Hi [[ session.user.profile.firstName ]]

Identifying Key Suppliers

Supply chain continuity is the hottest topic in BCM and driving a significant positive shift in corporate awareness of BCM. The BCI Partnership established a working group in 2011 to develop practitioner guidance on this topic following feedback from its annual supply chain resilience surveys. The
Supply chain continuity is the hottest topic in BCM and driving a significant positive shift in corporate awareness of BCM. The BCI Partnership established a working group in 2011 to develop practitioner guidance on this topic following feedback from its annual supply chain resilience surveys. The group is chaired by Steve Wicks, who brings his own unique insight of being a BCM expert working in procurement at BP plc. In this webinar, Steve will be focusing on a key aspect of supply chain continuity - identifying your key suppliers – one that is often only defined in terms of “biggest spend”. Steve will show why this is completely inadequate, and share the findings of the study he has been leading, including feedback received from interviews with a number of corporations. A paper on the subject will be published in June.
Recorded Mar 21 2012 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Wicks, Chair BCI Partnership Working Group on Supply Chain Continuity
Presentation preview: Identifying Key Suppliers
Recommended for you:
  • Date
  • Rating
  • Views
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • In the traditional world of EDW, ETL pipelines are a troublesome bottleneck when preparing data for use in the data warehouse. ETL pipelines are notoriously expensive and brittle, so as companies move to Hadoop they look forward to getting rid of the ETL infrastructure.

    But is it that simple? Some companies are finding that in order to move data between clusters for backup or aggregation purposes, they are building systems that look an awful lot like ETL.
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Overhead power distribution in your data center offers many attractive possibilities, but is not without its challenges.

    Join Starline's Director of Marketing, Mark Swift; CPI’s Senior Data Center Consultant, Steve Bornfield; and University of Florida's Joe Keena for an exploration of the options and some of the pitfalls, supported by real-life examples from the field.
  • Peter is investigating DevOps, Bill looks at security while Max is stuck on the infrastructure level
  • The goal of Virtual Desktop Infrastructure (VDI) is to lower the operational costs of supporting an organization’s desktops and laptops. A VDI project should make it easier for IT to support users, keep the organization safe from viruses and better protect its data assets. The key to a successful VDI project is user adoption. But while many organizations consider using an All-Flash Array (AFA) to deliver the performance that will lead to user adoption, the problem is AFAs drive up the cost per desktop, increase the vulnerability of the architecture and encourage additional storage silos.

    Join Storage Switzerland and Cloudistics for an informative webinar that will provide an alternative approach that meets user’s performance expectations while leveraging existing – and often already paid for – storage hardware and does not introduce new silos of storage.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Identifying Key Suppliers
  • Live at: Mar 21 2012 10:00 am
  • Presented by: Steve Wicks, Chair BCI Partnership Working Group on Supply Chain Continuity
  • From:
Your email has been sent.
or close
You must be logged in to email this