As procurement programs mature many of the traditional performance metrics and job descriptions will begin to change. This is specifically true at Bell where we are now being asked to complete and...
Browse the SRC
The following links are resources from the 2016 Montreal Regional Meeting.
This presentation explains about how to find a vendor management technology or managed services vendor. It includes tips to engage a vendor that can leverage technology and required elements to...
Bell Canada | HCMWorks
The session presenters will discuss the lessons learned around the "next evolution” (and the larger spend), of Indirect Procurement; which they have...
Resource Origin: IBM Security and Ponemon Institute
"IBM Security and Ponemon Institute are pleased to release the 2019 Cost of a Data Breach Report. Based on in-depth interviews with more...
Original Source: Ponemon Institute
"This is the 15th year the Ponemon Institute has conducted the research to produce the annual Cost of a Data Breach Report, including the past five years...
SIG and our research partners have developed a study of data related to compensation in sourcing, procurement and risk roles. These data were collected from our community, from our partner...