Welcome Guest

LoginRegisterYour Cart

Friday, November 16, 2018

ICNCornerStore.com Home

Virtual Seminars

Gain information without taking time away from the office! The next 3 scheduled Online Seminars are listed below. Click here for a full list. For a list of previously held Online Seminars available for purchase, click here.

 

Procurement Transformation: Eastman Chemical Company Case Study

Starts Tuesday November 27th, 2018
12:00 pm – 1:15 pm Eastern

Click here for details and to register.

Presented by:

Mike Gonce
Global Procurement


In order to enhance the competitiveness of their companies, and meet the emerging challenges on the horizon, Procurement must evolve and transform by 2020 to be a strategic entity that drives enterprise-wide value. Eastman Chemical Company chose to accelerate its journey toward world-class performance with a focus on people, process, and tools. This session will provide a case study of Eastman and discuss how Procurement can be a collaborative partner that is aligned with the business to deliver sustainable results. Some topics include:

• Organizational Structure
• People Capabilities
• Technology Investments
• Process Changes

 Register Today! 

 

Final steps in Onboarding a Supplier for PO Issuance

Missing target dates should not be Procurement's

Starts Tuesday December 4th, 2018
12:00 pm – 1:15 pm Eastern

Click here for details and to register.

Presented by:

Dennis Diamond
Category Manager, Procurement
Click for bio info.

Procurement must make sure that once the supplier is selected and the contract is signed the PO process does not become an impediment to getting the project started.    

 Register Today! 

 

Partly Cloudy with a Slight Chance of Contract Enforcement

Starts Wednesday January 16th, 2019
12:00 pm – 1:30 pm Eastern

Click here for details and to register.

Presented by:

Ruth Ginzberg, CTPS
Senior IT Procurement Specialist
Click for bio info.


3rd party vendors are involved in roughly 60% - 70% of all data breaches. If you are relying on your legal counsel, procurement department, or I.T. department to lock down the security risks in your cloud contracts, then you probably have security vulnerabilities you don't realize you have. This is true regardless of how good your cloud supplier’s technical security controls are. The contract itself and its administration can create vulnerabilities.

This goes beyond, "Do I own my own data?" or "Did we attach our company’s cloud contract rider?"  Good cloud contracts require information security professionals' involvement in all aspects of their creation, administration, and enforcement.  Managing 3rd party risk in the cloud requires the application of supply chain management risk reduction practices to the cyber sphere.

 

  • Understand how unnecessary risks can be introduced during the contracting process
  • Identify the most important security risks in existing contracts in your organization
  • Develop strategies to transfer, mitigate, avoid or eliminate those risks 

 

 

 Register Today! 

 

Recently held Webinars available for purchase:

SAM and ITAM Programs - How to Avoid <span class='highlight'>Failures!</span> SAM and ITAM Programs - How to Avoid Failures!
By listening to this webinar you have become a prospective CAUCUS member. Within the next thirty days of you paying for this video, you will have this money carry over in the form of a credit towards …   
more info »
eSIGNATURE - Contract Signing and Much <span class='highlight'>More!</span> eSIGNATURE - Contract Signing and Much More!
This Webinar is for you if you are considering procuring eSIGNATURE technology, or even if you are already in the midst of the acquisition process, or trying to find ways to improve  your company…   
more info »
Software Audits - Part 1: What the Pros say Software Audits - Part 1: What the Pros say
CAUCUS members pay only $19. Use your member log-in and SAVE! Software audits can be painful and expensive. Many CAUCUS members report increases in the number and intensity of formal audits. One …   
more info »
Bring Your Own Device (BYOD) Bring Your Own Device (BYOD)
In this CAUCUS Webinar on BYOD presented by an industry expert, you will get actionable answers to key BYOD questions including: 1.     Will BYOD (Bring Your Own Device) save …   
more info »
Some Key Questions for Open Source Deals Some Key Questions for Open Source Deals
Some Key Questions for Open Source Deals Learn what drives the quiet revolution of Opens Source software licensing Get an update on how to safely use Open Source Discover the far-reaching…   
more info »
Mentoring: A Panel Presentation Mentoring: A Panel Presentation
Mentoring: A Panel Presentation   Learn how to use Mentoring to boost your IT procurement career See how informal Mentoring differs from formal, and which is best for you Hea…   
more info »
Support & Maintenance for Cloud Services Support & Maintenance for Cloud Services
…   
more info »
Natural Disasters of 2014: How to Contract for Survival Natural Disasters of 2014: How to Contract for Survival
Do you have the best practice disaster recovery/business continuity wording in place? Are hidden limitations of liability lurking in your technology agreements? Overview In this onlin…   
more info »
Software Asset Management: Objectives - License Maintenance and Licensing Software Asset Management: Objectives - License Maintenance and Licensing
This webinar will address two factors to consider in developing your software license management program (a subset of software asset management). SLM objectives: What are the required/expected r…   
more info »
Aladdin in the Cave of Treasures: How Software Vendors View Maintenance Aladdin in the Cave of Treasures: How Software Vendors View Maintenance
Software vendors love maintenance as a profit center and are not likely to give it up soon. But, they might try to hide it … 8 reasons vendors LOVE Software Maintenance-Vendors view the sa…   
more info »
"Does My Cloud Agreement Include Maintenance? Another modern fairy tale tragedy" "Does My Cloud Agreement Include Maintenance? Another modern fairy tale tragedy"
Cloud providers tell customers, "Don't worry, maintenance is included in the service." Is it really? Often the opposite is the sad truth. Get 7 way to improve our Cloud MX: 1. Cu…   
more info »
Preparing for the Year-End Negotiation Preparing for the Year-End Negotiation
The last few months of the fiscal year can make for an interesting time at the negotiation table. Vendors are under tremendous pressure to finish the year with their sales metrics pointing skyward a…   
more info »
Termination Clauses: Fact or Fiction Termination Clauses: Fact or Fiction
Fact:  Termination provisions don’t receive the attention they deserve. Fact:  Although termination provisions should be in the crosshairs from a strategic point of view, often a …   
more info »
Understanding the Microsoft Volume Purchasing Agreements Understanding the Microsoft Volume Purchasing Agreements
Microsoft Enterprise, Enterprise Subscription and Select Plus Agreements can create a myriad of options or restrictions for companies. Understanding these agreements and the appropriate time to leve…   
more info »
6 Commonly Overlooked but Potentially Dangerous Software Provisions 6 Commonly Overlooked but Potentially Dangerous Software Provisions
In this webinar, we’ll analyze six software license provisions that are often overlooked or receive a cursory review at best. We’ll look at the potential risks associated with each and str…   
more info »

About Us | Contact Us | Privacy Information | Terms of Service

Procurement Store | Drawer 2970 | Winter Park, FL 32790-2970

Phone: +1.407.551.2766 | Fax: +1.407.740.0368

© 2007–2018 International Computer Negotiations, Inc. All rights reserved.