Kardex not only aims to exploit new opportunities in the context of professionalizing and internationalizing procurement, but at the same time also to cushion associated risks. As a result, supply chain risk management has gained great importance in procurement.
The Essentials of Material Handeling / Part II - The Basic Product Knowledge ...ISDDD
http://www.isddd.com Created by MHI Carousel/Vertical Lift Module Product Section Group to explain the basic concepts and benefits of the Vertical Lift Module (VLM).
Ejemplo de Kardex con el Método de Promedio Ponderado en la Utilización de Registro y Control de Inventarios de Materias Primas. Ejemplo dirigido a las Empresas de Alimentos y Bebidas.
The Essentials of Material Handeling / Part II - The Basic Product Knowledge ...ISDDD
http://www.isddd.com Created by MHI Carousel/Vertical Lift Module Product Section Group to explain the basic concepts and benefits of the Vertical Lift Module (VLM).
Ejemplo de Kardex con el Método de Promedio Ponderado en la Utilización de Registro y Control de Inventarios de Materias Primas. Ejemplo dirigido a las Empresas de Alimentos y Bebidas.
Monitoring of latent risks and an early warning system for events enable prompt implementation of appropriate preventive measures in a crisis situation. These predefined actions, together with quicker crisis response time and assessment of the criticality can save costs and time. Read more about the step-by-step approach, and conceptual and organizational implementation of risk identification!
“Ensuring profitability through transparent supply chains”Heiko Schwarz
Challenge
Hottinger Baldwin Messtechnik (HBM) was faced with the challenge of creating transparency along global supply chains to minimize risks in its supply chain, secure production and ensure profitability. With this in mind, HBM came up with three questions that would be relevant for creating an all-inclusive concept for successful supply chain risk management:
What risk is associated with every single supplier?
How does each supplier influence the profitability?
How can transparency be created so as to prevent crippling of the entire production due to default by a supplier that works with penny articles?
SOLUTION
An all-inclusive approach enables HBM to monitor its key suppliers. „All-inclusive“: first because HBM monitors suppliers, locations, countries and hubs for all types of risks (natural disasters, strikes, compliance breaches, etc.) by way of riskmethods‘ Supply Risk Network. And „all-inclusive“: second because HBM can map its extensive risk management process cycle in the Supply Risk Network. Risks are monitored along the entire supply chain and the impact is determined using an evaluation matrix so that, in a risk event, transparency on the ramifications is immediately available. This allows for professional action planning in order to quickly activate appropriate risk mitigation measures and activities in an emergency.
BENEFITS
The riskmethods Supply Risk Network can be activated using a sequence of simple manual actions, and offers HBM a cloud-based software solution with daily, up-to-date data on all risks for all suppliers, production sites and countries. This has proved to be a profitable advantage, especially to medium-sized companies that have integrated the Supply Risk Network into their organization. Ongoing risk monitoring, an early warning system, impact evaluation and action planning ensure that risks are more easily recognized and the extent of damage minimized. In this way, HBM ensures its profitability and increases its competitive advantage.
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
IPSecurityCenter is a software based integration and management platform, which connects disparate security systems such as radar, analytics, PIDS, GPS tracking, GIS mapping and video surveillance; aggregating intelligence allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time situation awareness, through a common operating picture (COP) and following an alert, alarm or trigger presents step by step process guidance, ensuring complete compliance to organizational security policies.
Supply Chain Risk Management - made easy!Heiko Schwarz
Pressure in terms of innovations and costs as a result of the globalization of markets and services are forcing companies to focus more strongly on international procurement. This globalization, combined with a fall in added value leads to a new, complex risk structure, which necessitates continuous monitoring of various risk potentials along all supply chains.
The Supply Risk Network from riskmethods has been developed to address precisely
these challenges.
Unit 7 Assignment Group Assignment – Risk Analysis and Identcorbing9ttj
Unit 7 Assignment Group Assignment – Risk Analysis and
Identification
Assignment 7 will also be completed as a team assignment. Teams for the Group Assignment will
be assigned by the end of week 2. Each team will be randomly assigned in Blackboard. At the
beginning of or prior to Week 4, the team should assign a team leader to coordinate the team's
work due in Week 7.
Your team represents the State’s contractor selected by the State to carry out the Risk Assessment
Project for this case study. Your company's senior management and the State's Project Manager
have requested that you prepare a risk management plan that identifies potential risks and identifies
risk management strategies. From the course content and readings, you know that the overall
purpose of risk planning is to anticipate possible risk events and be ready to take appropriate action
when risk events occur—to eliminate or reduce negative impacts on the project.
Scenario
As the industry moves into a smart-shipping era, the risk of cyber threats is at an all-time high.
Digitalized ships, increasing interconnectedness, the extended use of electronic data exchange and
electronic navigation increases the likelihood of cyber-attacks in variety, frequency and sophistication.
Cyber threats are one of the most serious economic and international security challenges facing the
maritime industry today. The need for protection and security enforcements to mitigate the threats is
more important today than ever. Guidelines to support secure cyber operations and contingency plans
to be followed in a case of cyber incident have become necessary. The XYZ Shipping Chamber
recognizing the increasing concern of its Members with regards to the cyber security and their
protection, developed this document with the intention to create awareness of the threat and provide
guidance to its Members.
Company Description
“We own and/or operate over 100 ships which include tankers, bulkers, and container ships. We employ
directly over 3,000 employees in seven offices worldwide. The company operates as an owner and
technical operator, including crewing services”.
Motivation
“Driving this shipping company’s cyber security initiatives is the increasing awareness of the invasive
nature of cyber-criminal activity in the shipping industry. Cyber threat has imposed an elevated cyber
security related risk awareness from ship owners, the company board of directors, cargo owners, and
legal / regulatory bodies such as TMSA, IMO and USCG to name some, as well as P&I club coverage”.
4.1 “Reducing the risk should be the main deliverable of the company’s cyber security strategy and
outcome of the risk assessment decided by senior management. At a technical level, this would include
the necessary actions to be implemented to establish and maintain an agreed level of cyber security.”
4.2 Ships entering / leaving management pose added challenge to mai ...
L'intervento su "infrastrutture critiche e cybersicurezza nel settore dei trasporti" tenuto da Andrea Chiappetta al workshop "Critical Infrastructure protection against hybrid warfare security related challenges" svoltosi a Stoccolma lo scorso maggio.
Overview of EXIGIS RiskWorksPS - the only multi-application cloud-based Risk Management Operating System developed specifically for the public sector to provide risk pools and independent self-insureds.
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
More Related Content
Similar to Supply Chain Risk Management - Casestudy Kardex
Monitoring of latent risks and an early warning system for events enable prompt implementation of appropriate preventive measures in a crisis situation. These predefined actions, together with quicker crisis response time and assessment of the criticality can save costs and time. Read more about the step-by-step approach, and conceptual and organizational implementation of risk identification!
“Ensuring profitability through transparent supply chains”Heiko Schwarz
Challenge
Hottinger Baldwin Messtechnik (HBM) was faced with the challenge of creating transparency along global supply chains to minimize risks in its supply chain, secure production and ensure profitability. With this in mind, HBM came up with three questions that would be relevant for creating an all-inclusive concept for successful supply chain risk management:
What risk is associated with every single supplier?
How does each supplier influence the profitability?
How can transparency be created so as to prevent crippling of the entire production due to default by a supplier that works with penny articles?
SOLUTION
An all-inclusive approach enables HBM to monitor its key suppliers. „All-inclusive“: first because HBM monitors suppliers, locations, countries and hubs for all types of risks (natural disasters, strikes, compliance breaches, etc.) by way of riskmethods‘ Supply Risk Network. And „all-inclusive“: second because HBM can map its extensive risk management process cycle in the Supply Risk Network. Risks are monitored along the entire supply chain and the impact is determined using an evaluation matrix so that, in a risk event, transparency on the ramifications is immediately available. This allows for professional action planning in order to quickly activate appropriate risk mitigation measures and activities in an emergency.
BENEFITS
The riskmethods Supply Risk Network can be activated using a sequence of simple manual actions, and offers HBM a cloud-based software solution with daily, up-to-date data on all risks for all suppliers, production sites and countries. This has proved to be a profitable advantage, especially to medium-sized companies that have integrated the Supply Risk Network into their organization. Ongoing risk monitoring, an early warning system, impact evaluation and action planning ensure that risks are more easily recognized and the extent of damage minimized. In this way, HBM ensures its profitability and increases its competitive advantage.
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
IPSecurityCenter is a software based integration and management platform, which connects disparate security systems such as radar, analytics, PIDS, GPS tracking, GIS mapping and video surveillance; aggregating intelligence allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time situation awareness, through a common operating picture (COP) and following an alert, alarm or trigger presents step by step process guidance, ensuring complete compliance to organizational security policies.
Supply Chain Risk Management - made easy!Heiko Schwarz
Pressure in terms of innovations and costs as a result of the globalization of markets and services are forcing companies to focus more strongly on international procurement. This globalization, combined with a fall in added value leads to a new, complex risk structure, which necessitates continuous monitoring of various risk potentials along all supply chains.
The Supply Risk Network from riskmethods has been developed to address precisely
these challenges.
Unit 7 Assignment Group Assignment – Risk Analysis and Identcorbing9ttj
Unit 7 Assignment Group Assignment – Risk Analysis and
Identification
Assignment 7 will also be completed as a team assignment. Teams for the Group Assignment will
be assigned by the end of week 2. Each team will be randomly assigned in Blackboard. At the
beginning of or prior to Week 4, the team should assign a team leader to coordinate the team's
work due in Week 7.
Your team represents the State’s contractor selected by the State to carry out the Risk Assessment
Project for this case study. Your company's senior management and the State's Project Manager
have requested that you prepare a risk management plan that identifies potential risks and identifies
risk management strategies. From the course content and readings, you know that the overall
purpose of risk planning is to anticipate possible risk events and be ready to take appropriate action
when risk events occur—to eliminate or reduce negative impacts on the project.
Scenario
As the industry moves into a smart-shipping era, the risk of cyber threats is at an all-time high.
Digitalized ships, increasing interconnectedness, the extended use of electronic data exchange and
electronic navigation increases the likelihood of cyber-attacks in variety, frequency and sophistication.
Cyber threats are one of the most serious economic and international security challenges facing the
maritime industry today. The need for protection and security enforcements to mitigate the threats is
more important today than ever. Guidelines to support secure cyber operations and contingency plans
to be followed in a case of cyber incident have become necessary. The XYZ Shipping Chamber
recognizing the increasing concern of its Members with regards to the cyber security and their
protection, developed this document with the intention to create awareness of the threat and provide
guidance to its Members.
Company Description
“We own and/or operate over 100 ships which include tankers, bulkers, and container ships. We employ
directly over 3,000 employees in seven offices worldwide. The company operates as an owner and
technical operator, including crewing services”.
Motivation
“Driving this shipping company’s cyber security initiatives is the increasing awareness of the invasive
nature of cyber-criminal activity in the shipping industry. Cyber threat has imposed an elevated cyber
security related risk awareness from ship owners, the company board of directors, cargo owners, and
legal / regulatory bodies such as TMSA, IMO and USCG to name some, as well as P&I club coverage”.
4.1 “Reducing the risk should be the main deliverable of the company’s cyber security strategy and
outcome of the risk assessment decided by senior management. At a technical level, this would include
the necessary actions to be implemented to establish and maintain an agreed level of cyber security.”
4.2 Ships entering / leaving management pose added challenge to mai ...
L'intervento su "infrastrutture critiche e cybersicurezza nel settore dei trasporti" tenuto da Andrea Chiappetta al workshop "Critical Infrastructure protection against hybrid warfare security related challenges" svoltosi a Stoccolma lo scorso maggio.
Overview of EXIGIS RiskWorksPS - the only multi-application cloud-based Risk Management Operating System developed specifically for the public sector to provide risk pools and independent self-insureds.
Similar to Supply Chain Risk Management - Casestudy Kardex (20)
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraAvirahi City Dholera
The Tata Group, a titan of Indian industry, is making waves with its advanced talks with Taiwanese chipmakers Powerchip Semiconductor Manufacturing Corporation (PSMC) and UMC Group. The goal? Establishing a cutting-edge semiconductor fabrication unit (fab) in Dholera, Gujarat. This isn’t just any project; it’s a potential game changer for India’s chipmaking aspirations and a boon for investors seeking promising residential projects in dholera sir.
Visit : https://www.avirahi.com/blog/tata-group-dials-taiwan-for-its-chipmaking-ambition-in-gujarats-dholera/
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Unveiling the Secrets How Does Generative AI Work.pdfSam H
At its core, generative artificial intelligence relies on the concept of generative models, which serve as engines that churn out entirely new data resembling their training data. It is like a sculptor who has studied so many forms found in nature and then uses this knowledge to create sculptures from his imagination that have never been seen before anywhere else. If taken to cyberspace, gans work almost the same way.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
2. - 1 -
BENEFITS
Thanks to the Supply Risk Network, Kardex first receives basic infor-
mation on all latent risks for all suppliers, and production locations
and countries. Based on this knowledge, accurate analyses can be
created and preventive measures implemented. Second, Kardex
benefits from riskmethods’ early warning system. In a risk situation,
an alert is simply generated via email or via a smartphone, allowing
for a proactive response and aversion of loss through supply dis-
ruptions, image damage or regulatory sanctions.
SOLUTION
riskmethods’ Supply Risk Network allows Kardex to monitor all supply
chains worldwide. In this, not only supplier risks are taken into consi-
deration. Kardex also includes countries, locations and important hubs
(such as the Suez Canal) in risk monitoring. Every one of these “risk
objects” is monitored and assessed around the clock in terms of
viability, delivery, market and costs, as well as image and compliance,
i.e. all relevant types of risks, such as natural disasters, compliance,
CSR, political risks and financial indicators are also integrated.
CHALLENGE
Kardex has made it its goal to further professionalize and interna-
tionalize its procurement. Globalization of procurement always opens
up opportunities and carries high potential - at the same time, greater
risks arise through new markets, increased complexity in the supplier
structure and new supply chains:
• Safeguarding supply in the global procurement environment on a
sustainable basis
• Clarity and transparency along the entire 1-n tier supply chain
• Monitoring of all types of risks, and assessment of the impact in a
risk situation
3. - 2 -
Internationalization of procurement enables orga-
nizations to realize competitive prices for products
and materials. However, this global approach also
harbors hidden risks that can quickly lead to supply
bottlenecks within global supply networks. Kardex
not only aims to exploit new opportunities in the
context of professionalizing and internationalizing
procurement, but at the same time also to cushion
associated risks. As a result, supply chain risk ma-
nagement has gained great importance in procure-
ment.
Kardex uses the riskmethods “Risk Radar” module
to monitor its 200 key suppliers, their locations and
countries, as well as additional important logistics
hubs (such as the Suez Canal). All of these risk
objects and the entire flow of goods are clearly
displayed in the Supply Risk Network via a world
map, irrespective of the complexity of the supply
structure.
Kardex follows a comprehensive approach to moni-
tor all risks in the entire supply chain. Different risk
categories with a large number of risk indicators are
set up in the Supply Risk Network. Kardex assesses
and monitors its suppliers, locations and countries
according to the following 4 categories and a total
of 57 risk indicators:
• Viability (e.g. financial indicators and economic
figures, payment history, employee fluctuations)
• Delivery (e.g. political unrest, natural disasters,
transport corridors)
• Market & cost (e.g. currency risks, labor costs)
• Image & compliance (e.g. working conditions,
environment, corruption, IT security)
The Supply Risk Network generates the risk infor-
mation via numerous connected databases, such
as Creditsafe, MunichRE NATHAN Risk Suite, World
Bank, United Nations Data, or CIA, as well as via
riskmethods’ Risk Research, which monitors more
than 300,000 online sources. By integrating these
different data sources and performing research, an
automation level of 95% is guaranteed for infor-
mation procurement and near real-time information
supplied on disruptions that have occurred.
In this way, Kardex ensures that all types of risks are
covered, and uses this monitoring both as preventive
as well as reactive risk monitoring. The Supply Risk
Network provides Kardex with latent basic risks for
all risk objects (e.g. location risks due to political or
environmental incidents). In an ideal situation, this
information can be used to assess, analyze and com-
pare suppliers or locations as early as the business
initiation stage, for example, while at the same time
determining preventive action steps for risk situa-
tions in terms of existing suppliers. In the event of an
occurring risk event, Kardex can also react quickly:
The early warning system from riskmethods sends a
message directly to the responsible buyer via email
or an iPhone app. He can see at a glance the event,
and which suppliers and locations are affected - and
„We were able to activate the
Supply Risk Network within a
day, and are immediately
benefiting from near real-time
risk data.“
Jörg Thürwächter
Strategic Procurement
“Internationalization in procurement means
tapping into potential and avoiding risks”
4. „We aim to tap into new poten-
tial by internationalizing our
procurement. Using the Supply
Risk Network enables us to
protect our new, global supply
chains from risks of any kind.“
Jürgen Schuhmacher
Director of Strategic Procurement
About KARDEX
Kardex is one of the leading international
providers of automated storage and re-
trieval systems. Customers from all lines
of business, such as the automotive, elec-
tronics, chemical/pharmaceuticals, trade,
engineering and health sectors currently
use solutions from Kardex to simplify their
intralogistics processes and make them
more transparent, and to demonstrably
save space and process costs. The intra-
logistics provider has to date successfully
implemented around 140,000 dynamic
storage systems all over the world.
Free trial for
„Supply Risk Network“
the impact as per the risk score is also shown. Pro-
curement is consequently able to respond immedi-
ately to disruptions and to limit the consequences,
such as disruption of the supply chain, image and
compliance breaches, or even negative impact on
the company results.
As a next step, Kardex will be instrumental in the
development of the “Impact Validator” module, in
addition to the Risk Radar module, which is already
in use. This new module helps determine supplier
criticality and the impact in the case of a risk event
that has occurred. In this manner, it will be possible
to immediately evaluate the extent of the damage,
the impact thereof and what expenses can be ex-
pected. As a result, fast response with risk mitiga-
ting measures is ensured to avert increased risk
potential.
- 3 -
5. riskmethods GmbH
Konrad-Zuse-Platz 8
81829 München
Germany
Phone +49 (0)89 20 70 42 611
Fax +49 (0)89 20 70 42 618
Mail info@riskmethods.net
Web www.riskmethods.net
CONTACT