Browsing: Protection software

A retail giant was recently the target of the largest hacking operation in history. The name is not important as the story is equally applicable to many other companies. And those of you who have been through the advanced curriculum of our Strategic Sourcing/Supply Chain “University” will remember the discussions in the Risk Management class on this topic. The best designed Risk Management solutions (consonants) are worth nothing unless they are adopted by the organization (vowels).

Share.