This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Federal agencies have long followed the National Institute of Standards and Technology’s Risk Management Framework for Information Systems and Organizations to help agencies select the appropriate safeguards related to cybersecurity, privacy and supply chain risk management. A key component of how agency IT officials assess risk and deploy new information systems is an authorization to operate, or ATO.
By its definition, “data” are individual facts, statistics or items of information. They’re cold and faceless and, on their own, do little to explain what they represent. For instance, the census says what percentage of people in a given area fall within low-income brackets, but the numbers don’t explain why or describe that population’s daily realities.
“The average person has 6,200 thoughts a day, and probably about 5,000 of those are going through your head in. The post [Pod] Magic v. Logic: The Power of Storytelling w/ Simon Geale appeared first on Art of Procurement.
Originally published on Risk Management Monitor. Essentially every company that manufactures goods today depends on other companies to supply the raw or value-added materials that go into their finished products. Most companies recognize that good supplier relationships are more than simply arm’s length transactions between opposing parties. A better way of looking at those relationships is as partnerships—albeit ones that require management and alignment of objectives first and foremost, but ul
Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader
Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,
In the world of classified information, you need people on the inside — actual humans who can find the best information and get it to you efficiently and without a lot of drama, people who have proved to be trustworthy and excellent at their jobs. In the world of information technology associated with classified information, it’s much the same. The intelligence community (IC), much like the rest of the federal government, is beginning to rely more on third-party providers of IT solutions rather
Do you know what will differentiate you from being just an employee to a good employee? The answer is both simple and complex. “What makes a good government employee isn’t that different from what makes a good employee, period. But we do have a necessity to have a passion for public service,” said Traci DiMartini, Chief Human Capital Officer for the General Services Administration (GSA).
Procurement 6 is a new short podcast from Art of Procurement that will be published in the Art of Procurement. The post [Pod] Procurement 6 – September 09, 2022 appeared first on Art of Procurement.
Procurement 6 is a new short podcast from Art of Procurement that will be published in the Art of Procurement. The post [Pod] Procurement 6 – September 09, 2022 appeared first on Art of Procurement.
The global industrial minerals group will deploy Ivalua’s Spend Management platform across five continents to digitize the Source-to-Requisition (S2R) process. Redwood City, CA, September 7, 2022. Ivalua, a global leader in spend management , today announced that Imerys, a multinational company specializing in industrial minerals solutions , has chosen Ivalua to streamline its indirect and direct spend management processes.
If you’re on the list of 30 Federal IT Influencers Worth a Follow in 2022, spread the news and grab our IT influencer images for your social media pages or websites. Below you will find a header image for your Twitter profile, a profile picture for your social media pages and a social object to share on your social media pages. Please be sure to tag @FedTechMagazine when you post!
While the technology that agencies buy has changed considerably in recent years, the process of buying it, not so much. Especially as governments move more functions to the cloud, traditional procurement systems can be slow and inefficient. Where once both hardware and software could be budgeted as one-time purchases, cloud-based solutions require ongoing contracts that need a maintenance-style budget.
Earlier this year I was joined on The SourcingHero podcast by Thomas Siersbæk Heller-Njor. He is currently the Founder and. The post Getting the ‘People Part’ Right: A Sourcing Hero Conversation with Thomas Siersbæk Heller-Njor appeared first on Art of Procurement.
Approximately 250,000 public authorities in the European Union spend 2 trillion pounds or 14 percent of the Gross National Product purchasing works, services, and supplies. Oftentimes, public authorities buy services such as energy, transport, social protection, waste management, and health or educational services from private entities. When the government purchases goods and services from private businesses, the process is known as public procurement.
Most people understand that when devices connect to networks, they can become a security risk. But think about the large digital displays many agencies use to direct visitors and share information with employees. While not traditional devices, these displays must still be protected when they connect to networks. “Anything with an IP address is suspect,” said Mike Bahniuk, Director of Federal at Samsung, an electronics and IT solutions provider.
Federal agencies received a going-away present from 2021 as the year came to a close — the discovery of the Log4j vulnerability, possibly present in thousands of commercial off-the-shelf products and a sign that the cybersecurity environment continued to bear watching. As 2022 rolled on, the federal government and its private sector partners worked through the possibility of Russian cyberattacks, continuing IT supply chain delays and deadlines to comply with White House executive orders on cyber
Fact checked by Eddie Regan, BiP Solutions Principal Procurement Consultant Almost a full third of UK businesses do not have an inclusivity and diversity strategy. There are gains that you can make here, both for the sake of ethics and to make strides in sustainability in business. At first glance, diversity and sustainability might not seem connected – this is not the case.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content