LinkedIn Buyers Meeting Point procurement Kelly Barner twitter Buyers Meeting Point procurement Kelly Barner scribd Buyers Meeting Point procurement Kelly Barneryoutube Buyers Meeting Point procurement Kelly BarnerAdobeStock podcasticon


Buyers Meeting Point is home to two blogs: The Point is written by BMP's Kelly Barner and a diverse group of guest contributors. MyPurchasingCenter was acquired by BMP in 2020 we now showcase their content archive on BMP.

Risk Management in Supply Chain and Procurement: Preparing for the Storm

Although we’re a few weeks past the Hanjin Shipping bankruptcy now, the shake up left experts, businessmen, companies, and customers alike wondering what other events could potentially jeopardize their operation or interfere with getting the product they ordered on time. There are countless risks in a globalized economy, making it a subject of relentless discussion among academics. That being said, some of the biggest companies in the world still do not have a team dedicated to risk management for their supply chain and procurement operations. A recent report by ATKearney and RapidRatings on managing supply risk in uncertain times found that “leaders have struggled to manage the latent risk in their extended supply chains. Most cite lack of bandwidth and budget as the biggest roadblocks. Dedicating scarce resources to prevent or minimize the impact of an issue that might never occur is often not a priority.”

With globalized supply chain operations, risk is growing and managing it is more critical than ever. Some risk factors have been greatly discussed in the industry, and others not so much. Below are a few of the risks threatening global supply chains as well as solutions and action items.


Continue reading
  5761 Hits

Best Procurement and Supply Chain Webinars 2/15 - 19

This week starts multiple weeks of ProcureCon events – in Toronto this week and in Orlando the week after that. Follow @ProcureCon on Twitter if you’re interested in the goings on. From a virtual standpoint, there are two worthwhile events taking place – see why I think so below. Click on the title of each event below to view the full description in our events calendar and to connect to their registration pages.


Continue reading
  3925 Hits

Webinar Notes: The Preparis 2014 Threat Report

This week’s featured webinar notes are from a February 6th webinar hosted by Preparis. The event is available on demand on their website. The event was fascinating, in no small part because of the qualifications of the speakers and the organizations they represent.

Continue reading
  3283 Hits

Blog Pick of the Week: How Secure is your data?

How safe is your data and how secure are your supplier interactions? 

Many organizations are interested in cyber security and protecting their business. It is a serious economic challenge and we need to be able to depend on having a secure cyberspace.

This article in Supply Chain Brain discusses the issues as they relate to supply chain and procurement professionals. There are very complex relationships in an organizations supply chain and it is difficult to know where the risks are. Data for specifications, consumer credit card information, legal matters are just a few areas that need to be protected.

There is a standard known as ISO27001 which can serve as a great baseline and starting point. There are 11 parts of the standard.

  1. Security policy - management direction
  2. Organization of information security - governance of information security
  3. Asset management - inventory and classification of information assets
  4. Human resources security - security aspects for employees joining, moving and leaving an organization
  5. Physical and environmental security - protection of the computer facilities
  6. Communications and operations management - management of technical security controls in systems and networks
  7. Access control - restriction of access rights to networks, systems, applications, functions and data
  8. Information systems acquisition, development and maintenance - building security into applications
  9. Information security incident management - anticipating and responding appropriately to information security breaches
  10. Business continuity management - protecting, maintaining and recovering business-critical processes and systems
  11. Compliance - ensuring conformance with information security policies, standards, laws and regulations

Have you done any of the list above? I know I have participated in exercises that involve many of them. What did you learn and which have you found to be most effective?


Continue reading
  2526 Hits

BMP 10 banner logo