For most companies the traditional procurement model is no longer sufficient, and operating with those tenets will not bring optimal results. The non-employee labor industry is changing,...
Browse the SRC
The journey to enterprise-wide transformation with intelligent automation
When it comes to procurement and sourcing – and the end-to-end Source-To-Pay (S2P) spectrum – it is a perfect place...
Resource Origin: IBM Security and Ponemon Institute
"IBM Security and Ponemon Institute are pleased to release the 2019 Cost of a Data Breach Report. Based on in-depth interviews with more...
Contracting in the New Economy
Join us to learn from University of Tennessee Faculty, Graduate and Executive Professor, Kate Vitasek,...
Original Source: Ponemon Institute
"This is the 15th year the Ponemon Institute has conducted the research to produce the annual Cost of a Data Breach Report, including the past five years...
Learn the skills and strategies necessary to negotiate sourcing transactions. Choosing the right negotiation tactics can be intimidating or even overwhelming, but to ensure you're getting proper...