A Case Study on Leveraging Supply Chain Risk Management Solutions to Drive Revenue for a Leading Consumer Packaged Goods Firm

SpendEdge, a global procurement intelligence advisory firm, has announced the release of their new ‘supply chain risk management study on the consumer packaged goods industry’. A well-known consumer packaged goods company with a considerable number of manufacturing units spread across economies was facing difficulties in identifying the potential opportunities in the market. The CPG sector client wanted to leverage the use of supply chain risk management solutions to achieve a more robust supply chain network. The consumer packaged goods client was also looking at devising an effective risk treatment plan including measures to protect the supply chain.

According to the procurement analysts at SpendEdge, “The CPG industry acts as a foundation for the modern consumer economy as it drives not only huge amounts of money into other businesses like retail and advertising but also generates a massive portion of the gross domestic profits (GDP) for countries across the globe.”

In the consumer packaged goods industry, leading firms are looking at leveraging the use of supply chain risk management solutions, as it helps them integrate several previous or ongoing initiatives, including those for business continuity and supply-chain security. Our supply chain risk management solutions assist clients in the consumer packaged goods market space to align their risk management strategies with supply chain risk exposure.

The supply chain risk management solutions offered by the experts at SpendEdge helped the consumer packaged goods client to monitor the complete process, starting from risk analysis and risk evaluation through risk management and right up to residual risk control. This helped the CPG sector client to achieve productivity and avoid sales losses.

Read more at A Case Study on Leveraging Supply Chain Risk Management Solutions to Drive Revenue for a Leading Consumer Packaged Goods Firm

Share your opinions with us in the comment box and subscribe to get updates.

Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someone

3 ways to strengthen security with software supply-chain automation

Federal agencies are striving to become more innovative and iterative, leading to growing adoption of open source within the government. The issuance earlier this year of the Federal Source Code Policy illustrates how this technology, once anathema to government agencies, has become the de facto standard for the creation and deployment of many applications.

With the explosive adoption of open-source components being used to assemble applications, agency personnel are now tasked with ensuring the quality of the components that are being used. Developers must have confidence in components’ security, licensing and quality attributes and know for certain that they are using the latest versions.

Unfortunately, many agencies that are adopting the RMF are also relying on outdated and inefficient practices and tools that are not designed for today’s open and agile world. In addition to relying on potentially vulnerable components to build applications, some agencies have continued to depend too heavily on common application security tools, such as static application security testing and dynamic application security testing.

Continue reading

Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someone

How to recover from supply chain disruptions

Risk mitigation is a crucial component of supply chain management. Preparing for potential disruptions is one of the most important yet challenging tasks faced by company managers, especially since there is an abundance of possible situations threatening operations at all times.

Unfortunately, damage control planning is something many companies tend to neglect. Last year, a study conducted by the supply chain management team at the University of Tennessee found that only about 50 percent of businesses have a recovery process in place to reference in the event a facility’s operations are interrupted.

Importance of response planning
Companies of all sizes are susceptible to dangerous disruptions, with global supply chains being the most vulnerable. Which is why it is surprising that the report also discovered nearly all, or 90 percent, of surveyed organizations do not take potential risks into consideration when outsourcing.

It’s understandable that managers are generally more focused on improving day-to-day operations, such as customer service, identifying cost-savings opportunities and driving revenue. However, disruptions along the supply chain have the power to severely impact financial growth and overall performance.

Between natural disasters, security breaches, safety and regulatory compliance and system failures, it is virtually impossible to anticipate what will be affected and when attacks may occur. But the best approach for supply chain teams to take is implementing strategic risk management practices that will help minimize monetary losses associated with disasters.

Read more at How to recover from supply chain disruptions

Subscribe us to get updates in your inbox, or send us an email for discussion.

Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someone

Could Your Supply Chain Be The Weakest Link In Risk Management?

Supply chains are a vital component of every organization’s global business operations and the backbone of today’s global economy. However, security chiefs everywhere are concerned about how open they are to an abundance of risk factors. A range of valuable and sensitive information is often shared with suppliers and, when that information is shared, direct control is lost. This leads to an increased risk of its confidentiality, integrity or availability being compromised.

Data Protection

Security is only as strong as its weakest link. Despite organizations’ best efforts to secure intellectual property and other sensitive information, limited progress has been made in effectively managing information risk in the supply chain. Too often data breaches trace back to compromised vendor credentials to access the retailer’s internal networks and supply chain. Mapping the flow of information and keeping an eye on key access points will unquestionably remain crucial to building a more resilient information.

Take a moment and think about this: Do you know if your suppliers are protecting your company’s sensitive data as diligently as you would protect it yourself? This is one obligation you can’t outsource because, in the end, it’s your liability. By looking at the structure of your supply chains, determining what information is shared and accessing the probability and impact of potential breaches, you can balance information risk management efforts across your enterprise.

Organizations need to think about the consequences of a supplier providing accidental, but harmful, access to their corporate data. Information shared in the supply chain can include intellectual property, customer-to-employee data, commercial plans or negotiations and logistics. Caution should not be confined to manufacturing or distribution partners. It should also embrace professional services suppliers, all of whom share access, often to your most valuable assets.

Read more at Could Your Supply Chain Be The Weakest Link In Risk Management?

Do you have any opinions about this article? Please share it with us in the comment box. Thank you for reading.

Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someone

Risk Management: A Look Back at 2013 and Ahead to 2014

Risk Management: A Look Back at 2013 and Ahead to 2014

According to Yo Delmar, vice president of MetricStream, 2013 has been witness to extraordinary change. We are living and doing business in an increasingly global, mobile, social and Big Data world, fraught with new risks and complex regulations. As such, individuals and organizations are struggling to keep pace.

In response to greater uncertainty, complexity and volatility throughout 2013, we’ve seen increased convergence and alignment amongst internal teams, including IT, security and the business. As a result, organizations are better poised to provide the context for communicating risks. We’ve also seen the business ecosystem evolve to include geographically diverse vendors and third parties, and as a result, organizations must continue to view these entities as part of the organization itself, and manage them in a more tightly and integrated way.

Growing convergence among IT, security and the business: The landscape of risk and compliance continues to evolve, as organizations are asked to manage their IT risk and compliance activities far beyond that of basic audit and compliance requirements of the past. As new technologies bring their own set of unique risks, there is a growing disconnect among internal audit, security, compliance and the business on what it means to build, manage and lead a truly safe, secure and successful business.

As a result, we are seeing more focused efforts when it comes to getting these groups on the same page by building a common risk language, as well as a discussion framework to enable cross-functional collaboration. Doing so can set the context for communicating risks in a way that drives more effective governance and decision-making across the board of directors, executive management team and each respective business function.

What is your 2014 resolutions? Leave us a comment or send us a message.

Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someone