Join us for an exclusive event to learn how Oracle’s best-in-class supply chain planning solutions enable companies to improve supply chain efficiency, streamline and optimise maintenance operations by proactively managing supply chain events.
Don’t miss this chance to learn how you can:
• Improve predictability of unplanned maintenance
• Proactively plan for supply chain events
• Optimise maintenance planning process
• Orchestrate agile operations
• Reducing overall cost of asset maintenance operations
Register now to find out how you can improve supply chain efficiency in asset maintenance operations with Oracle supply chain planning solutions.
Emergency responders often talk about the "Golden Hour", the period of time where there is the greatest likelihood that prompt attention will mitigate impact and damage. The same holds true for the Cyber Attack Chain. At what phase in the chain should you concentrate on to get the best protection for your organization or credible threat intelligence information? Join Intel Security and (ISC)2 on Thursday, September 10, 2015 at 1:00PM Eastern for a discussion on the chain and where it might be best to focus your attention on the links of the chain to best defend your organization.Read more >
Identifying social compliance issues, particularly forced labor and human trafficking in supply chains, continues to be a significant problem for business, particularly when sourcing from opaque and non-transparent emerging markets. Civil society is playing a large part in increasing awareness and pressuring politicians to introduce and enforce legislation, and is gradually highlighting the issue as a problem which needs to be addressed both by governments and the business community.
Kroll has been researching and working on this issue for a number of years and believes that businesses should be taking the issue as seriously as other forms of compliance.
Join Gene Kim, CTO, researcher and author of the best-selling book “The Phoenix Project” and Josh Corman, Sonatype CTO and co-founder of Rugged Software as they discuss how high performing organizations are applying proven supply chain principles to accelerate software delivery.Read more >
This presentation will cover why we should care about the continuity of our supply chain as well as provide tips and explain the support of standards and good practices in managing supply chain continuity.Read more >
Cyber criminals are organised and well-funded and just like any innovative commercial business, these organisations have a business plan and an operating framework to ‘go to market’.
If we understood how they go about targeting individuals at organisations like yours with the end goal of stealing valuable sensitive data, perhaps we might change the way we protect our users. The good news is that there is a common operating framework that cybercriminals work towards known as the Cyber Kill Chain®.
It’s time to play the cyber criminals at their own game! Join, Proofpoint, Fujitsu and Bloor Research on this webinar as they provide practical advice on how to interpret the 7 stages of the Attack Chain and use this knowledge to review the way you prepare, protect, detect & respond to cyber criminals targeting your organisation.
Cyber Kill Chain® is a registered trademark of Lockheed Martin
Just as any organization can face risks and threats and have vulnerabilities; the same is true with members of supply chains. Individual suppliers can be at risk through a variety of events, such as fires, floods, technology failures and power outages.
This webinar discusses risks to supply chains and will provide guidance on identifying those risks and defining strategies for mitigating them.
“Following on from David’s article in this quarters Continuity Magazine entitled “The Parry and Riposte of Procurement and BCM” Page 31. David expands on his words “ This article is meant to provoke thought and although I could, I won’t offer a potential process” In this webinar David offers practical methods to deliver resilient supply chains based on his experiences as a Head of Procurement and a Corporate Business Continuity Manager for a FTSE 100 UK based company. David is the author of Continuity Shop’s course on supply chain risk and continuity and was the UK Principal Expert attending the finalisation of the ISO 22318 technical specification on Supply Chain Continuity Management in Japan this year.
Both Business Continuity professionals and procurement professionals would benefit from this webinar, so why not invite your procurement teams to listen in too?
Like “green” initiatives for reducing carbon emissions, software supply chain security has significant benefits to an organization, but is routinely avoided in pursuit of revenue-driving projects. But “green” managed to gain traction, and so can your program to secure your third-party suppliers.
Join this webinar to learn how to apply principles taken from “green” initiatives to your software supply chain security program. You will learn how to:
-Choose the right suppliers
-Use suppliers as force multipliers.
-Drive compliance via “WIIFM”
Given the rising concern for Supply Chain incidents amongst Business Continuity professionals (up 11 places to 5th in BCI Horizon Scan Research Report 2015), we will look at considerations for those businesses managing complex supply chains and a best practice approach for mitigating the associated risks.Read more >
In this webinar, Clare and Helen will be sharing best practice from their CIR award winning supply chain business continuity strategy.Read more >
In today’s economy, companies need to be highly focused on managing costs. Strategies involving far-flung suppliers with single-source, just-in-time contracts and outsourced manufacturing and assembly agreements are aimed at reducing costs and boosting the bottom line. This type of procurement strategy may increase profit margins, but it also significantly raises the risk and potential impact of an unexpected disruption in the supply chain. This is particularly true when little is known about key and critical suppliers and their business continuity plans.
The most recent port slowdown in the US had global ramifications. Eight months of failed labor talks with longshore workers have brought West Coast port congestion to a breaking point.
It is no wonder that the results from the most recent BCI/BSI Horizon Scan report showed that Supply chain disruption has risen by 11 places from 16th last year. As a global economy with so many interrelated processes, it is imperative that we evaluate and address third party risk with the utmost urgency in order to find a way to mitigate and manage them.
Approaches to addressing risk can vary greatly with what types of risk are considered acceptable along with the methods chosen to mitigate and minimize potential impacts. Assessing critical suppliers as well as those downstream Tier 2 and Tier 3 providers is a critical part of doing business in a globalized marketplace. Objective evidence of compliance, such as certification to international business continuity standards like ISO 22301, as well as updating supplier information on a regular basis is quickly becoming part of the initial screening process for choosing suppliers and maintaining a level of confidence and transparency.
Join us as we discuss best practice business solutions.
Cyber attacks frequently progress through a number of stages. Understanding each stage of an attack and the potential disruption points in the chain can assist IT security teams to better defend their networks. Join this webcast to look at today’s attacks relative to the stages of the cyber attack chain and discuss what defenses can mitigate each stage to help prevent an attack.
•Understand how the cyber attack chain phases map to McAfee’s Security Connected solutions
•Apply cyber attack chain mitigation strategies to specific projects or acquisitions
•Articulate the importance of collecting intrusion artifacts and intelligence
As supply chains become increasingly complex, and efficiency savings motivate companies to outsource business processes, service providers continue to be a primary vector for information security risks. In part this is because of the lack of usable, consistent standards for suppliers. Many suppliers are small and do not have the resources to adequately implement widely-accepted information security standards, leading to data breaches such as that of US retailer Target in Dec 2013. We also continue to see the mistaken belief that information risk is something others need to think about. This webcast will offer solutions to some of these challenges and also discuss the issue of more widespread education and communication of threats and how they might be better managed throughout the global supply chain.Read more >
2014 was a banner year for high profile data breaches. But a data breach is not necessarily an Advanced Targeted Attack. Too many data breaches occur because of a lack of focus across the spectrum of possible threats or attack vectors. This session will focus on the different elements that make up the “Kill Chain” and the steps that an enterprise can take to break the chain and minimize the chances of a data breach.Read more >
In the past 12 months, 110 million Americans have been impacted and 432 million accounts compromised in data breaches. We see the same thing in breach after breach – the compromise and exploit of privileged user credentials. It's not surprising, then, that gaining access to those credentials is a critical element of successful attacks. Join Xceedium's Shawn Hank to learn:
- The central role privileged identity and credentials play in the intrusion kill chain.
- How privileged identity was compromised in several well known breaches, and the results that followed.
- How to protect privileged identities with technology and best practices.
With ever increasing security threats and other widespread supply chain disruptions, Supply Chain Security (SCS) is now officially a reality of both day-to-day business and trade compliance. View this webinar to learn how Supply Chain Security (SCS) Risk Management addresses heightened threats to the supply chain including cyber-terrorism, organized crime, theft and tampering, and country-of-origin risks.Read more >
Ahead of RenewableUK Global Offshore Wind 2014 in Glasgow next month, Windpower TV brings you an exclusive preview webcast featuring leading figures in the wind industry.
With offshore around Europe expected to grow significantly over the next ten years, demand on the supply chain is becoming a major issue for the industry. Industry experts share insider insight on:
- The demands on the supply chain, and timings: UK, Germany, Scandinavia and later France
- Potential products and components that will create bottlenecks
- The deadlines required for resolving the bottlenecks
- The policy drivers required to ease these bottlenecks
- Predictions of the countries that will be able to deliver the supply chain
Supply chains are often the heart and soul of an organization. If the supply chain is undisturbed, the business can function normally. If it is disrupted, the consequences could be disastrous. If you are serious about protecting your supply chains, one of the best strategies is to analyze the BCM plans of your principal supply chain partners. In this webinar we'll briefly examine the following:
- How BCM factors into supply chains
- The importance of identifying risks to your supply chains
- What you need from your suppliers on their BCM activities
- How to obtain supplier BCM plans
- How to audit supplier BCM plans