article thumbnail

6 best practices for better vendor management

CIO Business Intelligence

And how well an IT leader deals with and orchestrates vendor relationships can mean the difference between a well-organized and efficient IT operation and a mess that costs an organization millions of dollars without delivering positive results. Here are several key tips for making the most of vendor relationships.

article thumbnail

Vendor management: The key to productive partnerships

CIO Business Intelligence

What is vendor management? Vendor management helps organizations take third-party vendor relationships from a passive business transaction to a proactive collaborative partnership. While working with IT vendors can help ease the burden on IT, it also raises concerns, especially around data, risk, and security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

Five little vendors access your data. The first one said, "For this company, vendor management doesn't seem to matta." The fourth one said, "Regulation requires vendor control." In honor of Halloween, it seems appropriate to address one of the scariest issues facing organizations today: vendor or supplier management.

article thumbnail

What Is TPRM? Just Ask T-Mobile

TM Forum

T-Mobile has signed on to use the FICO® Cyber Risk Score as a key quantitative risk metric in its vendor management program. So how can you measure the cyber soundness of your entire supply chain?

Mobile 104
article thumbnail

Vendor Risk Management & Complying With GDPR 

Galido

Among these is putting in place a robust vendor risk management program to help in identifying, tracking, and monitoring your firm’s risk exposure. To be ready for GDPR, companies will need to overhaul some critical business operations, and their vendor risk management programs are among them.

article thumbnail

5 common consultant negotiation tactics and how to protect your interests

CIO Business Intelligence

Consultants recognize that program leadership is not naïve to the nature of these executive-level relationships and are likely to flex this relationship leverage during commercial negotiations with the program-level team. Every consultant’s primary goal at the beginning of a program is to avoid the downstream RFP process.

How To 128
article thumbnail

CISA Urges Critical Infrastructure Operators to Protect Supply Chains

SecureWorld News

Every security and IT program has to begin with accurate inventory (i.e. The Cybersecurity Supply Chain Risk Management Practices outlined by CSRC/NIST can be part of a comprehensive third-party risk management program." Once that is done identifying riskier devices becomes easier.