NTISthis.com

Evidence Guide: TLIX0009X - Employ digital supply chain risk management practices

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

TLIX0009X - Employ digital supply chain risk management practices

What evidence can you provide to prove your understanding of each of the following citeria?

Identify digital supply chain risks

  1. Risks, including vulnerabilities in the digital supply chain, are identified and mapped
Risks, including vulnerabilities in the digital supply chain, are identified and mapped

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Cyber security risks related to third parties in the digital supply chain are identified

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Digital supply chain risks are prioritised for severity of impact

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Responsibility and level of authority for monitoring risk management practices in the digital supply chain is confirmed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop digital supply chain risk management plan

  1. Digital supply chain risk management plan is developed and communicated to stakeholders
Digital supply chain risk management plan is developed and communicated to stakeholders

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Digital supply chain risk management system is developed, in accordance with the risk management plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Digital supply chain risk management policies, procedures, processes and practices are developed, in consultation with stakeholders

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Reporting mechanisms are established, in accordance with the risk management plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement digital supply chain risk managementpractices

  1. Risk mitigation is undertaken, in accordance with risk management procedures
Risk mitigation is undertaken, in accordance with risk management procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Digital supply chain dashboard metrics are used to assess risks, identify causes and inform stakeholders

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Risks to the technical integrity of the digital supply chain are reported, in accordance with risk management procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Responses to unplanned digital supply chain events are managed, in accordance with risk management procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review and report ondigital supply chain risk management practices

  1. Digital supply chain risk outcomes, including cyber security, are assessed and the effectiveness of risk mitigation is reviewed, in consultation with stakeholders
Digital supply chain risk outcomes, including cyber security, are assessed and the effectiveness of risk mitigation is reviewed, in consultation with stakeholders

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Continuous monitoring and assessment of digital supply chain data related to risk management practices is reviewed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report on digital supply chain risk management practices is prepared and presented to approved stakeholders

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Continuous improvement actions that support risk management practices are documented

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

Evidence required to demonstrate competence in this unit must be relevant to and satisfy all requirements of the elements and performance criteria on at least one occasion and includes

analysing data

assessing risk outcomes

communicating with stakeholders

determining third party cyber security risks

developing a risk management system and risk management plan for digital supply chains

documenting continuous improvement actions

establishing digital supply chain risk management reporting mechanisms

identifying risks and vulnerabilities in the digital supply chain

implementing digital supply chain risk management practices

managing responses to unplanned events

monitoring and assessing digital supply chain data related to risk management practices

preparing reports

reporting risks to the technological integrity of the digital supply chain

undertaking risk mitigation and reviewing its effectiveness

using digital supply chain dashboard metrics to assess risks, identify causes and inform stakeholders

working with risk management policies and procedures.

Evidence required to demonstrate competence in this unit must be relevant to and satisfy all requirements of the elements and performance criteria and includes knowledge of

communication methods and techniques

continuous improvement principles

data analysis

digital supply chain policies and procedures

digital supply chain stakeholders

digital supply chain technology

principles of risk management practice

report requirements

responses to unplanned digital supply chain events

risk management plans and risk mitigation

tools, methods and techniques used for digital supply chain risk management practice

types of digital supply chain risks including cyber threats.

Range Statement

Range is restricted to essential operating conditions and any other variables essential to the work environment.

Non-essential conditions may be found in the Companion Volume Implementation Guide.