article thumbnail

The Singapore Outsourcing Register: Obstacles and Suggestions to Meet this Regulatory Requirement from a Risk Management Perspective

SIG Speaks

SIG University Certified Third-Party Risk Management Professional (C3PRMP) program graduate William Chanto Castro shares the tricks to overcoming the obstacles to meeting risk regulations and requirements. MAS, 2016, p.9). Two of the most common ones are Ariba and Coupa.

article thumbnail

NIST PQ: “Lattice” Pick A Winner

Forrester Digital Transformation

After an evaluation process that began with a call for nominations in 2016 and culled dozens of potential post-quantum (PQ) cryptographic algorithms down to seven finalists and […]. Happily, they have.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Establishing a Third-Party Risk Management Program

SIG Speaks

SIG University Certified Third-Party Risk Management Professional (C3PRMP) program graduate Lois Peric shares the essential components for building a third-party risk management program. There are essential components when establishing a third-party risk management program in an organization where none exists.

article thumbnail

3 Ways Sourcing Professionals Can Proactively Address Risk

Sarah Holliman

According to Resilinc’s Eventwatch report , nearly 2,000 supply chain events took place in 2017, representing a 30 percent increase over 2016. Between 2014 and 2016, Yahoo had several colossal breaches that (they ultimately reported) impacted all 3 billion of its records. Data breaches provide a good example.

Sourcing 100
article thumbnail

If IT Is from Mars, Procurement Is from Venus: 5 Steps to Break the Chasm between IT and Procurement for IT Sourcing

Everest Group

Growth in IT spend from 2016-2022, including hardware, software, and services spend (2021 and 2022 spend values are estimates). Back each other in times of crisis : While risk management has become key in today’s day and age, occasionally, there are crises that no one can predict. Source: Statista (2021).

Sourcing 130
article thumbnail

Exploring the Importance of Post-quantum Cryptography: An Unbreakable Vault to Protect Enterprises Against Advanced Cyberattacks, Part 2 | Blog

Everest Group

Department of Commerce’s National Institute of Standards and Technology (NIST) launched a program in 2016 to create standardized quantum-safe cryptographic algorithms. Chief Information Security Officers (CISOs) and Chief Revenue Officers (CROs) must ensure that quantum risk mitigation is integrated into existing risk management strategies.

article thumbnail

Big Data (Brother) is Watching.and Listening Too.

Sarah Holliman

In a Gartner survey performed in October 2016, 48% of companies indicated that they have a Big Data initiative currently underway, with another 25% who stated they had plans on the horizon. Nearly five years ago I wrote a blog about Big Data and how it could be relevant for sourcing and supply chain professionals. What do you think?