Menu Shape 3 copy 2Created with Avocode.
webinara overview
IT and Technology

Webinar: How to intelligently mitigate procurement risks

webinar description

Two in three procurement leaders have limited or no visibility beyond tier one of their supply chain, according to a recent Deloitte survey of chief procurement officers. The lack of visibility into suppliers, including supplier performance and risks, is a major business concern that could have major consequences on the running and reputation of companies.

It’s no wonder that procurement organizations worldwide are doubling up efforts to develop structured risk mitigation programs that efficiently and proactively anticipate and monitor a wide range of risks - strategic risks, financial risks, regulatory risks, compliance risks and reputational risks.

However, the main challenge to successful risk mitigation is not the lack of data – there is plenty of it - but how to incorporate as much relevant data (from inside and outside of your organization) into the hands of decision-makers when it matters most, without delay.

On May 9, 2018, at 4:00 pm UK time / 11:00 am EST time, Rosslyn Data Technologies is hosting a webinar to help you respond to these challenges and develop an efficient risk mitigation capability.



Reasons to attend the webinar
  • What are the common and emerging risks procurement and supply chain teams are looking at today

  • What questions you should be asking to identify and mitigate risks and what data sources are required to provide answers to these questions

  • How procurement professionals have established efficient risk mitigation capabilities including an early warning system that identifies, tracks and alerts colleagues to concerns

  • How procurement organizations are working with colleagues in other functions to collaboratively identify and respond to risks using shared data and analytics capabilities

Who should attend

This webinar is suitable for anyone in your organization responsible for managing risk.

Speakers:
Rosslyn Data Technologies
Lance Mercereau, Chief Marketing Officer
Lance lives and breathes technology, always thinking of new and innovative ways of exploiting the latest such as cloud computing for the benefit of his customers. Lance started his career 20 years ago at the height of the San Francisco dot.com era, advising start-ups on business strategy, customer acquisition, alliance ecosystems, corporate affairs and brand management.

One of his passions is helping to establish professional standards. He is spearheading the development of the world's first standardized HR taxonomy for more effective reporting and analysis of human capital, in partnership with Dr. Max Blumberg.

Known for his aggressive “West Coast Offense” approach to marketing, he subsequently moved to and worked in the United Kingdom and the emerging markets of Central and Eastern Europe where he successfully established in-house marketing organizations and launched products and services for award-winning companies such as Agilent, Dell, IBM, Intel and SAP, targeting enterprises, small and medium sized businesses (SMBs) and consumers. After a year away as global head of marketing at a technology-focused business consultancy headquartered in London, Lance rejoined Rosslyn Analytics as its Chief Marketing Officer.
09

May

2018

11:00 - 12:00 PM
(GMT -4)

(Duration - 60 minutes)

ATTENDANCE FEE - FREE

WEBINAR HAS ENDED

Kelly Barner owns, manages, and edits Buyers Meeting Point. She has a unique perspective on procurement from the numerous roles she has held during her 15 years in procurement. Kelly worked for Ahold USA (parent company of grocery chains Stop & Shop, Hannaford, Giant Landover, and more) on their not ... Read More

Other webinars you may like
FREE
Aug 21, 10.00 AM (GMT -07:00)
Transform Your Approach To Customer Experience
Your customers' expectations are changing dramatically due to the adoption of AI, predictive analytics, digital business and IoT. Managing the customer experience (CX) during marketing, transactions and customer service is good…but not good enough. Your most important customers and partners
Aragon Research
Speaker - Betsy Burton
More info
FREE
Aug 22, 12.00 PM (GMT -04:00)
Warehouse Management Systems for the Mid-Market: Value Drivers
A successful warehouse management system (WMS) implementation in an un-automated facility can provide a rapid return on investment. But is the investment right for the small to medium sized business? A WMS can serve as a foundation for instituting a continuous improvement culture and facilitates on-going
APICS Atlanta
Speaker - Chris Barnes
More info
FREE
Aug 27, 10.00 AM (GMT -07:00)
How We Bypassed All NTLM Relay Mitigations
Active Directory has always been a popular target for attackers — and one of the weakest spots in Active Directory environments lies in the design of one of the oldest authentication protocols, NTLM. From CVE-2015-0005 to the recent LDAPS Relay vulnerability, it is clear why this protocol is one
Preempt
Speaker - Yaron Zinar
More info
Other webinars you may like
FREE
Aug 21, 10.00 AM (GMT -07:00)
Transform Your Approach To Customer Experience
Your customers' expectations are changing dramatically due to the adoption of AI, predictive analytics, digital business and IoT. Managing the customer experience (CX) during marketing, transactions and customer service is good…but not good enough. Your most important customers and partners
Aragon Research
Speaker - Betsy Burton
More info
FREE
Aug 22, 12.00 PM (GMT -04:00)
Warehouse Management Systems for the Mid-Market: Value Drivers
A successful warehouse management system (WMS) implementation in an un-automated facility can provide a rapid return on investment. But is the investment right for the small to medium sized business? A WMS can serve as a foundation for instituting a continuous improvement culture and facilitates on-going
APICS Atlanta
Speaker - Chris Barnes
More info
FREE
Aug 27, 10.00 AM (GMT -07:00)
How We Bypassed All NTLM Relay Mitigations
Active Directory has always been a popular target for attackers — and one of the weakest spots in Active Directory environments lies in the design of one of the oldest authentication protocols, NTLM. From CVE-2015-0005 to the recent LDAPS Relay vulnerability, it is clear why this protocol is one
Preempt
Speaker - Yaron Zinar
More info
Other webinars you may like
FREE
Duration: 60 Min
20th Century Leadership Skills in the 21st Century
How do the leaders that were taught in the 20th century lead groups and companies in the 21st century? Is there any difference in leadership skills from 30 or 40 years ago to the present day with Millennials? And how do the leaders of the last century get ready to guide those upcoming individuals to
Michelin
Speaker - Chuck Baker
More info
FREE
Duration: 30 Min
Business Data Onboarding Better By 10X With Large File Data Ingestion
Large volume of data is an old adversary of data integration and onboarding solutions. Enterprises relying on sub-par data exchange technology can barely handle files more than 1 GB, which is abominably low per today’s standards. Moreover, they consume a fair amount of money, time, and effort
Adeptia Inc.
Speaker - Raman Singh
More info
FREE
Duration: 60 Min
The Resilient Supply Chain
Amazon has turned the business landscape on its head. Netflix has transformed the entertainment industry. Uber has revolutionized the transportation industry. Aerospace firms are feeling the squeeze. Are you ready for what’s next? According to LMA Consulting Group’s research study, The
LMA Consulting Group Inc
Speaker - Lisa Anderson
More info
SHOW ALL WEBINARS
ARE YOU 100% SURE YOU WANT TO YOU WANT TO DISCONNECT ?

Yes No
ARE YOU 100% SURE YOU WANT TO REMOVE THIS SPEAKER ?

Yes No
THIS SPEAKER CANNOT BE REMOVED. YOU HAVE ALREADY SELECTED THIS SPEAKER ABOVE. SELECT ANOTHER SPEAKER ABOVE TO REMOVE IT.

OK
PLEASE TYPE A VALID KEYWORD IN THE SEARCH FIELD