Utilizing external resources for highly technical information security tasks allows an information security manager to: