This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Laura Stanton, assistant commissioner in the GSA Office of Information Technology Category, said in a statement that the GMAS program exemplifies how collaboration with industry can drive innovation and deliver significant value to government and taxpayers alike.
Comprehensive knowledge of critical infrastructure and real-time updates to assets and critical end-use loads drives the need for an agile data model capable of integrating disparate data types and maintaining an evergreen information baseline.
Manufacturers need better supplier information. The need for better supplier information stood head and shoulders above the next group of issues, which included improving internal stakeholder and supplier collaboration, getting more value from suppliers, fostering more powerful innovation and optimizing cost management programs.
With this visibility into risk, companies can then make informed decisions to reduce their exposure. One that takes a portfolio view of category supply risk. Supplier riskmanagement too often focuses on evaluating the risk level of each supplier and selecting lower risk ones when possible.
Ivalua’s Risk Center offers customers a holistic solution to actively monitor and mitigate third-party risk and compliance. This combined picture is visible in actionable dashboards to provide a comprehensive and timely picture of risk and the potential impact on the business.
Today, SOCs leverage advanced Security Information and Event Management (SIEM) solutions that integrate data from multiple sources, enable real-time intrusion detection, automate key security processes, and provide intuitive incident visualization. National Institute of Standards and Technology, Information Technology Laboratory.
Approach: The new director of the procurement agency led the development of a data-driven corruption risk monitoring system and worked with a reform team to strengthen the institutional capacity of government buyers, improve cross-agency coordination and increase collaboration with civil society.
To unlock AI’s full potential and ensure it is deployed responsibly, we need regulatory guardrails that are informed by real-life use cases,” he said in a statement. financial system or create a national security risk; and how it is consistent with obligations under anti-money laundering and countering the financing of terrorism rules. “We
Manufacturers need better supplier information. The need for better supplier information stood head and shoulders above the next group of issues, which included improving internal stakeholder and supplier collaboration, getting more value from suppliers, fostering more powerful innovation and optimizing cost management programs.
Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & Project Manager Alper Kerman is a security engineer and project manager at the National Cybersecurity Center of Excellence (NCCoE), NIST. Murphy held the position of Senior Information Security Officer as a Captain in the United States Coast Guard.
Additional goals called out in the memo include leading an information security program grounded in technical expertise and riskmanagement, increasing the marketplace rapidly through offering additional authorization paths, and leveraging shared infrastructure in public and private relationships.
The first goal listed in the new memo is for FedRAMP to “lead an information security program grounded in technical expertise and riskmanagement.” Gerhardt said the team behind the guidance “heard loud and clear” from public comments the desire to incorporate AI into the program.
Agencies released the two proposed cybersecurity rules for information and communications technology (ICT) contractors last fall. Just some checks and balances, so we’re doing this in a collaborative manner, we’re taking a riskmanagement approach to cybersecurity, both for the government and for the contractor,” Schneider said.
Later this year, the CESER office will convene with big cloud service providers and the clean-energy sector to collaborate on cybersecurity requirements. GAO said DOT needs a strong cyber riskmanagement plan to address threats to its data and systems. There is no information yet as to where Costa will be working next.
GSA also consistently pointed to TDR data management as an effective tool in addressing security issues, including supply chain riskmanagement. The results also showed significant improvement in the completeness of the data and its overall use by contracting officers.
Cross-departmental collaboration and scalable solutions are important to maximizing ROI and adapting to changing citizen demands within budget constraints.” He offers this purchasing example: “Using cooperative contracts for government IoT technology procurement offers significant benefits in cost savings, efficiency, and riskmanagement.”
The cloud is integral to digital engineering by supporting collaboration across geographically dispersed organizations, automating workflows for data connectivity and trade space analysis in a reliable, scalable, and cost-effective manner. Unfortunately, current cybersecurity practices and tools are often disconnected from IT infrastructure.
As teams worked with suppliers through creative solutions, it became obvious that transparency and supplier riskmanagement are essential components to maintain stability during crises like these. The pandemic saw incredible growth in this area and highlighted opportunities for improvement within procurement processes and procedures.
The new set of regulations add an additional layer of compliance and riskmanagement to the procurement process. These extra steps may require additional resources and expertise, and more sophisticated technologies and tools to better manage the process. The post What does the German Supply Chain Act Mean for Procurement?
First of all, to really make the most of what your suppliers can offer, you need to manage the basics of supplier management well. That means supplier master data management; spend and contract analytics; riskmanagement and so on. Blog first published by our friends at Procurious.
Featured Speakers: La’Naia Jones × La’Naia Jones Chief Information Officer & Director, ITE As the Agency’s Chief Information Officer (CIO) and the Director of the Information Technology Enterprise (D/ITE), La’Naia J. Most recently, Ms. Jones as the Acting CIO of the Intelligence Community (IC).
Obviously, these methods of capturing and recording data have limitations, and these limitations can hamper decision making in several ways, and ultimately impact the management and resilience of the organizations supply chain. Some of these challenges include limited: Ability to collaborate, identify opportunities or issues and act.
This article will delve into the best practices for mitigating risks and ensuring smooth collaboration with your subcontractors. Understanding the Importance of Subcontractor Management Effective subcontractor management is crucial for the success of government contracts.
There are now many thousands of cloud-based services that Federal agencies could use to serve the American people, including tools for enterprise collaboration, product development, and improving an enterprise’s own cybersecurity,” reads a blog post from OMB on the draft guidance. It’s going to inform the policy.”
Develop a robust reporting framework to keep all parties informed of project progress and milestones. Learn about our 0-60 Government Contracting in a Capsule course RiskManagement in OTA Engagements While OTAs offer many benefits, they also come with unique risks that contractors must carefully manage.
Brian Friel , Co-Founder, BD Squared (confirmed) Kevin Plexico , Senior Vice President, Information Solutions, Deltek (confirmed) David Taylor , Founder & CEO, Federal Budget IQ Cybersecurity, Cloud, & AI Panel: What’s Next for the Federal Market?
Brian Friel , Co-Founder, BD Squared (confirmed) Kevin Plexico , Senior Vice President, Information Solutions, Deltek (confirmed) David Taylor , Founder & CEO, Federal Budget IQ (confirmed) The Evolving Federal Landscape of AI: What’s Next?
Improving sourcing cycle time is critical, as is having the right information in place to navigate around roadblocks and mitigate risk. Collaboration skills. Collaboration needs to become part of your culture. Collaboration needs to become part of your culture. Riskmanagement.
A checklist guide to getting the most out of your supplier riskmanagement program. This reliance can increase supplier risk or uncover a large source of value and supplier innovation for organizations. . Employ more structured processes around supplier riskmanagement. Evaluate and manage supplier performance.
Redwood City, CA – October 26, 2020 – Ivalua, a leading global spend management cloud provider, and Consus, a leading global supply chain solutions provider, today announced that Jollibee Foods Corporation (JFC) has successfully deployed Ivalua’s platform to empower its procurement digital transformation, with Consus leading implementation.
Originally published on RiskManagement Monitor. A better way of looking at those relationships is as partnerships—albeit ones that require management and alignment of objectives first and foremost, but ultimately mutually beneficial relationships. Structure a plan to gather complete information about all your suppliers.
Even reducing costs often depends more on effective collaboration rather than negotiation in today’s market. At the same time, organizations have never been more exposed to risk from their supply chains, from supply continuity, quality, or ESG violations. Effective riskmanagement or improvement plans must include sub-tier suppliers.
In doing so, they have improved supplier collaboration and created a greater capacity for resilience, innovation, and continuous improvement. . How do these organizations build their supplier management programs? SRM Governance : Formal governance structure and roles clarify supplier interactions and internal collaboration.
A great example is Meritor , who brought a unique approach to supplier collaboration and new product introductions to life, delivering more products at higher profit to support a board level initiative and multiply their stock price. Digitize to enable effective collaboration across more suppliers and categories.
The most fundamental spend categorization in Procurement is the line between direct and indirect spend, but one effort that transcends this split is supplier management. This includes supplier informationmanagement, supply chain riskmanagement/mitigation, and supplier performance management.
Obviously, these methods of capturing and recording data have limitations, and these limitations can hamper decision making in several ways, and ultimately impact the management and resilience of the organizations supply chain. Ability to collaborate, identify opportunities or issues and act. Risk & Performance Management.
Seasoned practitioners in public procurement can be jaded from situations that have gone wrong, and it is common for inexperienced public buyers to experience risk aversion and fear of the unknown. Additionally, a simplistic risk transfer strategy may reduce market interest, and the number of bids submitted.
Such broad priorities require new supplier strategies, new information and a delicate balancing act between competing objectives. Collaborate to Win Henry Ford’s quote that “coming together is a beginning, keeping together is progress, working together is success” has never rang more true. The same applies internally.
During lunch, we will hear Keynote remarks from Pat Flanders , DHA Chief Information Officer (CIO) on his current priorities and initiatives as CIO and how industry can best support them.
Im going to keep pressing that technology onto them so they can truly grasp what I believe, and what Air Force Research Lab Chief Information Officer Alexis Bonnell believes is the never-ending capability. That, I think, is the soul of the collaboration, and its just been really key to not being afraid to dig in.
Much like how Chief Information Officers and Chief Financial Officer’s roles are evolving, the CPO role is now expected to go above and beyond the traditional role architecture. Challenges in this new manufacturer/supplier partnership Burton cites include: Riskmanagement. Today this rarely exists.
Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & Project Manager Alper Kerman is a security engineer and project manager at the National Cybersecurity Center of Excellence (NCCoE), NIST. His portfolio included mobility, networks operations, cybersecurity, and innovation. Army War College.
He had taken on a few leadership roles in Flex such as Procurement Compliance Director, led the Global Sourcing team, and is currently member of Flex Supply Chain Council and Supply Chain RiskManagement. For more information and to register visit the event website. Ivalua will be represented by: Eric Seah, Sales Director.
Additionally, these considerations give light to the importance of using accurate regulatory oversight to reduce potential risks associated with procurement where there are national security concerns and executive agencies. Ensures that AI systems align with data protection laws and ethical AI standards.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content