Remove Networking Remove Risk Management Remove Strategic Sourcing
article thumbnail

What is Strategic Procurement, and How Can Cooperative Purchasing Help?

American City & Country

Strategic procurement is more than just buying goods and services—it’s about creating value, optimizing resources, and aligning purchasing decisions with organizational goals. In this blog, we’ll explore key best practices and show how leveraging group/cooperative purchasing can help you master the art of strategic sourcing.

article thumbnail

Supplier Risk and Performance Management

ivalua

A checklist guide to getting the most out of your supplier risk management program. This reliance can increase supplier risk or uncover a large source of value and supplier innovation for organizations. . Employ more structured processes around supplier risk management. Drive competition and achieve savings.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI effort to improve contractor performance ratings stalls

Federal News Network

The results of the pilot will be helpful as we evaluate security considerations regarding access and as we consider ways to leverage AI with appropriate risk-management safeguards as envisioned by Executive Order 14110, OMB Memorandum M-24-10, the AI in Government Act and the Advancing American AI Act.”

article thumbnail

Friday Flash 09/20/2024

The Coalition for Government Procurement

Meet with internal counsel beforehand- It is critical to engage with counsel to assure that your plans are sound and consistent with your obligations under the contract and the law Although it may feel like deja vu all over again, the prudent contractor will be prepared to mitigate performance and cost risk.

Price 52
article thumbnail

Friday Flash 11/10/23

The Coalition for Government Procurement

In addition, for certain systems, contractors will be required to develop a System Security Plan, implement and maintain extensive security controls, conduct annual security assessments and cyber threat hunting and vulnerability assessments, and comply with continuous monitoring and supply chain risk management requirements.