Today’s interactive workshop is focused on tackling the unique and most difficult challenges associated with establishing, negotiating and optimizing next generation...
Browse the SRC
When you are faced with a project that has a totally unrealistic timeline, a Scope of Work that lacks definition, or an infrequently sourced service industry what do you do?
...
Getting hacked is now a matter of when, not if. As a result, the ability to detect and respond to attacks before significant damage is done has become one of the most important issues in...
An ultimate goal of Procurement is to become a trusted advisor and partner to the business. Marketing is traditionally one of the most difficult category areas in which to achieve this. At NTT...
News stories about major data breaches have become increasingly common. Companies that are suffering from these breaches range from small startups to major multi-national corporations and even...
Sourcing professionals negotiate on a daily basis…none of the parties want to be taken advantage of…and all are aiming to win. These dynamics sometimes make negotiations difficult. Negotiations...
Topics include:
- Why is Third-Party Management Important?
- Regulation has evolved considerably since 2005
- The Changing Face of Third-Party Risk
- Third-Party...
No network has perfect security. What often makes the difference between a minor low-cost incident and an expensive crisis is how prepared an organization is to deal with the aftermath of a breach...
The goal of this report is not only to demonstrate the impact of today’s threats against every kind of organization around the world, but also to make cybersecurity personal, interesting, and...
Cyber-attacks are as unique as the attackers behind them and the organizations they target: both attackers and the targeted organizations have different objectives. Given the growing systemic...