{"id":1941,"date":"2020-12-15T11:25:12","date_gmt":"2020-12-15T11:25:12","guid":{"rendered":"https:\/\/edvantis.com\/risks-of-outsourcing\/"},"modified":"2022-07-22T13:05:28","modified_gmt":"2022-07-22T13:05:28","slug":"risks-of-outsourcing","status":"publish","type":"post","link":"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/","title":{"rendered":"Guide to Operational Risk Management in IT Outsourcing"},"content":{"rendered":"\n<p>Companies are increasingly using IT outsourcing services as part of overall capacity management strategy. This has brought up questions regarding the risks of outsourcing, and the benefits and challenges it presents.&nbsp;<\/p>\n\n\n\n<p>Outsourcing in IT is often believed to increase the chances of project failure, yet statistics show that this is not actually the case. Indeed, according to the <a href=\"https:\/\/www.pmi.org\/-\/media\/pmi\/documents\/public\/pdf\/learning\/thought-leadership\/pulse\/pulse-of-the-profession-2017.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PMI\u2019s 2017 Pulse report<\/a>, the primary causes of project failure include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Change in an organization\u2019s priorities: 41%<\/li><li>Inaccurate requirements gathering: 39%<\/li><li>Change in project objectives: 36%<\/li><\/ul>\n\n\n\n<p>Nevertheless, there are obviously certain risks involved in outsourcing work to a third-party vendor. The key to mitigating these is effective operational risk management.<\/p>\n\n\n\n<div class=\"wp-block-ht-block-toc  is-style-outline htoc htoc--position-wide toc-list-style-plain\" data-htoc-state=\"expanded\"><span class=\"htoc__title\"><span class=\"ht_toc_title\">Table of Contents<\/span><\/span><div class=\"htoc__itemswrap\"><ul class=\"ht_toc_list\"><li class=\"\"><a href=\"#htoc-what-is-operational-risk-management\">What Is Operational Risk Management?<\/a><\/li><li class=\"\"><a href=\"#htoc-the-common-types-of-operational-risk-to-account-for-in-it-outsourcing\">The Common Types of Operational Risk to Account for in IT Outsourcing&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-how-to-do-effective-outsourcing-risk-management-right\">How to Do Effective Outsourcing Risk Management Right<\/a><ul class=\"ht_toc_child_list\"><li class=\"\"><a href=\"#htoc-1-risk-assessment\">1. Risk Assessment<\/a><\/li><li class=\"\"><a href=\"#htoc-2-outsourcing-readiness-assessment\">2. Outsourcing Readiness Assessment<\/a><\/li><li class=\"\"><a href=\"#htoc-3-contract-and-sla-assessment\">3. Contract and SLA Assessment<\/a><\/li><li class=\"\"><a href=\"#htoc-4-strong-practices-for-monitoring-delivery\">4. Strong Practices for Monitoring Delivery<\/a><\/li><\/ul><\/li><li class=\"\"><a href=\"#htoc-to-conclude\">To Conclude&nbsp;<\/a><\/li><\/ul><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-what-is-operational-risk-management\">What Is Operational Risk Management?<\/h2>\n\n\n\n<p>If you\u2019ve worked on any project at management level, you\u2019ll be familiar with the concept of operational risks.&nbsp;<\/p>\n\n\n\n<p>According to the <a href=\"https:\/\/www.bis.org\/publ\/bcbsca.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Basel II regulations<\/a>, operational risk stands for losses that could originate from suboptimal internal processes, failures in supporting systems, as well as the human factor. Count external events (including regulatory risks) too.&nbsp;<\/p>\n\n\n\n<p>Operational risk management, in turn, is a continual cyclic process that includes risk assessment, risk decision making, and implementation of risk controls. Ultimately, the goal of these actions is acceptance, mitigation, or avoidance of risk.<\/p>\n\n\n\n<p>Operational risks happen for an array of reasons, both internal (for instance, lack of stakeholder engagement and external \u2014 e.g. the vendor\u2019s weak delivery culture.&nbsp;<\/p>\n\n\n\n<p>In either case, if not managed right from the start, operational risks can result in poor engagement, underperformance, or communication falling short of expectations.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-the-common-types-of-operational-risk-to-account-for-in-it-outsourcing\">The Common Types of Operational Risk to Account for in IT Outsourcing&nbsp;<\/h2>\n\n\n\n<p>Operational risks exist both before your outsourcing project begins and during its lifecycle. These risks can be divided into two types: engagement risks and delivery risks.<\/p>\n\n\n\n<p><strong>Engagement risks<\/strong> are the overall risks associated with a third-party partnership. These include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Strategic risks: the risk that the services or products provided by your vendor will no longer align with your strategic requirements and expectations as your project progresses.&nbsp;<\/li><li>Vendor risks: the risk that a vendor does not operate as you expected, or provides a service that does not comply with local laws or regulations.<\/li><li>Relational risk: the possibility that your vendor will fail to maintain an appropriate level of communication, engagement, or management during the project.&nbsp;<\/li><\/ul>\n\n\n\n<p><strong>Delivery risks<\/strong> encompass the risks that your vendor may fail to fulfill their side of the agreement. For example, by delivering only partial work or services of lower quality. These risks can be further grouped as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Coordination risks: the risks inherent in having to manage a complex system of relationships, contracts, processes, people, and technologies.<\/li><li>Service risks: the risks that your vendor\u2019s services or products will fail to meet contractually defined quality standards and expectations.&nbsp;<\/li><li>Financial risks: the possibility of the project exceeding the set budget due or risks associated with incorrect initial estimates.&nbsp;<\/li><\/ul>\n\n\n\n<p>Yet, knowing where the common operational risks may come from is not enough to mitigate them.&nbsp;<\/p>\n\n\n\n<p>Understanding the baseline principles of operational risk management is essential to avoid IT outsourcing mishaps.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-how-to-do-effective-outsourcing-risk-management-right\">How to Do Effective Outsourcing Risk Management Right<\/h2>\n\n\n\n<p>The key objective of operational risk management lies in identifying, assessing, and monitoring the potential risks that may occur at different stages of your outsourcing project lifecycle. Here are four major activities you should take to ensure a smooth outsourcing engagement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"htoc-1-risk-assessment\">1. Risk Assessment<\/h3>\n\n\n\n<p>Each type of risk outlined in the previous section originates from either processes, systems, people, or external events.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Processes: all the processes associated with your outsourcing engagement, including but not limited to business processes, administrative processes, support processes, and requirements management processes.<\/li><li>Systems: all information technology and communication systems, including hardware and software.&nbsp;<\/li><li>People: all the people involved in your engagement lifecycle, such as software engineers, managers, designers, and product owners.<\/li><li>External events: market, or regulatory changes, and similar events which cannot be controlled by your organization, can also impact the outsourcing engagement. Note: for the duration of the project, your vendor counts as a potential source of internal (i.e. controllable) risks, not external risk.<\/li><\/ul>\n\n\n\n<p>Address the combination of these risk types within your operational risk management framework.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"htoc-2-outsourcing-readiness-assessment\">2. Outsourcing Readiness Assessment<\/h3>\n\n\n\n<p>As briefly mentioned, not all potential causes of project failure lie with the vendor. Your organization may also have gaps in operational readiness for IT outsourcing.&nbsp;<\/p>\n\n\n\n<p>For instance, it might not have proper process capabilities in place to support an external team. Thus, <a href=\"https:\/\/www.edvantis.com\/de\/blog\/it-outsourcing-readiness-checklist\/\" target=\"_blank\" rel=\"noreferrer noopener\">assessing your organization\u2019s readiness for outsourcing<\/a> is another essential step for managing outsourcing risk. For this you need to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Outline your reasons for using outsourcing, and make sure they are justified.<\/li><li>Ensure you know how outsourcing will fit into your company\u2019s or project\u2019s overall business strategy.<\/li><li>Create SMART objectives, and set goals and expectations.<\/li><li>Determine the areas where you expect outsourcing to bring your company the most value.<\/li><li>Formalize your capacity needs.<\/li><\/ul>\n\n\n\n<p>By doing all of the above, you ensure that your company\u2019s processes can accommodate the proposed outsourcing service model.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"htoc-3-contract-and-sla-assessment\">3. Contract and SLA Assessment<\/h3>\n\n\n\n<p>Your service-level agreement (SLA) plays a vital role in establishing proper client-vendor relationships. This agreement describes:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Expected service levels from your vendor.<\/li><li>Relevant metrics for measuring performance.<\/li><li>The responsibilities and expectations on each side.<\/li><li>Actions in case of not achieving an agreed-on level of service<\/li><\/ul>\n\n\n\n<p>Your selection of SLA metrics should depend on the scope of provided services.As a minimum, they should cover service availability, budget estimates, and technical quality. . As a rule of thumb, simpler metrics are better. <a href=\"https:\/\/www.edvantis.com\/de\/blog\/software-development-metrics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Choose IT metrics<\/a> that can be easily (ideally automatically) collected. Doing so will make monitoring and reporting easier.<\/p>\n\n\n\n<p>The SLA protects both your company and the vendor from misinterpreting any part of a relationship or deliverables. The agreement should ensure that you both have an identical understanding of the project requirements.&nbsp;<\/p>\n\n\n\n<p>\u0421ontract terms play a similar role in formalizing deadlines and obligations, indemnification, handling of confidential information, non-disclosure duration, limits of liability, and termination clauses. Both your contract and SLA should be aligned with the business goals of your engagement.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"htoc-4-strong-practices-for-monitoring-delivery\">4. Strong Practices for Monitoring Delivery<\/h3>\n\n\n\n<p>Risk management in outsourcing often focuses heavily on the planning and contract stages. But proper assessment needs to continue throughout your outsourcing project lifecycle.You can achieve this by setting forth relevant performance metrics and KPIs.<\/p>\n\n\n\n<p>There are four major types of KPI are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Basic: Apply them to general sources of risk to evaluate whether service requirements are met and deal objectives achieved.&nbsp;<\/li><li>Reactive. Give you ability to evaluate the effectiveness of your business decisions and determine whether they facilitated the desired outcome.&nbsp;<\/li><li>Reflective. Use them to monitor high priority risks, and include continuous post-performance monitoring and reporting.<\/li><li>Proactive. These are placed on high priority risks and include proactive service quality assessments.<\/li><\/ul>\n\n\n\n<p>The following factors also contribute to successful delivery monitoring:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A <a href=\"https:\/\/www.edvantis.com\/de\/blog\/software-development-process\/\" target=\"_blank\" rel=\"noreferrer noopener\">strong software development lifecycle<\/a> is an essential part of successful strategic product management<\/li><li><a href=\"https:\/\/www.edvantis.com\/de\/blog\/business-it-alignment\/\" target=\"_blank\" rel=\"noreferrer noopener\">Transparent and regular communication<\/a> between in-house and vendor teams<\/li><li>Clear reporting standards, as outlined in your scope of work\/contract<\/li><li>Well-defined <a href=\"https:\/\/www.edvantis.com\/de\/blog\/change-requests-management-in-outsourcing\/\" target=\"_blank\" rel=\"noreferrer noopener\">change management process<\/a>.&nbsp;<\/li><\/ul>\n\n\n\n<p>The combination of all these measures can help ensure consistent management and mitigation of risks throughout the entire outsourcing lifecycle.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-to-conclude\">To Conclude&nbsp;<\/h2>\n\n\n\n<p>Operational risk management in IT outsourcing is a continuous process. Thus, knowing where your risks lie is key to preventing undesirable outcomes. Back this knowledge by operational risk assessments and risk mitigation based on the collected results. This will help to ensure the sustainability of your outsourcing project lifecycle.<\/p>\n\n\n\n<p><em>At Edvantis, we help our clients right-size the optimal service model, based on their operational maturity, project type and overall strategic vision. <a href=\"https:\/\/www.edvantis.com\/de\/kontaktieren-sie-uns\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us<\/a> to learn more about our approach to reducing operational risks during IT outsourcing.&nbsp;<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies are increasingly using IT outsourcing services as part of overall capacity management strategy. This has brought up questions regarding the risks of outsourcing, and the benefits and challenges it presents.<\/p>\n","protected":false},"author":1,"featured_media":29718,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[32],"tags":[39],"taxonomy_industries":[],"class_list":["post-1941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bewaehrte-verfahren","tag-lesedauer-4-minuten"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Guide to Operational Risk Management in IT Outsourcing | Edvantis<\/title>\n<meta name=\"description\" content=\"Learn how to minimize the chances of project failure with an effective four-step operational risk management framework.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide to Operational Risk Management in IT Outsourcing | Edvantis\" \/>\n<meta property=\"og:description\" content=\"Learn how to minimize the chances of project failure with an effective four-step operational risk management framework.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/\" \/>\n<meta property=\"og:site_name\" content=\"Edvantis\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-15T11:25:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-22T13:05:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/iStock-648640870_hover-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"394\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.edvantis.com\/de\/#\/schema\/person\/9cb044f8759f0acac4a928811fd41699\"},\"headline\":\"Guide to Operational Risk Management in IT Outsourcing\",\"datePublished\":\"2020-12-15T11:25:12+00:00\",\"dateModified\":\"2022-07-22T13:05:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/\"},\"wordCount\":1349,\"image\":{\"@id\":\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/featured-image-for-post-about-operational-risk-management-Edvantis.png\",\"keywords\":[\"Lesedauer: 4\u202fMinuten\"],\"articleSection\":[\"Bew\u00e4hrte Verfahren f\u00fcr das Outsourcing\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/\",\"url\":\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/\",\"name\":\"Guide to Operational Risk Management in IT Outsourcing | Edvantis\",\"isPartOf\":{\"@id\":\"https:\/\/www.edvantis.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/featured-image-for-post-about-operational-risk-management-Edvantis.png\",\"datePublished\":\"2020-12-15T11:25:12+00:00\",\"dateModified\":\"2022-07-22T13:05:28+00:00\",\"author\":{\"@id\":\"https:\/\/www.edvantis.com\/de\/#\/schema\/person\/9cb044f8759f0acac4a928811fd41699\"},\"description\":\"Learn how to minimize the chances of project failure with an effective four-step operational risk management framework.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#primaryimage\",\"url\":\"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/featured-image-for-post-about-operational-risk-management-Edvantis.png\",\"contentUrl\":\"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/featured-image-for-post-about-operational-risk-management-Edvantis.png\",\"width\":1300,\"height\":900,\"caption\":\"featured image for post about operational risk management Edvantis\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.edvantis.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide to Operational Risk Management in IT Outsourcing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.edvantis.com\/de\/#website\",\"url\":\"https:\/\/www.edvantis.com\/de\/\",\"name\":\"Edvantis\",\"description\":\"Edvantis | IT Outsourcing &amp; Custom Software Development\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.edvantis.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.edvantis.com\/de\/#\/schema\/person\/9cb044f8759f0acac4a928811fd41699\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.edvantis.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/052d706794fb7fe5154a8099cd691e75ed9fc50055477e8872a47875f73acce3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/052d706794fb7fe5154a8099cd691e75ed9fc50055477e8872a47875f73acce3?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/dev.edvantis.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guide to Operational Risk Management in IT Outsourcing | Edvantis","description":"Learn how to minimize the chances of project failure with an effective four-step operational risk management framework.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/","og_locale":"de_DE","og_type":"article","og_title":"Guide to Operational Risk Management in IT Outsourcing | Edvantis","og_description":"Learn how to minimize the chances of project failure with an effective four-step operational risk management framework.","og_url":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/","og_site_name":"Edvantis","article_published_time":"2020-12-15T11:25:12+00:00","article_modified_time":"2022-07-22T13:05:28+00:00","og_image":[{"width":700,"height":394,"url":"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/iStock-648640870_hover-1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#article","isPartOf":{"@id":"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/"},"author":{"name":"admin","@id":"https:\/\/www.edvantis.com\/de\/#\/schema\/person\/9cb044f8759f0acac4a928811fd41699"},"headline":"Guide to Operational Risk Management in IT Outsourcing","datePublished":"2020-12-15T11:25:12+00:00","dateModified":"2022-07-22T13:05:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/"},"wordCount":1349,"image":{"@id":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/featured-image-for-post-about-operational-risk-management-Edvantis.png","keywords":["Lesedauer: 4\u202fMinuten"],"articleSection":["Bew\u00e4hrte Verfahren f\u00fcr das Outsourcing"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.edvantis.com\/de\/blog\/risks-of-outsourcing\/","url":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/","name":"Guide to Operational Risk Management in IT Outsourcing | Edvantis","isPartOf":{"@id":"https:\/\/www.edvantis.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#primaryimage"},"image":{"@id":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/featured-image-for-post-about-operational-risk-management-Edvantis.png","datePublished":"2020-12-15T11:25:12+00:00","dateModified":"2022-07-22T13:05:28+00:00","author":{"@id":"https:\/\/www.edvantis.com\/de\/#\/schema\/person\/9cb044f8759f0acac4a928811fd41699"},"description":"Learn how to minimize the chances of project failure with an effective four-step operational risk management framework.","breadcrumb":{"@id":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#primaryimage","url":"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/featured-image-for-post-about-operational-risk-management-Edvantis.png","contentUrl":"https:\/\/www.edvantis.com\/wp-content\/uploads\/2020\/12\/featured-image-for-post-about-operational-risk-management-Edvantis.png","width":1300,"height":900,"caption":"featured image for post about operational risk management Edvantis"},{"@type":"BreadcrumbList","@id":"https:\/\/www.edvantis.com\/blog\/risks-of-outsourcing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.edvantis.com\/de\/"},{"@type":"ListItem","position":2,"name":"Guide to Operational Risk Management in IT Outsourcing"}]},{"@type":"WebSite","@id":"https:\/\/www.edvantis.com\/de\/#website","url":"https:\/\/www.edvantis.com\/de\/","name":"Edvantis","description":"Edvantis | IT Outsourcing &amp; Custom Software Development","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.edvantis.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/www.edvantis.com\/de\/#\/schema\/person\/9cb044f8759f0acac4a928811fd41699","name":"admin","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.edvantis.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/052d706794fb7fe5154a8099cd691e75ed9fc50055477e8872a47875f73acce3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/052d706794fb7fe5154a8099cd691e75ed9fc50055477e8872a47875f73acce3?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/dev.edvantis.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/posts\/1941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/comments?post=1941"}],"version-history":[{"count":0,"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/posts\/1941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/media\/29718"}],"wp:attachment":[{"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/media?parent=1941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/categories?post=1941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/tags?post=1941"},{"taxonomy":"taxonomy_industries","embeddable":true,"href":"https:\/\/www.edvantis.com\/de\/wp-json\/wp\/v2\/taxonomy_industries?post=1941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}