Transferring risk to third parties

  • Buying cybersecurity insurance
  • Outsourcing IT systems