Monthly Archives: August 2011

Listen to BrainNet – Invest your Avoidance Savings to Keep Costs Down

In the recent CPO Executive debate on public sector spend and savings measurement, transcribed in “Cuts from the Centre” and previously referenced in our post on how your Organizational Data is Organizational Data — NOT Department Data, Fredrik Henzler, Partner and MD, of BrainNet, made a great point — while there is no incentive for a provider to offer the same product or service at a 10% discount if they can continue to get what you are paying now, if you offer to split the savings and let the provider invest a portion of the savings in long-term operational and infrastructure improvements, then there is incentive. If the provider can reduce the cost of their product or service, then they have money to invest in new technologies to further improve efficiency and reduce cost, which will keep the provider competitive as time goes on.

Furthermore, if you don’t get greedy and allow your provider to keep a larger margin if, and only if, they invest in operational improvements, then you know that costs will continue to drop over time and you have likely bought yourself years of cost “savings” and will be able to acquire new products and services at a lower price point than your competitors. Not only is it a win-win, but it incentivizes your providers to reach new heights of efficiency and effectiveness. So invest your savings, and just like money deposited in a high-yield savings account, watch your savings grow over time.

Risk Management Is Your Top Priority – But Are You Prepared for the Billion Dollar Threat?

As per this recent article over on Chief Executive that asks [if] your company is vulnerable to cyber-sabotage, if your company gets hacked, like Sony had its PlayStation Game Network hacked, then you too could be looking at about $1 Billion in tangible damages and an incalculable toll in lost customer goodwill, tarnished brand equity and sleepless nights for the corporate brain trust. Especially if you are in the Financial, Retail, Restaurant, or Hospitality sectors.

Cyber-Sabotage is on the rise. According to IBM, more than 8,000 new cyber-sabotage “vulnerabilities” were identified last year, up 27% from 2009.

But what can you do? The article recommends that you:

  • Become the Security Champion
    And put cyber-security at the top of corporate priority lists.
  • Beware of “Social-Engineering”
    Make upper managers aware of their own vulnerabilities to attacks that exploit the behaviour of strategically positioned individuals rather than involve a broad cyber-sabotage campaign.
  • Draw the Difficult Lines
    And set up an early warning system since it’s impossible to prevent every possible attack.
  • Dig to the Roots
    Be aware that unhappy contractors, customers or partners can become cyber-accomplices, and even cyber-criminals, if they are financially desperate enough.
  • Survey the Changing “Threat Landscape”
    The rapidly rising number of smart-phone “apps” is providing cyber-criminals with opportunities to exploit mobile-data networks.
  • Know the Four Common Categories of Cyber-Saboteurs
    • Foreign Government Intelligence Services
    • Transnational Criminal Enterprises
    • Corrupt Competitors
    • Corporate Insiders

It’s not bad advice, but it doesn’t really help. It’s great to fly a flag, but that’s not enough. And even if a manager knows he is vulnerable to social engineering, that doesn’t tell him how to tell when an individual might be trying to socially engineer information out of him. And just what should an early warning system look like? And how do you identify what individuals inside your four walls might turn on you? And how does knowing what types of cyber-saboteurs are out there help you stop them from penetrating your networks?

You need to know A LOT more than you do. And you’re not going to figure it out on your own. So you pretty much have two choices.

  1. Outsource to a “Cloud” Company that are masters of SaaS and Security or
  2. Hire a Security Consultancy with the Expertise to Not Only do a Security Analysis but to Train you on what needs to be done to Minimize Risk from a Technical and Social Perspective.

That, in a nutshell, is what you need to know, because unless IT Security is your business, you won’t master it.

The Triple Bottom Line will Soon Be The Norm

Is your Supply Management organization ready?

The Triple Bottom Line — which balances economic, environmental, and social performance in order to make a corporation more sustainable — is gaining more support by the day. As per this recent article over on Chief Executive on the ‘Shareholder Push for the “Triple Bottom Line”‘, the percentage of social and environmental shareholder resolutions that garnered at least 30% shareholder support, rose from a mere 3% in 2005 to 26.6% in 2010. At the current rate that support is increasing, it’s just a few years before the majority of social and environmental shareholder resolutions exceed the 30% threshold and not many more years before the majority of well-formed social and environmental resolutions pass.

So, is your Supply Management organization ready?

Unless it is a true CSR leader, probably not. So where should it start? Near the end of 2008, CAPS published a “Critical Issues Report” that addressed the Triple Bottom Line (TBL) framework offered some suggestions for an organization that wanted to get started on the TBL path. Specifically, the report recommended that an organization:

  • Smart small (but do something).
  • Insure proposed strategies are aligned with overall corporate strategies and goals.
  • Incorporate green into your purchasing and sourcing processes.
  • Be proactive.
  • Make sure you’re not just greenwashing.
  • Form a cross-functional team to scale your efforts company wide.

The “Cloud” is Not a Magic Mirror Nor is it Omniscient

Quotes like this one:

Organizations need the visibility of their supply chains because they never know when they might be required to make a change to respond to world and market events. They have been actually talking about this kind of visibility for the past two decades, but now with new Cloud capabilities they are advancing into that environment

from a recent article in World Trade that purported to describe “a smarter supply chain” really bug me. Not only can one argue that the speaker is implying that the Cloud is necessary for good supply chain visibility, which it’s not, but that the writer, who notes that there has been greater company acceptance of the Cloud because the Cloud … can provide answers to new and existing problems, also appears to be arguing that the Cloud is necessary for greater visibility as well as smarter supply chains. Nothing could be further from the truth.

The Cloud is Not a Fluffy Magic Box (and there are more reasons and yet more reasons that this is the case) and simply throwing an application into the Cloud does not make it better. The nebulous Cloud does not enable applications that cannot be delivered over the traditional internet from a traditional data center. For most providers, the Cloud just happens to be whatever they have — multi-tenant SaaS in a redundant data center if you’re lucky, single-tenant ASP if you’re not. There’s nothing special or magic about it. And there’s no visibility inherent in it. The visibility is in the applications it is hosting (whatever it is).

Similarly, there is no “smart” in Cloud. Any “smart” is again in the application that is being hosted. And there is no magic data connector in the Cloud either. It’s not Cloud-based solutions that provide more affordable ways for suppliers to link to a common database — it’s more efficient providers that use economies of scale to offer good ETL solutions at fair prices to a large customer base.

Finally, the “Cloud” is NOT a Supply Chain Solution. e-Sourcing. e-Procurement. Inventory Management. Demand Management. Spend Analysis. Optimization. Those are Supply Chain Solutions. The Cloud? It’s just a delivery mechanism. Nothing more.