4 Steps to Integrate Enterprise Risk Management Into Vendor Management

From our Sponsor

Tabletop Exercise: Civil Unrest Preparedness August 15, 2:00 pm ET

With the upcoming election and rising incidents of civil unrest, it’s crucial to prioritize your organization’s safety and resilience.

Join OnSolve and PreparedEx for an interactive tabletop exercise to run through a civil unrest scenario to ensure you are prepared.  In this live, interactive webinar, you will learn how to:

  • Structure an effective and engaging tabletop
  • Validate and enhance your Emergency Response Plans (ERPs) and Crisis Management Plans (CMPs) for civil unrest
  • Utilize timely intelligence and document event information
  • Ensure quick and clear internal and external communication
Register Now >>

Meet the Expert

4 Steps to Integrate Enterprise Risk Management Into Vendor Management

No one should discount the importance of vendors to their organization. Even if it were possible to handle everything internally, attempting to do so would spread any company’s people too thin. Vendors represent an external dependency that consists of both upstream “suppliers” and downstream “distributors.”

In this article, ERM expert Carol Williams explains how the disruption to any link in the supply chain can lead to a wide array of financial, reputational, or strategic consequences beyond any products or services themselves. Therefore, vendor risks require diligent effort to prevent any disruptions.

Learn the benefits of a holistic ERM process throughout the entire vendor management life cycle.

 

Read Carol's article >>

In the Know...

Take DRI's Annual Survey on Artificial Intelligence, Climate Change, Cyberattacks, and More

Reminder: DRI's annual risk and resilience survey needs your input! Your responses will help shape our profession as the basis for the annual resilience and predictions reports. These are useful resources for yourself and your peers, influencing upper management providing information for the media, analysts, and everyone concerned with resilience.

Take the survey >>

Risk Watch: Survey finds AI-enhanced malicious attacks top list of concerns

Gartner releases its 2Q24 Emerging Risk Report.

Read More

CrowdStrike Outage: Why the basics still matter

The recent massive IT disruption showcases why business continuity is still crucial to operations.

Read More

AI Insights: Cloudera report sheds light on adoption, challenges and future-proofing

A global survey of 600 IT leaders conducted by Researchscape gives context to the current landscape.

Read More

Resilience Tools: The benefits of getting out of your comfort zone

One of the ways to build resilience in your team might involve a little discomfort.

Read More

Crisis Comms: CrowdStrike outage highlights communications lessons

Global IT outage shows need for solid crisis communications plan.

Read More

Disaster Management: Can AI help?

Researchers at Texas A&M are exploring how AI can help manage disasters like hurricanes.

Read More

Sponsor

Office Kit on Wheels 20 Person

This kit is packed in a container on wheels with a locking mechanism and will assist in meeting most needs of survival, food, medical, sanitation, light, warmth and communication. The kit is designed for 20 employees.

Click HERE >>

Sponsor

New Venue for DRJ Fall 2024 September 8-11, Dallas, TX

DRJ's 71st conference "Building Tomorrow's Resilience Today" will be held at the Gaylord in Dallas. Don't miss DRJ favorite, Regina Phelps' session: May You Live In Interesting Times! The Question Is, 'How to Plan For Them?'

Download the conference guide >>

Let us know about your upcoming events

Click here to view our events

Industry Pulse

Video Update: NSA says to restart iPhones, Androids once a week for improved cybersecurity

The National Security Agency has issued a warning to iPhone and Android users: Reboot your devices regularly to fend off potential cyber threats. Linkedin resilience professionals say the same applies to laptops.

Listen to the report >>

4 Book Set - Implementing Cybersecurity, The Cybersecurity Body of Knowledge

Implementing Cybersecurity: A Guide to the National Institute of Standards – Implementing Cybersecurity provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity.

The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations – The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field.

How to Build a Cyber-Resilient Organization – 1st Edition – How to Build a Cyber-Resilient Organization presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation.

Supply Chain Risk Management: Applying Secure Acquisition Principles – Supply Chain Risk Management presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization.

Learn how to get your copy

THE MARKETPLACE

Is your company not listed? Would you like it to be?
Contact Us>> to learn how to be included!!

Looking for a product or service? You have come to the right place! Click on the products of interest and link directly to hundreds of suppliers featured in the Online GUIDE.

To see all categories, Click HERE >>