ADRIAN DAVIS INFORMATION SECURITY FORUM
|
|
|
- Brandon Gilbert
- 9 years ago
- Views:
Transcription
1 Securing the Supply Chain: Guide to Risk Management ADRIAN DAVIS INFORMATION SECURITY FORUM Session ID: GRC-201B Session Classification: Intermediate
2 Introduction
3 Introduction Presentation based on research across the ISF s 310+ Members Scope: global, covering all sectors Builds on our previous work: Information security for external suppliers: A common baseline (2010) The Standard of Good Practice for Information Security (2011) The Standard of Good Practice for Information Security (2012) 3
4 A typical supply chain Suppliers Suppliers Suppliers Suppliers Suppliers Supplier Acquirer Customer Ultimate (End) Customer Tier 3 Tier 2 Tier 1 This diagram has been adopted by ISO for the upcoming ISO/IEC standards Upstream Your organisation Typically from raw material to finished product Services Downstream 4
5 Supply chain: the information risk view Suppliers Suppliers Suppliers Suppliers Suppliers Supplier Acquirer Customer Ultimate (End) Customer Shared information: Personally identifiable Intellectual property Commercial Logistical Management Legal, regulatory and privileged Your organisation 90% of suppliers are upstream of tier 1 5
6 Building in information risk 6
7 Supply chain information risk components Law / regulation Industry sector Vulnerabilities Type of information shared Volume of information shared Criticality Information Business impact Extent of downstream sharing Extent of upstream sharing Level of threat Supplier attributes Number of suppliers 7
8 Information risks by sector Risks Impacts Solution Finance CIA Fines Franchise risks Regulatory risks Fines Suppliers financial ratings Integrity of data Loss of data Integrity Security Regulatory requirements (across borders and industries) Customer information leakage Vary depending on issue and data. We look at type, volume, frequency, whether it gets moved. Insurance Reputational damage is the biggest impact. If we lose our data we won t be seen as the best in the industry! Production Impacts vary widely, we try to focus on enterprise impacts i.e. Regulatory (PCI, privacy...) E.g. With food traceability if you couldn t comply, the worst case scenario is losing your business. Logistics Brand reputation Fines from data protection commissioner Loss of customers Use these criteria to produce a risk level which spans from very high to very low. This determines how quickly we will go on site after agreeing the contract with a supplier. Identify data types and use a matrix tool to get a weighting Business units analyse the impact of loss of data and produce a score for it Assess suppliers against 3 threats, one being loss of data Standards vary from industry to industry and country to country. To help, we rely on localised business resources to give more clarity on standards and how to map them. A tool to map all regulations we need to comply with to our internal framework and other global standards would be useful. Only collect and use the minimal amount of customer information that is required for processing bookings. 8
9 SCIRAM Supply Chain Information Risk and Assurance Methodology 1. Plan for the assessment 1.1 Decide the scope 1.2 Create assessment criteria 1.3 Assess business impact 2.1 Group suppliers 2. Assess suppliers 2.2 Apply assessment criteria 2.3 Select suppliers for review 3. Decide to assess the next tier 3.1 Consider available information 3.2 Evaluate results of supplier review 3.3 Make decision (repeat 2 and 3) 9
10 Next steps 10
11 ISF Supply Chain Assurance Framework Defines fundamental controls Based on ISF Standard of Good Practice 2012 and Encompasses regulatory compliance requirements Allows comparison of suppliers against a known baseline Consistent approach, driven by risk Offers a single approach to assurance Provides common language for acquirers and suppliers Aimed at the business, not just information security 11
12 What you can do Follow the information Identify suppliers Assess the risk they present Based on risk: Select controls at the supplier Decide whether to review upstream suppliers 12
13 Thank you 13
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR
SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR Michael de Crespigny, CEO Information Security Forum Session ID: GRC R02B Session Classification: General Interest KEY ISSUE Our
A GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
Are You Ready for PCI 3.1?
Are You Ready for PCI 3.1? Are You Ready for PCI 3.1? If your hotel is not PCI compliant, it should be. Every time a customer hands over their credit card, they trust your hotel to keep their information
Securing external suppliers and supply chains: the ISF approach
Securing external suppliers and supply chains: the ISF Dr. Adrian Davis, MBCS, CITP, CISMP Principal Research Analyst Information Security Forum Agenda Introduction The supply chain: business environment
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
The 2011 Standard of Good Practice for Information Security. June 2011
The 2011 Standard of Good Practice for Information Security June 2011 Published by Information Security Forum Limited Tel: +44 (0)20 7213 1745 Fax: +44 (0)20 7213 4813 Email: [email protected] Web:
The EIU Methodology EIU (Economist Intelligence Unit)
Briefing Paper prepared for the Global Assessment Report on Disaster Risk Reduction 2013 The EIU Methodology EIU (Economist Intelligence Unit) Geneva, Switzerland, 2013 OVERVIEW The operational risk model
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
Trade risk management: a global approach
World Customs Journal Trade risk management: a global approach Abstract Lorraine Trapani This article discusses IBM s global approach to managing risk associated with importing product into more than 170
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
Cybersecurity Framework Security Policy Mapping Table
Cybersecurity Framework Security Policy Mapping Table The following table illustrates how specific requirements of the US Cybersecurity Framework [1] are addressed by the ISO 27002 standard and covered
Forensic Services. Third Party Risks. March 2013
Forensic Services Third Party Risks Landscape of third party risk Focus on third parties that: perform functions on behalf of the company provide products and services that the company does not originate
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
Overview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
The downturn and the cloud..challenge and solution?
The downturn and the cloud..challenge and solution? Dr Adrian Davis, MBCS, CITP Head, Leadership and Management Group Information Security Forum Research and Services Team What the ISF provides for its
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Position Paper (II) Healthcare Provider Advisory Council Implementation in hospitals hindered by bar code symbol issues
I. Introduction Towards the end of 2011, GS1 Healthcare established the Healthcare Provider Advisory Council (HPAC) to be the forum for sharing and discussing the practical realities of implementation
INFORMATION SYSTEMS. Revised: August 2013
Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology
MSACMT260A Use planning software systems in manufacturing
MSACMT260A Use planning software systems in manufacturing Revision Number: 1 MSACMT260A Use planning software systems in manufacturing Modification History Not applicable. Unit Descriptor Unit descriptor
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Risk Mitigation in Sustainable Supply Chain Management
Risk Mitigation in Sustainable Supply Chain Management Gyöngyi Kovács (Hanken) Stefan Seuring (University of Waikato) Martin Müller (Carl von Ossietzky Universität Oldenburg) Raison d être Risk mitigation
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
Open Certification Framework. Vision Statement
Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption
Earning Your Security Trustmark+
QUICK START GUIDE Earning Your Security Trustmark+ CompTIA.org www.comptia.org/communities Introduction One of the biggest challenges for solution providers is protecting their clients networks and information
A complete Information Risk Management solution for ISF Members using IRAM and STREAM
Jason Creasey Certified STREAM Consultant A complete Information Risk Management solution for ISF Members using Simon Marvell Partner Abstract IRAM is a business-led information risk analysis methodology
What do you do well? What relevant resources do you have?
SWOT Analysis - Understanding Strengths, Weaknesses, Opportunities and Threats by James Manktelow MBA, an experienced business strategist specializing in helping start-ups and small and medium-sized companies
A Simple Guide to Material Master Data Governance. By Keith Boardman, Strategy Principal
A Simple Guide to Material Master Data Governance By Keith Boardman, Strategy Principal DATUM is an Information Management solutions company focused on driving greater business value through data. We provide
PCI Compliance Overview
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING
APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING Katie Moussouris Senior Security Strategist Microsoft Security Response Center http://twitter.com/k8em0 (that s a zero) Session ID: ASEC-T18
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
ISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 [email protected] Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
ICAICT704A Direct ICT in a supply chain
ICAICT704A Direct ICT in a supply chain Release: 1 ICAICT704A Direct ICT in a supply chain Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
P&SM: Supply Chain Management
CIPS Position on Practice P&SM: Supply Chain Management The supply chain conceptually covers the entire physical process from ordering and obtaining the raw materials through all process steps until the
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Helping to protect your business and your customers in the event of a data breach
Helping to protect your business and your customers in the event of a data breach Equifax Data Breach Assistance helps you respond more quickly and effectively, limiting the reputational damage to your
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Project Risk Analysis toolkit
Risk Analysis toolkit MMU has a corporate Risk Management framework that describes the standard for risk management within the university. However projects are different from business as usual activities,
Securing a Digital Economy
Securing a Digital Economy HQ Cheltenham Spa 1998 Founded by Charles White and David Cazalet INDEPENDENT We always recommend what is best for your business SIMPLICITY We deliver confidence, not complexity
How to Develop Successful Enterprise Risk and Vendor Management Programs
Project Management Institute New York City Chapter January 2014 Chapter Meeting How to Develop Successful Enterprise Risk and Vendor Management Programs Christina S. Kite Senior Vice President Corporate
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Auditing Outsourcing Arrangements
Auditing Outsourcing Arrangements Eileen Healy Enterprise Risk Services Director 16 April 2015 Contact Details: - Email: - [email protected] Mobile: - 086 164 3082 Session Objectives To provide an understanding
BUILD YOUR CYBERSECURITY SKILLS WITH NRB
BUILD YOUR CYBERSECURITY SKILLS WITH NRB BECOME A PECB CERTIFIED ISO 27001 AUDITOR OR INSTRUCTOR NRB established a partnership with the Professional Evaluation and Certification Board (PECB) to enrich
IMPROVING DELIVERY PROCUREMENT AND SUPPLY CHAIN MANAGEMENT
PROCUREMENT AND SUPPLY CHAIN MANAGEMENT We support customers to select and motivate their suppliers setting the standards for both behaviour and performance Confederation of British Industry Doing more
FSSC 22000. Certification scheme for food safety systems in compliance with ISO 22000: 2005 and technical specifications for sector PRPs PART I
FSSC 22000 Certification scheme for food safety systems in compliance with ISO 22000: 2005 and technical specifications for sector PRPs PART I REQUIREMENTS FOR ORGANIZATIONS THAT REQUIRE CERTIFICATION
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
Info sheet : Considering labour standards in the procurement process
Info sheet : Considering labour standards in the procurement process In line with the EU procurement rules and the Government s value for money principle, contracting authorities can take steps to consider
A tool for small-to-medium sized businesses. Anti-Money Laundering and Counter-Terrorism Financing Act 2006
Australian Government Australian Transaction Reports and Analysis Centre Risk management A tool for small-to-medium sized businesses Anti-Money Laundering and Counter-Terrorism Financing Act 006 Contents
Schweppes Australia Head Office Level 5, 111 Cecil Street South Melbourne Victoria 3205. www.schweppesaustralia.com.au
Schweppes Australia Head Office Level 5, 111 Cecil Street South Melbourne Victoria 3205 www.schweppesaustralia.com.au Quality Management Systems 1. Quality Management Systems develop, implement, verify
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
<Insert Picture Here> How to protect sensitive data, challenges & risks
How to protect sensitive data, challenges & risks Lars Klumpes CISSP Security Strategy Consultant EMEA Disclaimer The following is intended to outline our general product direction.
Compliance, Audits and Fire Drills: In the Way of Real Security?
Compliance, Audits and Fire Drills: In the Way of Real Security? Mark Estberg and John Howie Microsoft Corporation Session ID: SP01-203 Session Classification: Intermediate Introduction Microsoft s Global
Implementing and monitoring effective compliance policies & procedures. charlesrussellspeechlys.com
Implementing and monitoring effective compliance policies & procedures charlesrussellspeechlys.com Robert Bond Partner Robert Bond has over 36 years' experience in advising national and international clients
How Safe are you in your Cloud?
Nov Nov 4-5, 4-5, 2014 2014 Monarch Monarch Beach, Beach, CA CA How Safe are you in your Cloud? Security Intelligence and Regulatory Compliance in the Cloud November 2014 Heather Hinton, Ph.D. IBM Distinguished
PCI Compliance: How to ensure customer cardholder data is handled with care
PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4
Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing
Contents Introduction Why GRC Assessment Benefits of Cloud computing and Problem Statement Key Speculations & Problems faced by Cloud service user s in Today s time Threats, Vulnerabilities and related
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
Addressing the Global Supply Chain Threat Challenge Huawei, a Case Study
SESSION ID: ECO-W02 Addressing the Global Supply Chain Threat Challenge Huawei, a Case Study Andy Purdy Chief Security Officer Huawei Technologies USA Huawei is a global organization serving over a third
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security- Perspective for Management Information Security Management Program Concept
CIS 523/423 Disaster Recovery Business Continuity
CIS 523/423 Disaster Recovery Business Continuity Course Description A study of disaster recovery and business continuity as related to the information technology function in organizations. Topics will
AN EVALUATION OF THE UPSTREAM CRUDE OIL INDUSTRY SUPPLY CHAIN RISK
AN EVALUATION OF THE UPSTREAM CRUDE OIL INDUSTRY SUPPLY CHAIN RISK AN EVALUATION OF THE UPSTREAM CRUDE OIL INDUSTRY SUPPLY CHAIN RISK : LEVERAGING ANALYTIC HIERARCHY PROCESS Charles Awoala Briggs Upper
The Supply Chain Management Process
article The Supply Chain Management Process D r N e va n W r i g h t, A U T U n i v e r s i t y, N e w Z e a l a n d, e - m a i l : N e va n. w r i g h t @ a u t. a c. n z The primary purpose of this introductory
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
National Approach to Information Assurance 2014-2017
Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life
Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows
Information Systems for Business Integration: EDI, SCM, CRM Systems
Information Systems for Business Integration: EDI, SCM, CRM Systems (April 2, 2009) BUS3500 - Abdou Illia, Spring 2009 1 LEARNING GOALS Discuss Supply Chain Management systems Discuss Customer Relationship
