Mitigating Risk in the Supply Chain: A Comprehensive Approach - Ascent Conference
VIDEO COMING SOON
Cybersecurity

Mitigating Risk in the Supply Chain: A Comprehensive Approach

Oct 5th, 2022 @12:00 pm
Enterprises face a constant stream of security and resiliency threats, many of which may be attributed to your supply chain and third party ecosystem.

Full Description

Speakers

Edna Conway

VP, Chief Security & Risk Officer, Azure Microsoft
Edna Conway currently serves as VP, Chief Security & Risk Officer, Azure at Microsoft. She is responsible for the security, resiliency and governance of the cloud infrastructure upon which Microsoft’s Intelligent Cloud business operates. She has built new organizations delivering trust, transparency, cybersecurity, compliance, risk management, sustainability and value chain transformation. She is recognized domestically (U.S. Presidential Commissions) and globally (NATO) as the developer of architectures delivering value chain security, sustainability and resiliency. Conway was appointed to the Executive Committee of the U.S. Department of Homeland Security Task Force on ICT Supply Chain Risk Management. Her insight is featured in a range of publications, analyst reports, and case studies, including Forbes, Fortune, Bloomberg, CIO Magazine and the Wall Street Journal. Prior to joining Microsoft, Conway served as Cisco’s Chief Security Officer, Global Value Chain, driving a comprehensive security architecture across Cisco’s third-party ecosystem. Conway was a partner in an international private legal practice and served as Assistant Attorney General for the State of New Hampshire before joining Cisco. She holds an AB from Columbia University, a law degree from the University of Virginia and additional credentials from MIT and Stanford, Carnegie Mellon and New York Universities.

Marene Allison

Chief Information Officer Johnson & Johnson

Mitigating Risk in the Supply Chain: A Comprehensive Approach

Enterprises face a constant stream of security and resiliency threats, many of which may be attributed to your supply chain and third party ecosystem. The growing challenge of sustaining business operations in this hyper-connected world has created a need for a comprehensive approach to tackling security and risk across the supply chain. Microsoft’s Edna Conway, VP of Security, Risk & Compliance for Microsoft’s cloud infrastructure, and Marene Allison, CISO at Johnson & Johnson, will discuss the importance of public-private partnership and real-world, tangible approaches to address supply chain security and resiliency.

Privacy Notice

This privacy notice discloses the privacy practices for (www.ascentconf.com). This privacy notice applies solely to information collected by this website. It will notify you of the following:

Information Collection, Use, and Sharing

We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.

We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.

Unless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this privacy policy.

Your Access to and Control Over Information

You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:

Security

We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.

Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for “https” at the beginning of the address of the Web page.

While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.

If you feel that we are not abiding by this privacy policy, you should contact us immediately via telephone at 202-256-9707 or [email protected].