Watch this video on YouTube
What is the most important process that an information security manager needs to negotiate with an outsourced service provider?