduce lock-in and support resilience. We’ll cover how to evaluate vendor claims, how to ensure responsibilities are unambiguous, and how to prevent “procurement-only” decisions that ignore operational realities like integration support, incident response coordination, and ongoing control monitoring. Real-world scenarios include rushed purchases that bypass review, contracts that lack measurable outcomes, and vendors that cannot provide required control evidence after onboarding. For CGEIT, you’ll practice choosing answers that strengthen governance through defined procurement criteria, approval gates, and contract clauses that enforce controls and performance over time, not just at the moment of purchase. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 45 — Acquire resources with governance controls built into procurement decisions (2A3)
Broadcast by