Comprehensive software reviews to make better IT decisions
Can a Vendor Management Initiative Influence Organizational Performance?
Can a vendor management initiative influence organizational performance? The concise answer to this question is yes. However, this influence doesn’t occur overnight. Your vendor management initiative must progress through four levels of influence from tactical to strategic to achieve organizational impact. Exploring Info-Tech’s Four Levels of Vendor Management Performance will guide you through your vendor management initiative’s maturation of organizational influence.
The Four Levels of Vendor Management Performance are:
- Basic Vendor Management
- Vendor Performance
- Vendor Management Performance
- Organizational Performance
Basic Vendor Management
Starting with the Basic Vendor Management level, the vendor management team must identify opportunities and execute tactical fundamentals of vendor management. These tactical fundamentals typically include contract negotiations, contract management, spend analytics, and routine sourcing activities.
Monitoring vendor performance is the next level in our progression of influence. The vendor management team needs to perform vendor service level agreement/objectives (SLA/SLO) monitoring with periodic business reviews along with market intelligence/benchmarks to influence the vendors' performance.
Vendor Management Performance
Upon establishing competencies at the Vendor Performance level, the vendor management team needs to perform self-evaluation by examining how well the vendor management team is performing. Measuring the team’s performance in areas such as value creation, the quantity of negotiated contracts, spend addressed, and vendor management return on investment will provide insight into the opportunities for improvement and successful accomplishments to highlight.
The ultimate aspirational level of the vendor management team is influencing their organization’s operational and financial performance. Leveraging the vendor management team’s knowledge and fluctuations in the market place allows the team to influence the organization’s IT strategy and architecture and even the organization’s products and services. The vendor management team’s success in cost reductions, improving efficiencies, and value creation will contribute to the organization’s financial performance.
The graphic below summarizes the Four Levels of Vendor Management Performance explored above.
Four Levels of Vendor Management Performance
A significant amount of an organization’s decisions involves information provided by IT. Thus, a highly competent, experienced vendor management team should aspire to influence the operations and financial performance of their organization by being a business solution architect that is a trusted advisor for IT strategy that drives business value by improving operational and financial performance. Understanding the Four Levels of Vendor Management Performance will establish your vendor management initiative in an optimal position to influence the operational and financial performance of the organization.
Want to Know More?
The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.
The United States Marine Corps adds Appian’s low-code automation platform to its Platform as a Service (PaaS).
The International Association of Privacy Professionals (IAPP) has released its 2020 Privacy Tech Vendor report, reviewing key software solution vendors within the space. This year’s report highlighted the recent addition of Data Subject Request (DSR) to the feature categories.
In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages machine learning and AI in an effort to manage data that contains potentially sensitive or high-risk personal information.
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data to be used for multiple use cases without compromising privacy.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the leading factors behind CFGI offering Workiva to its clients.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.