Browse the SRC




Search within: Entire SIG Website
  


This presentation covers: Key Factual Differences, Key Security, Privacy and Other Legal Challenges, Hurdles to Monitoring in Germany, BYOD Context in Latin America and Other Emerging Countries,...

This video provides an excellent overview of supply chain management risk and includes such learning objectives as; the critical nature of supply chains today, sources of risk for modern supply...

The state-of-the-art in procurement software unifies all the functions and workflows of source-to-pay into a single digital workspace. In this session the team from GEP will demonstrate, SMART by...

Original Source: Deloitte, Laura Toni 

"According to a study by the World Economic Forum performed in 2012, on average more than 25 percent of a company’s market value is directly...

Original Source: ITIL / Wikipedia

"ITIL (formerly an acronym for Information Technology Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses...

Original Source: Wikipedia / CMMI

"Capability Maturity Model Integration (CMMI) is a process level improvement training and appraisal program. Administered by the CMMI Institute, a...

Original Source: Monetary Authority of Singapore 

"The advancement of information technology (“IT”) has brought about rapid changes to the way businesses and operations are being conducted...

Original Source:  Fair Institute by Rachel Slabotsky

"I recently had a conversation with clients around a risk analysis they conducted and noticed as they walked me through it that they...

Original Source: Reciprocity WRITTEN BY KAREN WALSH

"PCI DSS compliance comes with over 100 pages of requirements. However, the Appendices offer ways to think about how you can limit your...

Original Source: Advocate Daily

"New causes of action for breach of privacy make data breach one of the most significant risks facing Canadian companies — but organizations may have an...

Pages