Blog Admin

Tackling Procurement Challenges in the Supply Chain
Posted by

Tackling Procurement Challenges in the Supply Chain

Globalization and regulation, coupled with inadequate investment in compliance programs and third-party risk management programs, are making the proactive identification and resolution of risks posed by suppliers a challenging task. Companies that don’t face up to the challenge run the risk of non-compliant products in their supply chain, and can face serious brand and reputational […]

How Estimating ROI for Adopting Technology Can Help Streamline Supplier Quality
Posted by

How Estimating ROI for Adopting Technology Can Help Streamline Supplier Quality

Organizations have certain expectations and apprehensions when adopting a technology solution for suppliers. When it comes to automating a process, in terms of its usability, its benefits, and of course, returns in lieu of the investments made, it is common to see tensions rising high within your organization. However, such a solution would not only […]

Ensuring Resilient Cyber Safeguards in Cloud Applications
Posted by

Ensuring Resilient Cyber Safeguards in Cloud Applications

Assessing Cloud Application Vendors from a Security Perspective Enterprises of all structures and sizes across the globe have been adopting cloud for all needs – for computing, storage, databases, to hosting business applications. They are also proactively addressing cyber-security needs – both as dictated by internal Info-Sec controls, as well as those coming from external regulatory mandates. For enterprises […]

What Startups Can Do About Cyber Attacks
Posted by

What Startups Can Do About Cyber Attacks

A cybersecurity report by Ponemon Institute, in association with Keeper Security, found that in the 12 months leading up to June 2016, 55 percent of small and medium-sized businesses (SMBs) experienced a cyber attack, while 50 percent encountered data breaches involving customer and employee information. These statistics belie the common notion that cybercriminals attack only […]

How to Mitigate Risk Exposure from Vendor Relationships
Posted by

How to Mitigate Risk Exposure from Vendor Relationships

Outsourcing business activities to a vendor does not include outsourcing the risk and compliance responsibilities. Relying heavily on vendors, with low or limited visibility into the vendor networks, exposes organizations to high risks. Therefore, understanding and managing vendor risks is crucial to maintain sustainable businesses. With a strong Vendor Risk Management (VRM) program companies can […]

How to Cross-Sell Compliance to Your Sales Managers
Posted by

How to Cross-Sell Compliance to Your Sales Managers

The story of Wells Fargo’s cross-selling compliance failure, reminds me of the huge fine that HSBC received in 2012 for mis-selling— over $3 billion.  Wells Fargo’s $185 million fine for poor cross-selling practices pales in comparison – but still “ouch!”  Even worse and more costly could be the reputation damage — Wells Fargo styles itself as the […]