article thumbnail

Your procurement compliance and risk management checklist

Bonfire

Keep reading for a checklist to help you optimize procurement compliance and internal risk management. Compliance and risk management is a team effort Procurement compliance and risk management doesn’t just fall to the procurement department—it’s everyone’s responsibility.

article thumbnail

Dodging the Urban Doom Loop

Art of Procurement

In the book “Good to Great,” Jim Collins wrote about the flywheel effect, a prosperous cycle of work and adjustment. The post Dodging the Urban Doom Loop appeared first on Art of Procurement.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Laws of Supply and Demand Meat at Tyson Foods

Art of Procurement

In his book, An Inquiry into the Nature and Causes of the Wealth of Nations, Scottish Enlightenment thinker Adam Smith. The post The Laws of Supply and Demand Meat at Tyson Foods appeared first on Art of Procurement.

Demand 128
article thumbnail

Mobile Security – A Requirement for National Security (E166)

FedInsider

In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. To view this webinar: Mobile Security: A Requirement for National Security. Those titles, Exploring Microsoft Office and Guide to Webcams enjoyed both commercial success and reviewer acclaim.

article thumbnail

Shift Your Security Approach

GovLoop

A risk management approach: IT leaders need to know what the threats are and where they come from. This applies to identity management, too: understanding how personal attributes are assigned and validated. “It It all comes down to risk management,” Nielsen said. Favorite

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

Prior to joining August Schell, John served as DISA’s Cyber Security Risk Management Executive and Chief Information Officer. Murphy previously provided cybersecurity and mission assurance serving as the Information System Owner and Program Manager for the Coast Guard’s Combat Management System. Army War College.

article thumbnail

Emerging Technology Series: Cybersecurity

FedInsider

In addition to his normal writing, Breeden has authored two technical how-to type computer books published by Prompt Publications. He oversees risk management and cybersecurity accountability for information systems, weapon systems and operational technology supporting military cyberspace operations.