Companies become more interconnected in many ways nowadays. You can be depend on suppliers, services or information exchange to name a few. Whatever the dependency you need to know how resilient your supplier is and prepare/compensate if needed. Understanding why and what is the starting point. Next is how to include the right supplier as assessing/monitoring all supplier is not possible/efficient. The last steps is actually assessing and improving supplier based on identified GAPS in a risk-based manner.Â
Round Table: Supplier Security
Register nowSpeaker

Robbert Kramer
Robbert studied business information technology and started working for EY as an IT Auditor. He performed IT audits and was also involved in Legal Hack activities. After EY he started working for Van Lanschot in ‘s-Hertogenbosch. Joined the Internal Audit department and afterwards moved to Security Management. In 2016 Robbert became a Security Risk Manager for ASML performing Supplier Security and is now manager of the Supplier Security department. Main pillars for supplier security are assessing, improving, monitoring and educating suppliers of ASML. Robbert Kramer was head lecturer at the TIAS for the IT audit program for 10 years.


