Join us for an exclusive event to learn how Oracle’s best-in-class supply chain planning solutions enable companies to improve supply chain efficiency, streamline and optimise maintenance operations by proactively managing supply chain events.
Don’t miss this chance to learn how you can:
• Improve predictability of unplanned maintenance
• Proactively plan for supply chain events
• Optimise maintenance planning process
• Orchestrate agile operations
• Reducing overall cost of asset maintenance operations
Register now to find out how you can improve supply chain efficiency in asset maintenance operations with Oracle supply chain planning solutions.
Emergency responders often talk about the "Golden Hour", the period of time where there is the greatest likelihood that prompt attention will mitigate impact and damage. The same holds true for the Cyber Attack Chain. At what phase in the chain should you concentrate on to get the best protection for your organization or credible threat intelligence information? Join Intel Security and (ISC)2 on Thursday, September 10, 2015 at 1:00PM Eastern for a discussion on the chain and where it might be best to focus your attention on the links of the chain to best defend your organization.Read more >
Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.Read more >
Human Trafficking - What It Is, Why You’re Vulnerable To It, and How to Keep it Out of Your Supply Chain.
No company wants its suppliers to use forced labour. Yet somehow 21 million people around the world are in modern slavery. How does this happen? And how can you make sure you’re not inadvertently supporting it?
Join our webinar, where a panel of experts will explore the answers to the above, as well as other vital questions that companies of every size, shape and industry must consider.
You will learn:
1) If your company is among the thousands impacted by recent international regulations combatting human trafficking
2) If your supply chain is operating in geographic hot spots for forced labour
3) How to ensure that your data and analytics approach to supply management is sufficient in protecting your company from the risks of human trafficking
Plus a live Q&A session with our panel, including:
Mike McDonnell, Intel
Sr. Manager Supply Chain Sustainability
Former Director of Sustainability for Nike and Stora Enso
Paul O. Hirose – Perkins Coie
Co-Chair of Perkins Coie LLP’s Supply Chain Compliance & Corporate Social Responsibility practice group.
Venus Rodriguez - Not For Sale
Leader of Not For Sale’s Reinvent Program, aimed at giving a fresh start to survivors of human trafficking
Geoffrey Farrell – Dun & Bradstreet
Global Leader - Supply Management Solutions
David J. Window, CIPS, Senior Consultant and Head of Supply Chain Resilience will discuss the case for understanding the investment businesses make in supply chain resilience and challenges them to understand better the value for money achieved within contractual arrangements where suppliers purport to offer such resilience. To understand, how could business quantify the balance between proactive risk management and responsive continuity management controls to mitigate loss and impacts.Read more >
Identifying social compliance issues, particularly forced labor and human trafficking in supply chains, continues to be a significant problem for business, particularly when sourcing from opaque and non-transparent emerging markets. Civil society is playing a large part in increasing awareness and pressuring politicians to introduce and enforce legislation, and is gradually highlighting the issue as a problem which needs to be addressed both by governments and the business community.
Kroll has been researching and working on this issue for a number of years and believes that businesses should be taking the issue as seriously as other forms of compliance.
Join Gene Kim, CTO, researcher and author of the best-selling book “The Phoenix Project” and Josh Corman, Sonatype CTO and co-founder of Rugged Software as they discuss how high performing organizations are applying proven supply chain principles to accelerate software delivery.Read more >
This presentation will cover why we should care about the continuity of our supply chain as well as provide tips and explain the support of standards and good practices in managing supply chain continuity.Read more >
Cyber criminals are organised and well-funded and just like any innovative commercial business, these organisations have a business plan and an operating framework to ‘go to market’.
If we understood how they go about targeting individuals at organisations like yours with the end goal of stealing valuable sensitive data, perhaps we might change the way we protect our users. The good news is that there is a common operating framework that cybercriminals work towards known as the Cyber Kill Chain®.
It’s time to play the cyber criminals at their own game! Join, Proofpoint, Fujitsu and Bloor Research on this webinar as they provide practical advice on how to interpret the 7 stages of the Attack Chain and use this knowledge to review the way you prepare, protect, detect & respond to cyber criminals targeting your organisation.
Cyber Kill Chain® is a registered trademark of Lockheed Martin
Just as any organization can face risks and threats and have vulnerabilities; the same is true with members of supply chains. Individual suppliers can be at risk through a variety of events, such as fires, floods, technology failures and power outages.
This webinar discusses risks to supply chains and will provide guidance on identifying those risks and defining strategies for mitigating them.
“Following on from David’s article in this quarters Continuity Magazine entitled “The Parry and Riposte of Procurement and BCM” Page 31. David expands on his words “ This article is meant to provoke thought and although I could, I won’t offer a potential process” In this webinar David offers practical methods to deliver resilient supply chains based on his experiences as a Head of Procurement and a Corporate Business Continuity Manager for a FTSE 100 UK based company. David is the author of Continuity Shop’s course on supply chain risk and continuity and was the UK Principal Expert attending the finalisation of the ISO 22318 technical specification on Supply Chain Continuity Management in Japan this year.
Both Business Continuity professionals and procurement professionals would benefit from this webinar, so why not invite your procurement teams to listen in too?
Robin Angus, Marketing Director, NCR Cash Solutions has worked in a variety of roles in the cash and consumer transaction business for 20 years and will share NCR’s experience gained in customer engagements and deployments of NCR cash optimization solutions globally.
With interest rates at records lows in many economies, the focus for retail bank cash planners has turned to efficient use of resources, vendor management and customer service.
Simple ATM cash forecasting tools provided useful benefits to many banks over the last decade.
This webinar will explore the opportunities automation and integration can bring to organisations aiming to simplify and optimize the planning for their whole cash infrastructure and looking for ways to regain control of their supply chain partners.
Like “green” initiatives for reducing carbon emissions, software supply chain security has significant benefits to an organization, but is routinely avoided in pursuit of revenue-driving projects. But “green” managed to gain traction, and so can your program to secure your third-party suppliers.
Join this webinar to learn how to apply principles taken from “green” initiatives to your software supply chain security program. You will learn how to:
-Choose the right suppliers
-Use suppliers as force multipliers.
-Drive compliance via “WIIFM”
Given the rising concern for Supply Chain incidents amongst Business Continuity professionals (up 11 places to 5th in BCI Horizon Scan Research Report 2015), we will look at considerations for those businesses managing complex supply chains and a best practice approach for mitigating the associated risks.Read more >
In this webinar, Clare and Helen will be sharing best practice from their CIR award winning supply chain business continuity strategy.Read more >
In today’s economy, companies need to be highly focused on managing costs. Strategies involving far-flung suppliers with single-source, just-in-time contracts and outsourced manufacturing and assembly agreements are aimed at reducing costs and boosting the bottom line. This type of procurement strategy may increase profit margins, but it also significantly raises the risk and potential impact of an unexpected disruption in the supply chain. This is particularly true when little is known about key and critical suppliers and their business continuity plans.
The most recent port slowdown in the US had global ramifications. Eight months of failed labor talks with longshore workers have brought West Coast port congestion to a breaking point.
It is no wonder that the results from the most recent BCI/BSI Horizon Scan report showed that Supply chain disruption has risen by 11 places from 16th last year. As a global economy with so many interrelated processes, it is imperative that we evaluate and address third party risk with the utmost urgency in order to find a way to mitigate and manage them.
Approaches to addressing risk can vary greatly with what types of risk are considered acceptable along with the methods chosen to mitigate and minimize potential impacts. Assessing critical suppliers as well as those downstream Tier 2 and Tier 3 providers is a critical part of doing business in a globalized marketplace. Objective evidence of compliance, such as certification to international business continuity standards like ISO 22301, as well as updating supplier information on a regular basis is quickly becoming part of the initial screening process for choosing suppliers and maintaining a level of confidence and transparency.
Join us as we discuss best practice business solutions.
As supply chains become increasingly complex, and efficiency savings motivate companies to outsource business processes, service providers continue to be a primary vector for information security risks. In part this is because of the lack of usable, consistent standards for suppliers. Many suppliers are small and do not have the resources to adequately implement widely-accepted information security standards, leading to data breaches such as that of US retailer Target in Dec 2013. We also continue to see the mistaken belief that information risk is something others need to think about. This webcast will offer solutions to some of these challenges and also discuss the issue of more widespread education and communication of threats and how they might be better managed throughout the global supply chain.Read more >
Cyber attacks frequently progress through a number of stages. Understanding each stage of an attack and the potential disruption points in the chain can assist IT security teams to better defend their networks. Join this webcast to look at today’s attacks relative to the stages of the cyber attack chain and discuss what defenses can mitigate each stage to help prevent an attack.
•Understand how the cyber attack chain phases map to McAfee’s Security Connected solutions
•Apply cyber attack chain mitigation strategies to specific projects or acquisitions
•Articulate the importance of collecting intrusion artifacts and intelligence
2014 was a banner year for high profile data breaches. But a data breach is not necessarily an Advanced Targeted Attack. Too many data breaches occur because of a lack of focus across the spectrum of possible threats or attack vectors. This session will focus on the different elements that make up the “Kill Chain” and the steps that an enterprise can take to break the chain and minimize the chances of a data breach.Read more >