The IAOP New England Chapter meeting will be held in February at Foley’s Boston office.
Eric Simonson, Managing Partner, Research, from Everest Group draws from his expertise in sourcing strategy and global services industry analysis to provide insights on the topic of “Disrupting outsourcing models: the case for Impact Sourcing.”
Everest Group recently completed an analysis of Impact Sourcing with the support of The Rockefeller Foundation. During this session, Eric will address the following questions:
- What is Impact Sourcing?
- What is the business case and value proposition for Impact Sourcing?
- Who is adopting it and why?
- Why does Impact Sourcing have lower attrition than traditional BPO models?
- How might Impact Sourcing disrupt your organization’s existing sourcing models?
- A networking session, with refreshments sponsored by Foley & Lardner and support by Everest Group, will follow the program.
For more information please visit the IAOP website.
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.