#3 – SUPPLY CHAIN CONTINUITY – BETTY KILDOW – SUPPLY CHAIN @ RISK

Every company’s supply chain – from procurement through delivery and everything in between – is directly tied to cash flow, profitability, and growth, as well as to essential intangibles such as customer trust, stakeholder confidence, company reputation, and protection of the brand.  In addition, there are increasingly stringent regulations and audit requirements that apply to supply chain risk management.

When a disaster or significant disruption of operations occurs –whether it is internal or external such as a supplier failure – your operations can be slowed down or even brought to a halt, possibly with grim consequences.  Logic tells us that to successfully manage enterprise risk the supply chain must be fully considered and integrated in a comprehensive business continuity program.   Yet despite growing awareness and reminders in the form of an ongoing series of disasters experienced across the globe over the past few years, many business continuity plans still do not adequately address the supply chain.

In alignment with business continuity best practices, here are some of the initial steps to take to identify and mitigate supply chain risks when selecting suppliers.  These guidelines are equally applicable to contractors, outsourcing companies, and other business partners.

 

As a first step, map your supply chain and identify:  critical suppliers (primary and their tiers), single points of failure, single points of contact, as well as internal dependencies including the IT support needed to keep the supply chain functioning.

Caveat Emptor!  Gain an understanding of who your critical suppliers are and which ones are high risk suppliers.  Avoid taking on a risk-laden supplier by making certain each of your suppliers is capable of managing their risks and continuing to deliver at a level to meet your requirements even in the face of a disaster.

Conduct an evaluation to gain full understanding of the inherited risks that come with each supplier.  The following list of questions, while not all-inclusive, will help provide you with vital information to consider during the supplier selection process:

  •        What are their risks and vulnerabilities?
  •        Are supplier’s operations geographically dispersed?
  •        What are the supplier’s logistics risks such as possible port closures, shortage of containers for ocean shipping, and customs issues?
  •        Are there geo-political issues that can cause operational disruptions?
  •        How transparent are their operations?
  •        How vulnerable are their suppliers?
  •        How likely are they to face shortages of purchased raw materials?
  •        How financial healthy is the supplier?
  •        Do they have proven effective security to protect your company’s data and intellectual property?
  •        Will they jeopardize your ability to meet regulatory or legal requirements?
  •        Are their business ethics in alignment with yours?
  •        Does the supplier consider your company a priority customer?

Gain an understanding of suppliers’ risk management capability by asking the right questions about their business continuity program.  Some of the basic questions to ask are:

  •        Do they have a Business Continuity Program?
  •        Is it enterprise-wide or recovery of IT only?
  •        When was the plan initially develop and when was it last tested, reviewed, and updated?
  •        Has the plan been audited; if so, by whom and what were the results of the audit?
  •        Does the plan provide for continuation or restoration of operations that will allow the supplier to meet SLAs and contractual obligations?

A well-developed and maintained business continuity program is critical to successfully managing supply risk and maintaining a resilient supply chain. Taking the steps necessary to identify, assess, and manage supply chain risks will help organizations mitigate and respond to disruptions that can carry serious financial and reputational consequences.

BIO:  Betty A. Kildow, CBCP, FBCI, has been a business continuity consultant for two decades, working with a broad range of companies and organization in the development and implementation of tailored programs to manage risk.  Betty is a member of the Peer Review Panel for the Business Continuity Journal and serves as a Board Member of the Institute for Supply Management (ISM) Risk Group.  Long a strong proponent of supply chain business continuity, she is the author of “A Supply Chain Management Guide to Business Continuity” (AMACOM 2011), also available in Japanese:  事業継続」のための サプライチェーン・マネジメント 実践マニュアル, プレジデント社 (President, Inc. 2011).  She can be contacted at BettyKildow@comcast.net

#1 – FUTURE OF QUALITY: RISK MANAGEMENT! WHO SAYS? GOOGLE – GREG HUTCHINS

Greg Hutchins pixI’ve been a quality professional for years.  I’ve written some of the best selling books on quality.  But, over the last 10 years, I’ve noticed that quality professionals are endangered professionals.

Well remember the quality guru’s that said; “Everyone is responsible for quality.”  Well they were prescient.  What is the job of the quality professional, when everyone is responsible for quality?  Good question. They may be endangered based on the following data points:

Continue reading

#1 – SIX THINGS RECRUITERS WILL NEVER TELL YOU – ELIZABETH LIONS – CAREERS@ RISK™

Elizabeth Lions PixEarly in my career as a recruiter, I was treated poorly by a job seeker and couldn’t understand why.

After several conversations that felt more like a heated sparring match rather than professional dialogue, I mustered the courage to ask him why he was so curt. Clearly, he was upset and didn’t want to have the conversation.

Continue reading

#1 – I’M MAD AS HELL AND I’M NOT GOING TO FACEBOOK ANYMORE – CAROLYN TURBYFILL – LIFE@RISK™

By Carolyn Turbyfill, Ph.D.
cturbyfill@me.com

For those of you who have never seen the movie “Network”, (http://www.imdb.com/title/tt0074958/), I am paraphrasing the character Howard Beale, the “mad prophet of the airwaves”, who strikes a chord with his TV audience when he tells them to turn off their TV’s, go to the window, and shout “I’m mad as hell and I’m not going to take it anymore.”

What are we giving up as we merrily update our status?  Potential passwords:  birthdays, anniversaries, graduation dates, names of pets, children and friends?  Vacation and other travel plans so burglars know when your home will be vacant?  Work information: conferences, co-workers, work locations? Phone numbers, email addresses?  Lots of pictures that someone can use to add verisimilitude to your supposed acquaintance?   Social networking sites are a gold mine for spammers, identity theft, spear phishing, whaling and advanced persistent threats.  Companies are even jumping on the Facebook bandwagon, creating Facebook groups for employees.  But these groups, private or not, are still hosted by Facebook and can provide another target for attackers (insiders and outsiders).

Service providers and their partner websites plant cookies galore on your computer, track your browsing and even upload your address book.  Even when a service provider has a clear privacy policy that you can live with, the policy almost always has a disclaimer stating that you may link to web sites from the service provider that does not apply the same privacy policy.  Vendors may also change their policies so you can’t assume that the policy you agreed to is still extant.

I recently cancelled my Facebook, LinkedIn and Plaxo accounts for several reasons.  First, I was getting way too much spam, which has been greatly reduced.  Second, I was getting too many invitations from people I didn’t know or didn’t want to add to my network.  The last straw on LinkedIn was an alleged bio-weapons expert from Afghanistan.  Third, I am thinking less is more.   I don’t want to live my life like I am on a TV reality show.    I have a few friends who know me well.  Every acquaintance is not a friend.  When I have something to contribute, I can provide content to a blog or a website.

So think about not being one of the 800 million notches in Facebook’s belt and fattening the pockets of people who sell your information. Form some exclusive mailing lists – like people who are really friends or family.  Use some great privacy and anonymity services and even pay for them:

http://www.guard-privacy-and-online-security.com/international-anonymizers.html

http://filesharefreak.com/2008/11/29/the-10-best-free-web-proxies-for-anonymous-surfing/

Better yet, write a letter on real paper. A handwritten note may do more to get someone’s attention than one of many emails.