There is a new "Digital Divide" in the world of Procurement - a chasm between "world-class" organizations proactively leveraging transformational digital technologies to increase agility, enhance...
Browse the SRC
In this session, you will learn how to identify and group unstructured data to better leverage your tail spend yielding actionable insights that can provide savings, risk avoidance and a better...
For a procurement, sourcing, travel function to thrive and be relevant it must focus on valued business outcomes. The compliance role needs to be balanced. In keeping with that mindset, don't...
Original Source: Steele Global
"This paper will address issues of concern, including:
- Lawful Bases for Processing Personal Data Under GDPR
- Applications of Lawful Bases...
Original Source: Steele Global
"Five practical steps to overcoming the challenges of implementing a risk-based third-party program..."
Original Source: ITIL / Wikipedia
"ITIL (formerly an acronym for Information Technology Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses...
Original Source: Wikipedia / CMMI
"Capability Maturity Model Integration (CMMI) is a process level improvement training and appraisal program. Administered by the CMMI Institute, a...
Original Source: Fair Institute by Rachel Slabotsky
"I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they...
Original Source: Reciprocity WRITTEN BY KAREN WALSH
"PCI DSS compliance comes with over 100 pages of requirements. However, the Appendices offer ways to think about how you can limit your...
Original Source: Advocate Daily
"New causes of action for breach of privacy make data breach one of the most significant risks facing Canadian companies — but organizations may have an...