Outsourcing vs. Internal cybersecurity manager: Pros and cons

Bearded male engineer using computer with blueprints on screen in office
The new Cybersecurity Act (according to the NIS2) defines the security roles that companies must have, depending on whether they fall under a higher or lower regime of obligations. The question is: Who should fill these roles? An internal person or an external contractor? The decision is not easy and depends on the type of company, its size, industry, and current capacities. In this article, we will focus on the most complex role – the cybersecurity manager.

Security roles according to regimes

Higher regime: Organizations in the higher regime are required to fill the following roles: cybersecurity manager, cybersecurity architect, cybersecurity auditor, and asset guarantors. These roles are organizational measures, and their detailed responsibilities are specified in the decree on security measures in the higher regime.
Lower regime: Companies that meet the criteria for the lower regime must have: a person responsible for cybersecurity (and asset guarantors). Although asset guarantors are not explicitly mentioned as a mandatory security role in the lower regime, they are indispensable for effective asset management and should not be overlooked. The role of the responsible person is specified in the decree on security measures in the lower regime.

Cyber Security Manager

A cybersecurity manager is responsible for setting up, maintaining, and developing a cybersecurity system. They set security measures, communicate with management, manage the information protection system, set rules, and ensure that they are followed. In practice, this often involves a combination of strategic and operational work, from policy development to incident response.

They need to understand the processes in the organisation, understand the company's risks and be able to communicate across departments. They also have the role of "translator" – they can translate technical requirements into business language and vice versa. If this does not work, the system may exist "on paper", but in reality no one is interested in it and therefore it does not work.

Why an internal employee?

An internal cybersecurity manager can become an important part of corporate decision-making and leadership. They know the environment, processes, and people. If they are in the right position and have trust, they can grow with the company and increase its resilience in the long term. They are particularly suitable where cybersecurity is a continuous part of management, not just a one-off project.

Benefits

Disadvantages

Training for cyber managers

Want to grow as a cybersecurity manager? Sign up for a 3-day workshop in Prague (October 22 to 24). You'll learn the basic framework, procedures, and tools that come with this position.

When is outsourcing reasonable?

An outsourced manager brings experience from multiple environments. They can quickly get their bearings, set priorities, and avoid dead ends. They also have perspective, and to a certain extent , not being burdened by internal culture can be an advantage.

In practice, outsourcing involves a company "hiring" an external expert or team to perform the role of cybersecurity manager on a contract basis (for example, two days a month or as needed).

Benefits

Disadvantages

Which option should you choose?

The internal role of cybersecurity manager is suitable for companies that have:

  • a high amount of security tasks,
  • complex infrastructure,
  • a need for continuous development of a security culture,
  • a sufficient budget for a high-quality expert.
Outsourcing is ideal for companies that:
  • have a limited budget,
  • need to quickly meet legislative requirements (e.g., the new NIS2 law), 
  • are looking for a part-time expert, 
  • want an independent audit and an outside perspective.

In many cases, a "temporary" solution has proven successful – an external manager sets the foundation, helps the company navigate the new requirements and the entire system, and train an internal personwho will take over the role. The advantage is that you gain both the system and the knowledge.

Example: : An IT services startup hired an external cybersecurity manager for six months. During that time, a risk analysis was conducted, security policies were created, and preparations for ISO 27001 began. In the meantime, an internal employee was trained, gradually becoming involved in the preparations, and after six months took over the role of cybersecurity manager.

How much does a cybersecurity manager cost?

The decision should not be based solely on money, but budget obviously plays a role. For smaller companies, it is often more advantageous to use an external form, where you buy a specific result and do not have to deal with recruitment. You should include this basic cost package in your calculation:

  • An internal manager = fixed costs (salary, benefits, training) 
  • An outsourced manager = costs based on scope (e.g., 3 days per month, project-based) 

What the cybersecurity Act says

Companies subject to higher obligations will have to appoint a cybersecurity manager. Although this obligation does not apply to companies subject to lower obligations, they must still clearly designate a person responsible for cybersecurity who will perform similar tasks, although to a lesser extent.

The Act does not require the cybersecurity manager to be an internal employee. They may be an external contractor, but it is important that they have:

  • clearly defined roles and responsibilities, 
  • access to information within the company, 
  • management support,
  • appropriate knowledge and experience.

Be aware of formal "outsourcing" just for the sake of having the title of cybersecurity manager somewhere on paper. If the cybersecurity manager has no real influence on setting up the information security system and managing cybersecurity, it is a worthless piece of paper and often a problem during inspections or audits.

How to decide?

Each option has its pros and cons. It is important to know what you expect from the role – and choose accordingly. A cybersecurity manager is not a technician. It is a strategic role that connects security with business..

The best solution is often not black and white. In many cases, it makes sense to start externally and gradually prepare the role internally so that the company can identify with it and continue to work with it. When deciding:

We offer role outsourcing

Nemáte vlastní tým? Zajistíme pro Vás zkušeného manažera, architekta i auditora kybernetické bezpečnosti.

More articles

Real incidents from 2025 showed us that cybersecurity problems aren’t caused only by hackers. Sometimes, ordinary process and human failures are all it takes.
Dealing with the new Cybersecurity Act at the last minute and looking for answers? We’ve answered the most common questions to help you understand the new obligations and figure out what actually applies to you.
Does the new Cybersecurity Act apply to you and you are trying to figure out how to report your regulated services? Here’s a step-by-step guide to help you meet this obligation.

Newsletter

Do you want to ensure your company is protected from cyber threats while also complying with applicable legislation? Sign up for our newsletter and receive practical advice from our legal consultants.

By clicking subscribe you consent to the processing of your personal data for marketing purposes.