article thumbnail

The Singapore Outsourcing Register: Obstacles and Suggestions to Meet this Regulatory Requirement from a Risk Management Perspective

SIG Speaks

SIG University Certified Third-Party Risk Management Professional (C3PRMP) program graduate William Chanto Castro shares the tricks to overcoming the obstacles to meeting risk regulations and requirements. MAS, 2016, p.9). Two of the most common ones are Ariba and Coupa.

article thumbnail

Establishing a Third-Party Risk Management Program

SIG Speaks

SIG University Certified Third-Party Risk Management Professional (C3PRMP) program graduate Lois Peric shares the essential components for building a third-party risk management program. There are essential components when establishing a third-party risk management program in an organization where none exists.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Building an award-winning global community of risk champions – with Alexander Larsen, Peter Smith and Vladislav Kulakovsky

Risk Guide

Performing cohesive risk management across different sites is never an easy task, but when the operations of those sites include a multitude of different specialists and technicians, this amplifies problems. The result was an award for best risk communication initiative at the MEA Risk and Insurance Excellence Awards 2016.

article thumbnail

3 Ways Sourcing Professionals Can Proactively Address Risk

Sarah Holliman

According to Resilinc’s Eventwatch report , nearly 2,000 supply chain events took place in 2017, representing a 30 percent increase over 2016. Between 2014 and 2016, Yahoo had several colossal breaches that (they ultimately reported) impacted all 3 billion of its records. Data breaches provide a good example.

Sourcing 100
article thumbnail

Big Data (Brother) is Watching.and Listening Too.

Sarah Holliman

In a Gartner survey performed in October 2016, 48% of companies indicated that they have a Big Data initiative currently underway, with another 25% who stated they had plans on the horizon. Nearly five years ago I wrote a blog about Big Data and how it could be relevant for sourcing and supply chain professionals. What do you think?

article thumbnail

Exploring the Importance of Post-quantum Cryptography: An Unbreakable Vault to Protect Enterprises Against Advanced Cyberattacks, Part 2 | Blog

Everest Group

Department of Commerce’s National Institute of Standards and Technology (NIST) launched a program in 2016 to create standardized quantum-safe cryptographic algorithms. Chief Information Security Officers (CISOs) and Chief Revenue Officers (CROs) must ensure that quantum risk mitigation is integrated into existing risk management strategies.

article thumbnail

Is Outsourcing Offshore Right for You? Pros and Cons

Magellan Solutions

In 2016, it also outsourced some IT tasks. Combining onshore and offshore resources in hybrid outsourcing models offers businesses advantages in control, visibility, and risk management while allowing them to benefit from cost savings and the specialized expertise of offshore outsourcing.