Supply Chain Risk

Supply Chain Risk
Author: George A. Zsidisin
Publisher: Springer Science & Business Media
Total Pages: 351
Release: 2008-09-08
Genre: Business & Economics
ISBN: 0387799346

Risk is of fundamental importance in this era of the global economy. Supply chains must into account the uncertainty of demand. Moreover, the risk of uncertain demand can cut two ways: (1) there is the risk that unexpected demand will not be met on time, and the reverse problem (2) the risk that demand is over estimated and excessive inventory costs are incurred. There are other risks in unreliable vendors, delayed shipments, natural disasters, etc. In short, there are a host of strategic, tactical and operational risks to business supply chains. Supply Chain Risk: A Handbook of Assessment, Management, and Performance will focus on how to assess, evaluate, and control these various risks.

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity
Author:
Publisher:
Total Pages: 48
Release: 2018
Genre: Computer networks
ISBN:

The Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Implementation Tiers, and the Framework Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across sectors and critical infrastructure. Elements of the Core provide detailed guidance for developing individual organizational Profiles. Through use of Profiles, the Framework will help an organization to align and prioritize its cybersecurity activities with its business/mission requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cybersecurity risk, which will help in prioritizing and achieving cybersecurity objectives.

Global Supply Chain Security and Management

Global Supply Chain Security and Management
Author: Darren Prokop
Publisher: Butterworth-Heinemann
Total Pages: 0
Release: 2017-03-01
Genre: Business & Economics
ISBN: 9780128007488

Global Supply Chain Security and Management: Appraising Programs, Preventing Crimes examines the relationship between securing a supply chain and promoting more efficient worldwide trade. Historically, the primary goal of supply chain security was guarding against theft and damage. Today, supply chains are also on the frontlines in the fight against terrorism. This book showcases industry leaders and their best practices, also exploring how the government is both a policing organization and a supply chain partner. In addition, it covers the critical roles that various technologies play, focusing on how Big Data is collected and turned into knowledge. By using the tools provided, readers will gain a stronger understanding of the challenges and opportunities faced by any organization that imports or exports products.

Supply Chain Risk Management

Supply Chain Risk Management
Author: Ken Sigler
Publisher: CRC Press
Total Pages: 329
Release: 2017-11-07
Genre: Business & Economics
ISBN: 131527955X

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information
Author: Erika McCallister
Publisher: DIANE Publishing
Total Pages: 59
Release: 2010-09
Genre: Computers
ISBN: 1437934889

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.

Developing Tailored Supply Strategies

Developing Tailored Supply Strategies
Author: Nancy Y. Moore
Publisher: Rand Corporation
Total Pages: 166
Release: 2007
Genre: Business & Economics
ISBN: 0833041207

Purchased goods and services are an increasingly large proportion of public and private enterprise budgets. Historically, purchased goods and services have accounted for less than a third of an enterprise's budget, but today many enterprises spend more than two-thirds of their budgets on purchased goods and services. Similarly, the Air Force and the Department of Defense (DoD) spend nearly half their budgets for purchased goods and services and an additional sixth on weapon procurement (with only a third going to military and civilian personnel costs). (See pp. 1-6.) Because of the growing importance of purchasing, many enterprises have sought to develop supply strategies for their purchased goods and services. This monograph is intended as a resource for procurement personnel developing supply strategies for the Air Force or DoD. It does not analyze current military procurement practices but rather synthesizes academic, business, and professional literature on developing and applying supply strategies. Its core is a synthesis of nearly a dozen different processes found in the literature.

Management Information Systems

Management Information Systems
Author: Kenneth C. Laudon
Publisher: Pearson Educación
Total Pages: 618
Release: 2004
Genre: Business & Economics
ISBN: 9789702605287

Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.

Supply Chain Risk Management

Supply Chain Risk Management
Author: Greg Hutchins
Publisher: Greg Hutchins
Total Pages: 345
Release: 2018-11-26
Genre: Business & Economics
ISBN: 1732554560

Why Purchase this Book? · Prepares supply chain, quality, engineering, and operational excellence professionals for their emerging risk roles, responsibilities, and authorities. · Illustrates how supply chain risk-controls are architected, designed, deployed, and assured. · Explains why Risk Based Problem Solving (RBPS) and Risk Based Decision Making (RBDM) are the future of SCRM. Examples are offered throughout the book. · Illustrates how supply chain management is migrating to Supply Chain Risk Management (SCRM). · Demonstrates how SCRM objectives align with the organization’s strategic objectives. · Describes how to move beyond a price relationship to a value-added relationship. · Integrates the disparate elements of SCRM into a competitive business system. · Describes how to select and develop suppliers based on risk criteria. · Demonstrates how to use ISO 31000 risk management framework of SCRM. Bonus Materials/Resources: · Access over 1,500 risk articles through CERM Academy (http://insights.cermacademy. com/). · Get free course materials such as using FMEA’s in ISO 9001:2015. · Get slide decks with specific risk information on YouTube. · Get discount for Certified Enterprise Risk Manager® certificate.

Guide to Computer Security Log Management

Guide to Computer Security Log Management
Author: Karen Kent
Publisher:
Total Pages: 72
Release: 2007-08-01
Genre:
ISBN: 9781422312919

A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). These CS logs are generated by many sources, incl. CS software, such as antivirus software, firewalls, & intrusion detection & prevention systems; operating systems on servers, workstations, & networking equip.; & applications. The no., vol., & variety of CS logs have increased greatly, which has created the need for CS log mgmt. -- the process for generating, transmitting, storing, analyzing, & disposing of CS data. This report assists org¿s. in understanding the need for sound CS log mgmt. It provides practical, real-world guidance on developing, implementing, & maintaining effective log mgmt. practices. Illus.