Completing the Puzzle

In a previous blog I reviewed the real world pay back for being a risk leader.  Let’s say your company gets it, they know that good risk management increases the likelihood objectives will be fulfilled and profits improved, and now you’ve been given the assignment to start the risk management program to make your organization a risk leader.  Where do you start, how far do you take the program, and how do you get from start to finish?

Today, most organizations operate based on a complex interrelationship of business processes, technology, telecommunication, supply chains, and outsourced activities.  Putting the puzzle pieces together may not be easy in your organization.  No one talks about risk the same way.  Gathering, analyzing and understanding the pieces is challenging, and difficult to consistently convey to the boss with the limited resources available and within the deadlines given.

Working with thousands of companies to build a risk and compliance program tailored to their most pressing needs taught us that most organizations just starting out tackle the same problems and follow the same general path.  We have consolidated these pieces into the RSA Archer® Ignition Program.

As discussed in the earlier blog, RSA Archer Ignition Program is a fast track, economical, approach for launching the foundational elements of a business risk management strategy, helping organizations get up and running as quickly and easily as possible.  The RSA Archer Ignition program includes:

  • The ability to catalog and monitor Risk, to establish a strategic method to understand risks across the enterprise;
  • The ability to identify and track Third Parties used by your business to understand the emerging ecosystem that affects risk;
  • A process to manage Issues that arise from audits, risk assessments, and internal compliance activities;
  • A Business Impact Analysis framework to quickly catalog and prioritize assets and business processes to build the context to connect risk and prioritize technical and organizational risk treatment measures;
  • Fixed-price deployment and quick launch professional services to let you quickly stand up your environment; and
  • Insights and best practices from RSA University.

With organizations outsourcing so much of their business activities these days, it is critical to understand and manage these outsourced relationships.  As part of the RSA Archer Ignition Program, the RSA Archer Third Party Catalog allows organizations to document all third-party relationships, engagements, and associated contracts, as well as the business units and named individuals in the organization responsible for each third-party relationship. With RSA Archer, you understand the significance of your outsourced relationships, reporting all third-party information – including profiles, engagements, third-party business hierarchy, internal contacts, facilities, third-party contacts, and more – within a single repository.

Key Features of the RSA Archer Third Party Catalog allow you to:

  • Catalog organizational elements of your business for third-party reporting
  • Catalog suppliers, partners, service providers and other third parties
  • Capture important details related to third parties, including contracts
  • Map internal business units to third parties
  • Manage contacts with third parties
  • Efficiently manage your third-party relationships
  • Establish accountability for each third-party relationship
  • Track exceptions related to third party relationships

With the RSA Archer Third Party Catalog, you:

  • Obtain Awareness of all third- party relationships throughout the organization
  • Reduce time spent identifying third-party relationships and contracts
  • Build awareness of manager’s accountability for individual supplier relationships, quickly identifying relationship owners
  • Track contract terms, including notification of key contract events such as contract obligations and renewal and expiration dates

The RSA Archer Ignition Program empowers organizations of all sizes to complete the puzzle, to respond to risk with data-driven facts using a streamlined, fast time-to-value approach.

No Comments