You have the right strategies, you have the right people and processes. Now it’s time to implement third-party risk management efficiently, because no one wants added cost pressures.
With so much data being created and passed around, traditional or manual practices are no longer suited to the new reality of sheer information volume and scale.
As there is no one-size-fits-all solution, organisations have started to configure their technology stack to support third-party risk management programs across different business functions – while ensuring shared visibility.
Before diving deeper into the specific ways in which technology can help, it is useful to consider the high-level benefits to set the right level of expectations for technology adoption. Many of the benefits fall under the "cost avoidance" category:
The following tables provide a vendor management risk / technology matrix - or how technology can help mitigate various risk areas mentioned in previous articles of this series.
With each risk topic, you’ll find a description of the risk, the consequence for not managing it, the technology solution, and the benefits.
|
Legal compliance |
Diversity quotas |
Exposure to fraud (external) |
Description |
Unethical, non-compliant practices conducted in your supply chain, intentionally or not |
Government-imposed or corporate sustainability quota requirements not met |
Unauthorised vendor profile updates |
Consequence |
Non-compliant organisations may face penalties or brand damage |
Missed opportunities on government contracts and revenue, brand reputation |
Payments made to imposters of the vendor |
Solutions |
Prequalification questionnaires, compliance document expiry notifications |
Supplier database segmentation and reporting, prequalification questionnaires |
Secure vendor portals and notifications of significant changes |
Benefits |
Legal compliance at scale, better vendor relationship management |
Better understanding of supplier pool to diversify sources, improved standing with clients |
Improved security and accountability |
|
Exposure to fraud (internal) |
Business continuity/ Overdependence |
Choosing the inappropriate vendor |
Description |
Conflict of interest not declared or managed properly |
Business disruption due to issues with key vendors. |
No accessible data to inform decision making during the subcontractor selection process |
Consequence |
Value for money not achieved and possible investigation (internal/external) |
Operational delays, financial loss, or diminishing gains from bulk buying
|
Value for money not achieved, potential delays or reputational issues |
Solution |
Tailored valuation and approval workflows, audit trail of procurement activities |
Up-to-date prequalified vendor database. Access to an open marketplace |
Up-to-date vendor database, evaluation & approval workflow |
Benefits |
Oversight of supply chain, ensuring probity |
Diversified vendor pool for competitive advantage |
Business continuity, or defensible decisions |
|
Failure to deliver on contract |
Spend leakage |
Inefficient tools/systems |
Description |
No shared visibility over contract timeline and milestones |
Lack of process governance, maverick spend, poor spend visibility |
Reliance on manual or paper-based processes, task duplication and siloed systems |
Consequence |
Project delays, potential financial and reputational impact |
Pressure on margins, operational delays due to cost overruns |
High administrative burden that leads to process bottlenecks and non-compliance |
Solution |
Contract management, post-engagement performance evaluation |
Audit trail of procurement activities, threshold protected purchasing, ERP integrations to match PO records. |
Automated workflows, customisable user access, audit trail |
Benefits |
Opportunities for early rectification, informed decision at next sourcing event |
Supply chain visibility and accountability |
Enabling efficiency, collaboration and governance |
As always, the caveat is technology alone does not solve the third-party vendor risk management puzzle. It helps align people and processes, thereby enabling stronger governance.
Another way to look at it is technology serves as the conduit between the lines of defence mentioned previously. Below is an example of the vendor onboarding process facilitated by technology across different stakeholders.
Indeed, this is the perfect-world scenario, where stakeholders at all levels are aligned on the executives’ vision around risk mitigation, processes are designed to match users’ needs, and investment into the right technology platform is made to ensure maximum uptake.
Supply chain risk management is an enterprise-wide initiative that requires collaboration across traditionally siloed departments: procurement, legal, Industrial Relations, operations.
How do we move from firefighting to prevention, from reactive to proactive?
And how much budget should we allocate to supplier risk and performance management? Figures have been thrown around, such as:
“Organisations should also consider allocating a higher proportion of annual enterprise risk management operating expenditure (opex) to pre-screening and exit planning and termination activities – perhaps about 10% to each of these. This would supplement the focus on selection – due diligence and contracting at 20 to 30% of the budget, and ongoing monitoring at 50% or a little above.” (Deloite)
In short, organisations need to increase investment to match the importance of third parties in the supply chain – which is high as ever.
Our latest research report Building in the Dark - High-risk Supply Chains: Attitudes, Responses & Opportunities also touches on how industry peers are or are not using technology in managing their vendors.
If you’re interested in some benchmarking data to build a business case, download the white paper here.
Our previous post taking inspiration from the Ever Given saga, touched on some tips to build a business case for procurement software. No matter what job title you have, chances are you’ve already known you need a solution, now it’s just a matter of convincing others to share your vision.
Procurement governance has never been a particularly exciting topic. Given increasing compliance requirements, procurement has given and been given a host of policies and guidelines to follow. But is it enough to mitigate procurement risks and ensure compliance?
In today's rapidly evolving landscape of capital and asset-intensive industries like construction, mining, critical infrastructure and utilities, procurement leaders find themselves at a crossroads. The pressure to digitise procurement processes is mounting, but with limited budgets and a dizzying array of options, the path forward isn't always clear.
Do you invest in an all-in-one procurement suite, nd risk navigating a monolithic, large-scale transformation with an exhaustive implementation cycle, as well as considerable costs and time to value realisation, promising to revolutionise your entire process overnight? Or do you opt for a point solution, addressing a specific pain point but potentially creating new silos? Perhaps you're tempted to maintain the status quo, relying on tried-and-true (albeit manual) methods to keep the gears turning.
Get the monthly dose of supply chain, procurement and technology insights with the Felix newsletter.