Browse Definitions :
Definition

supply chain risk management (SCRM)

Supply chain risk management (SCRM) is the coordinated efforts of an organization to help identify, monitor, detect and mitigate threats to supply chain continuity and profitability.

Threats to the supply chain include cost volatility, material shortages, supplier financial issues and failures and natural and manmade disasters. SCRM strategies and software help an organization foresee potential issues and adapt to both those risks and unforeseeable supply chain disruptions as quickly and efficiently as possible.

Jason Busch and Sherry Gordon of Spend Matters ( a global content network dedicated to procurement and supply chain issues) suggest the following best practices for supply chain risk management:

  1. Automate processes involved in supplier risk management (SRM) to collect, analyze and manage supplier information.
  2. Include supplier performance information in your analysis for insight into potential financial issues.
  3. Identify red flags that may indicate problems and use technology to automate their early detection.
  4. Integrate SCRM platforms with procurement and supply chain management (SCM)  software systems including software for spend visibility, e-sourcing, purchase-to-pay, contract management and compliance.
  5. Provide dashboards that track and report on supply risk metrics to give the executive team access to real-time observations into risk factors.

SCRM  may require collaboration and coordination among an organization’s sales, marketing, production, development, procurement,  finance and IT departments.

This was last updated in June 2016

Continue Reading About supply chain risk management (SCRM)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • DMZ in networking

    In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • Serial ATA (Serial Advanced Technology Attachment or SATA)

    Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is ...

Close