Resource Origin: IBM Security and Ponemon Institute
"IBM Security and Ponemon Institute are pleased to release the 2019 Cost of a Data Breach Report. Based on in-depth interviews with more...
Resource Origin: IBM Security and Ponemon Institute
"IBM Security and Ponemon Institute are pleased to release the 2019 Cost of a Data Breach Report. Based on in-depth interviews with more...
Original Source: Ponemon Institute
"This is the 15th year the Ponemon Institute has conducted the research to produce the annual Cost of a Data Breach Report, including the past five years...
No two procurement ecosystems are alike. Therefore, no two procurement organizations will take exactly the same path in transforming themselves for efficiency, strategic focus, and ongoing growth...
In this session, attendees will learn how American Honda restructured their entire procurement function, moving from a decentralized model, into "one simple process, one simple policy, and one...
Our story is that of a small but fiercely determined team leading the reorganization of Honda’s indirect procurement function amidst the largest total restructuring effort in company history … and...
For decades, sourcing and IT leaders have adapted to a fluctuating solution landscape. The presenter will discuss how AI and automation accelerate that dynamic market in this session. The key is...