The journey to the edge is a race to competitive differentiation, but it also brings new layers of complexity when it comes to cybersecurity. In this episode, Kevin L. Jackson sits down with AT&T Cybersecurity’s Theresa Lanowitz to discuss the eleventh edition of the AT&T Cybersecurity Insights Report: Securing the Edge. Tune in as they discuss edge use cases across verticals, a zero-trust approach to protecting data, why securing the supply chain is a cross-functional undertaking, the importance of a shared responsibility model and more.
Welcome to Digital Transformers, the show that connects you with what you need to build, manage, and operate your digital supply chain. Join your host in a timely discussion on new and future business models with industry leading executives. The show will reveal global customer expectations, real world deployment challenges, and the value of advanced business technologies like artificial intelligence, blockchain, and robotic process engineering. And now, we bring you Digital Transformers.
Kevin L. Jackson (00:41):
Hello, everyone. This is Kevin L. Jackson, and welcome to Digital Transformers on Supply Chain Now. Today is also an exciting one for Digital Transformers because we are highlighting one of our newest sponsors, AT&T business, and we have the opportunity to speak about cybersecurity. You know, how interested and how much that’s important to me. It’s a critical aspect of any business, and we’re going to be talking to one of the leading experts in the field, Theresa Lanowitz of AT&T Cybersecurity. She is the head of Evangelism. So, welcome to the show, Theresa.
Theresa Lanowitz (01:26):
Thanks very much, Kevin. Hi, everybody. Thanks for listening to us today.
Kevin L. Jackson (01:30):
Oh, no. I’m sure they’re sitting at the edge of their seats. But where are you physically today? Where are you coming from today?
Theresa Lanowitz (01:39):
So, physically I coming to you from Bellingham, Washington. It’s about 100 north of Seattle and it’s in the Pacific Northwest, the beautiful Pacific Northwest.
Kevin L. Jackson (01:50):
Oh, yeah. I’ve traveled there. In fact, my son, my eldest son lives just south of Seattle, in Kent. And I’m mad at him because he moved there with his wife and my two grandkids. So, it takes forever for me – we were getting there about every year or so until the pandemic hit. So, now I’m ready to, you know, get on that plane and go grab my grandkids.
Theresa Lanowitz (02:16):
Yeah. And do it in the summer because, you know, the Pacific Northwest has a reputation for a lot of overcast days, a lot of rain, but there is nothing like the summer in the Pacific Northwest. It stays light until almost 10 o’clock at night. You pay for that in the winter because it stays light until only 4 o’clock in the afternoon in the winter. But during the summer there is nothing like the Pacific Northwest. It is absolutely stunning. Absolutely beautiful. So, when you come visit, maybe we can get together.
Kevin L. Jackson (02:46):
Oh, yeah. Absolutely. I’m looking forward to it. But how did you get to AT&T? Why did your, your – can you share with us a bit of your background? I understand you were at Gartner for a while too?
Theresa Lanowitz (02:59):
Yeah. I worked at Gartner for a long time as an analyst. I started my career. I went to the University of Pittsburgh in Pittsburgh, Pennsylvania, and I started my career with McDonell Douglas in Long beach, California, working on the C17 military transport plane. So, I was a software developer there. And, C17, for your audience members that don’t know about the C 17, it’s a cargo plane, a transport plane, and it moves supplies from one place to another. And it is a massive plane and just does a lot of exceptional work around the world. So, I started as a software developer there and I then moved on to Borland International. If we have any developers, any database professionals out there, they’ll remember Borland. Borland made, of course, C++, Delphi, JBuilder. I was a systems engineer for a while for Paradox for Windows.
Theresa Lanowitz (03:52):
And I was also the product manager for Borland C++ at C++ development environment and JBuilder, which was the first Java development environment that was actually released into the market. And I went on from Borland and I worked at Sun Microsystems. And at Sun Microsystems, I worked on the Jini Project. And it’s spelled J-I-N-I, but pronounced like the woman’s name, Jeanie. And Jini was really interesting. They have to remember this is back in 1990 or so. Jini was sort of a follow on to what some Microsystems had done with Java. So, with Java the idea was write once run anywhere. And with Jini, Sun Microsystems had this idea of saying let’s build out these personal area networks and we can connect everything to the internet. We can connect watches, cars, household appliances. We can connect everything to the network. So, this was 1999. So, that idea is now, of course, the internet of things, and everybody understands it. And everybody, you know, really looks forward to what the internet of things is going to bring. But, you know, the idea of the internet of things has been going on for a long, long time.
Theresa Lanowitz (05:06):
And then, from Sun Microsystems, I went to Gartner. And at Gartner, I was the primary analyst for software quality assurance and working on the application cycle management type of team at Gartner. And I started writing a lot about and covering a lot about software quality. And coming around in 2002, 2003 or so, was this concept of application security. And security started to become a major, major thing, especially from the development side. So, I started working on application security back in 2002, 2003 when I was a Gartner, and I’ve been working with security ever since.
Theresa Lanowitz (05:49):
And so, I have that development background, quality assurance background. And, you know, I like to see how security is now moving. So, the developers are definitely now building with a security first mindset leading with that security first mindset when they think about developing and so on. And from there, from Gartner, I worked for a small boutique analyst firm called Voke for a while. And we did a lot of work with service virtualization, a lot of work with continuing quality and application development and security. And then, I went to work for AT&T, working on the cybersecurity side of things.
Kevin L. Jackson (06:26):
You know, God, your software background is so impressive, but AT&T is a network company. Right? I mean, so why – how did you wind up at AT&T business? I mean, if you’re doing software all your life, how did that become part of your path?
Theresa Lanowitz (06:50):
Yeah. But we’re living in a software-defined world. Everything is software driven now, right?
Kevin L. Jackson (06:53):
Oh, yes, yes.
Theresa Lanowitz (06:55):
Everything is software driven. And back in 2018, AT&T made an acquisition of a small company in a cybersecurity space called Alien Vault. And so, AT&T had a cybersecurity – has a cybersecurity division where the cybersecurity side of things actually live. So, AT&T Cybersecurity, there are two ways that AT&T Cybersecurity can help people. One is through our expert consulting services. So, our AT&T Cybersecurity consultants, they are amazing. They have incredible backgrounds. They have all the latest certifications, and everything that is new out there they are on the leading edge of doing everything. So, that’s the first way is through our cybersecurity consulting organization, our AT&T Cybersecurity consulting organization.
Theresa Lanowitz (07:41):
The second is through our AT&T Cybersecurity managed security services. So, we are a managed security services provider, and that works very well. It meshes very well with what we do from the network side. So, one of the things that we want to do at AT&T for our clients is to help make your network more resilient. You know, everybody’s network looks different. Everybody’s network is different. But if you have the same company helping you from a managed security services perspective and the same company helping you with your managed network, there’s that commonality. There’s that single point of contact when you do have an issue. So, that’s why AT&T was very attractive to me from a cybersecurity point of view.
Kevin L. Jackson (08:27):
So, when you think about cybersecurity, I mean the old way or traditional way of doing cybersecurity is what, you know, I’ve always called sort of an infrastructure centric way of protecting your network. And that’s when companies own their own network and you would – I call it like wall and mote. You keep all the bad guys off the network. You only approve the good guys to come in. But that’s really not possible today as people are transitioning into the cloud and using other people’s network, and you don’t even know what hardware is being used. So, has the balance, I guess, between hardware for cybersecurity and software for cybersecurity, has that changed dramatically here?
Theresa Lanowitz (09:23):
Yeah. So, you bring up a really good point that it was just about protecting that sort of hub-and-spoke type of network environment that we have been used to living with. And now, as you bring up, there are devices everywhere. Your workers are everywhere. Your workers are remote so that traditional hub-and-spoke network really no longer works in today’s environment. You have to make sure that you’re protecting your users. You have to make sure that you’re protecting your applications, and you certainly have to make sure that you’re protecting your infrastructure. But at the core of all, that is the data that you have to protect. And so, that complexity is continuing to grow, especially as we move to things such as edge computing. So, an edge computing kinda says that we’re going to take a look at that remote management, that remote network, that remote intelligence that we have out there. So, those days of the hub-and-spoke network are definitely gone. And we start to see things like such as the Zero Trust framework come in and be extremely important in protecting today’s infrastructure and protecting today’s users and protecting today’s applications, as well as that data.
Kevin L. Jackson (10:34):
Well, I can really see why you’re the brains behind the recent AT&T Cybersecurity report. So, what is your day job there at AT&T?
Theresa Lanowitz (10:47):
Yeah. So, you mentioned the AT&T Cybersecurity insights report, and this is an annual report that we put out every single year. We launched it in January of 2022. So, January 25th to be exact, January 2022. And this year’s report really focuses on securing the edge. And when I first got to AT&T back at the end of 2019, we were working on the insights report. AT&T has been publishing the insights report since 2015. And with the version nine report that we launched for our 2019-2020 year, we wanted to find out what enterprise organizations were going to do for cybersecurity as this new thing. And think about it back at the end of 2019, we knew 5G was coming, but people hadn’t yet adopted it. So, we wanted to find out what people were going to do inside their enterprise to safeguard and protect their digital assets, their applications, their data, their endpoints, as this new network type was coming in, this new network that was more secure than any previous generation of network that had lower latency, higher bandwidth. But what were they going to do to protect and safeguard their digital assets? And that’s what we focused on in our version nine of the report
Theresa Lanowitz (12:06):
In our version 10 of the report, which was published in 2021, we focused on how organizations still protected and safeguarded those digital assets in a hybrid network format. And now with our 2022 report, what we wanted to focus on is what organizations were doing in terms of the edge. What types of architectures were they using? What types of use cases did they have out there? And then how were they really taking a look at their cybersecurity controls and their network functions? What were they doing? Were they using them on premise? Were they using them in the cloud? Were they doing a cost benefit analysis of those traditional cybersecurity controls and say maybe we need to continue to use this, maybe we need to throw this one out?
Theresa Lanowitz (12:53):
So, that’s a long answer to your question on what is my day job at AT&T. The cybersecurity insights report is certainly a big part of it, but a lot of it is going out speaking with our clients, speaking with our prospects about this cybersecurity insights report, about what we can offer them from an AT&T Cybersecurity perspective, how we can help to protect their digital assets and make their networks more resilient. So, I do a lot of that. I do a lot of writing. This AT&T Cybersecurity insights report is something that’s really critical every year to the success of what we do at AT&T business.
Kevin L. Jackson (13:33):
Well, one thing that – the very first sentence of this report says that edge means different things to different people and vendors are really defining the edge according to their own technology stack. If that’s true, I mean, how do you do your job? What does it mean to a business executor and how should they communicate to all these different vendors that, you know, have different ideas of what edge is?
Theresa Lanowitz (14:07):
Yeah. Such a great point to bring up. And one thing I really want to stress is that this AT&T Cybersecurity insights report is vendor neutral. So, it is not saying here are products from AT&T, here are products from any other vendor. It is vendor neutral, and it is really forward looking. And that’s one of the things we really pride ourself on. The research that we do for it is both quantitative as well as qualitative. So, from the quantitative side, we bring in subject matter experts from around the cybersecurity world. And we interview these cybersecurity experts. We also bring in experts from the edge, from networking, and we interview these subject matter experts. From the quantitative side, this year, we’ve gone off and we interviewed 1520 survey participants from around the world. And we surveyed certainly North America, also Latin America, AMIA, which includes UK, Ireland, France, and Germany, as well as APAC, which includes, India, South Korea, and Singapore. So, it truly is a global survey.
Theresa Lanowitz (15:16):
And we brought in experts who are in cybersecurity certainly. We brought in IT experts, but we also brought in line of business experts. And this gets back to the question that you’re asking about executives being able to communicate about the edge. So, one of the things we found in our 2021 report is that 5G is largely being adopted. The adoption is being driven by these line of business executives. So, the line of business is saying, there’s this great new technology out there. And the reason they’re doing it is they need to remain competitive.
Theresa Lanowitz (15:55):
So, last year we found that 58% of organizations that were bringing in 5G technology were doing it to remain competitive. And so, then you bring up this idea of the edge. And so, we’re poised in this new era of edge computing, underpinned by 5G technologies. And executives are saying, well, what can we do to get to the edge? What can we do to be more competitive? And they probably have a lot of different vendors coming in saying, well, here’s what edge means to us. Here’s what edge means to us. As you said, you know, that’s one of the things we say in the report is that edge means different things to different people. And each vendor’s really defining it according to their technology stack. And that’s okay.
Theresa Lanowitz (16:38):
What we like to say is that the definition of edge is really influx and there are three common characteristics. So, first it’s really that distributed model of management intelligence and networks. It is certainly software-defined and talked about is the fact that we’re living in a software-defined world right now. Our lives are dependent, our businesses are dependent upon software. And the third edge characteristics is that your applications, your workloads, everything is being hosted closer to where that data is being consumed and created because it’s all about the data. We’ve moved away from that hub-and-spoke traditional type of network model. So, we want to be closer to where we’re generating and consuming that data.
Kevin L. Jackson (17:26):
So, when you are talking about the importance of the data and it seems like this is really all about the business model of how you are leveraging the edge in order to be competitive within your industry vertical. Does that change what the edge is based upon your industry?
Theresa Lanowitz (17:49):
Sure. I think it will change for every different industry. And that’s one of the things that we looked at was, we surveyed six different vertical markets, retail, manufacturing, finance, US public sector, energy and utilities. And did I say manufacturing? Manufacturing, finance – manufacturing, retail, finance, US public sector, energy and utilities and healthcare. Healthcare. Healthcare. So, we interviewed enough people in each of those vertical markets to be statistically significant for the report. And we wanted to know the types of use cases that each of them were working on because edge means different things to different people. And so, for example, healthcare, you know, they said to us edge means it is remote healthcare. So, popup clinics, hello medicine, healthcare at home. And that was largely driven by the pandemic. It’s no longer going into the doctor’s office. It is having telemedicine visits via some type of collaboration app on your computer. It is – healthcare was stressed early, early on in the pandemic. They had to set up all of these remote testing sites and they had to make sure that they were able to protect personal health information, PHI, protect PII, do everything that they could do in a hospital or in a doctor’s office in remote locations for testing. So, those are some of the use cases that healthcare had.
Theresa Lanowitz (19:27):
For example, we see edge use cases for retail. They’re focused on loss prevention. We see manufacturing. They’re very focused on inspection of the manufacturing line. So, if something is being passed through on the manufacturing line, using cameras and sensors to identify where a defect may have actually been inserted during the production time. So, every single one of those vertical markets that we broke out, they’re all looking at edge differently as well. And they’re saying here’s our use case. Here’s how we want to get to it. Help us get to it.
Kevin L. Jackson (20:01):
So, I tell you this being a supply chain show, one of the findings that really baffled me was Table 2 in the report, which indicated that most industry verticals weren’t really concerned about cyberattacks on their supply chains, given all of the talk about the national security threat associated with that very issue. Can you give us a little perspective on that data of people? Are they ostriches with their head in the sand?
Theresa Lanowitz (20:38):
Yeah. You bring up bring up Table 2 in the report. So, for our listening audience, if you download the AT&T Cybersecurity insights report, Table 2 talks about the concerns of attacks. And to me, it is the most interesting piece of data in the entire report because it breaks it out by attack concerns that people have. And then, it also breaks it out by those different, those six different vertical industries that we talk about. And so, when you look at it really is a heat map. And 74% of our survey participants said, yes, we think an attack is likely. And then, you can look at it and see by industry vertical, by healthcare, by manufacturing, what are they most concerned about? And everybody is obviously very concerned about ransomware, but you bring up the fact that supply chain was really, really low across the board.
Theresa Lanowitz (21:31):
And when we got that back, we too were really surprised because one of the things we heard so much about, especially in 2021, was the importance of the supply chain. The supply chain is critically important. If you take a look at some of the cyber events that have in the history of cybersecurity, so many of them were because of a weak link in the supply chain if you will. We know that not one organization is doing everything end to end. You have to really secure that supply chain. And so, we were really surprised by that as well. And when we took a look at the data we say it’s not that they’re not concerned about the supply chain. What we believe is that the people who took our survey, they’re saying, yes, the supply chain is absolutely important and absolutely critical, but we, from a cyber perspective, those of us on a cybersecurity side, we can’t be the only ones concerned about securing the supply chain. It really is a collective effort to secure that supply chain. So, of course, working with your third-party suppliers, working with other people within your organization, working cross functionally, making sure that the it team is aware of what’s going on, the application develop team is aware of what’s going on, the line of businesses aware working with those external suppliers.
Theresa Lanowitz (22:56):
And, you know, one of the things we heard through some of the subject matter expert interviews that we did specifically related to supply chain is people said, you know, we’re going to start attaching a confidence score to our supply chain. So, if we have the choice of maybe three suppliers, we’re going to go to the supplier with the highest confidence score. And, of course, a lot of that is going to be dependent upon their cybersecurity policies, their cybersecurity practices internally, how they manage their security. So, security is part of that whole supply chain, securing the supply chain, but it’s not one individual that’s responsible for it. So, it doesn’t come down to one team. And I think when we looked at that data, as I said, we were very surprised, but that’s how we interpreted that data. And some of those, that surprise really of supply chain not being higher. Yeah.
Kevin L. Jackson (23:51):
Well, yeah. Because software supply chain, we see issues about that just about every day. And, now, as the entire world is transitioning to a 5G, does this enhance cybersecurity or do the bad guys just have more threat vectors to exploit?
Theresa Lanowitz (24:16):
Yeah. So, it’s interesting. You referred to Table 2 and I love referring to Table 2 because as I said that’s my favorite piece of data in that entire report. So, you bring up, we’re going to edge compute, underpinned by 5G technology. And what does that mean? So, we know that the 5G network is inherently more secure than any previous generation of network. But what we also know is that you as a customer of that network, regardless of who your supplier is for that network, regardless of what carrier you’re bringing that from you, as the customer of that 5G network, you have to be responsible for safeguarding your own digital assets. So, safeguarding your applications, your data, your endpoints, and so on. And this brings us to the idea of a shared responsibility model. And in our 2021 AT&T Cybersecurity insights report we spoke a lot about the shared responsibility model saying that you as a customer of that network cannot expect that the network provider is going to provide you with application security, is going to provide you with endpoint security, is going to provide you with taking care of updating your operating systems and so on. So, it comes down to that idea of shared responsibility. And I think that’s something that we’re used to seeing from cloud. We certainly have that shared responsibility model with cloud. We have that same concept of a shared responsibility model with 5G as well as everything that we are putting on that network.
Kevin L. Jackson (25:52):
Well, I tell you, we’re going so deep into this report. I’m going to have to – I want to tell my audience, the link to the report is right below here in the show notes. Because you’re going to have to replay this to see, to pull out all the gems. And, I’m going to talk about one, again, that table of Figure 9. How should someone interpret Figure 9 where it looks and rates different cybersecurity controls by network?
Theresa Lanowitz (26:28):
Yeah. So, you bring up Figure 9 and I would say Figure 9 and Figure 10, when you read the report, we looked at cybersecurity controls by network type, as well as cybersecurity controls by component type. So, this is – and keep in mind, this report is really about securing the edge. And 75% of the survey participants told us that they were on that journey to the edge that they were either thinking about edge computing, they had fully implemented an edge solution, or they had partially implemented an edge solution. So, these are people who are thinking down the path of edge. They’re not just saying, you know, it’s not for us. So, these are people who are actively thinking about edge. And so, from the network types and the cybersecurity controls, they told us that intrusion, threat detection, is certainly one of those top concerns by the different types of network types that we had listed, device authentication, data leakage really, really important.
Theresa Lanowitz (27:32):
But when you take a look at the two charts in there, Figure 9 and Figure 10, you’ll see that there’s one piece of commonality. And that piece of commonality between cybersecurity controls and network types and cybersecurity controls and components, that piece of commonality is really device authentication. And that can take us to a big discussion on Zero Trust, making sure, and Zero Trust, that concept of saying, that framework of saying that we trust nobody and we trust no thing because you brought up this idea of, you know, with 5G, we’re going to have all these IOT devices attached. We have to verify everything. So, we trust nothing. We trust no thing, including all those IOT devices. And we trust no person, even though it’s Kevin coming from my company domain.com. I don’t really know that that is you. I have to verify that it’s you, and I’m not – just because, you know, you have an email address coming from my domain name. I want to make sure. We talked about this in terms of that traditional hub-and-spoke network no longer being something that is the way we’re living, right? Because we’re working in a hybrid world. We have remote workers. O making sure that we don’t trust anybody or anything, and we don’t, and we verify everybody and everything. And that concept of Zero Trust along with device authentication is really critical. And regardless of where people are on their journey to the edge, bringing in a Zero Trust concept early on can only help you as you move forward.
Kevin L. Jackson (29:17):
I’m going to pull on that string a little bit because the shared responsibility model I think is really, really important. But in that model, the network provider is responsible for authenticating the device that’s connecting, but the user is responsible for endpoint protection. I mean, is there a gap there, or how does the users endpoint protection work and comply with the networks requirement to authenticate?
Theresa Lanowitz (29:59):
Yeah. So that communication between that endpoint and the chosen network that you are using to actually run that device on. So, there’s a lot of connectivity there. There’s a lot of – you know, as you said that the network provider is going to be responsible for making sure that is a legitimate device to connect to the network, but you as the owner of that device, you have to make sure that you are securing that endpoint and protecting that device.
Kevin L. Jackson (30:30):
Wow. This is a very comprehensive report, and it really sheds light on how different industry verticals are handling their security at the edge. Will you be doing any specific industry vertical reports?
Theresa Lanowitz (30:48):
Yeah. You know, I’m so happy that you brought that up. One of the pieces of data in the report shows that all of those six industries that we surveyed they’re really concerned about attacks, and they also know that it would have a tremendous impact on their business. So, we’re going to be doing four industry vertical reports over the course of this year. We’re starting with healthcare. So that healthcare vertical report launched on the AT&T website, February 22nd. In May, we’re going to be coming out with a vertical report for US public sector based on the data from the US public sector that we collected. And then, in the June timeframe, we’re going to be coming out with a vertical report for manufacturing. And then, in the September timeframe, we’re going to be coming out with a report for energy and utilities.
Theresa Lanowitz (31:38):
And all of these vertical reports, they’re all based upon the data that we collected for this core AT&T Cybersecurity insights report. Because as I mentioned at the beginning, we collect that data and we tabulate it and we have it broken up by different industry, by different geography, and so on. And again, this is all vendor neutral. This is what healthcare organizations are thinking about as they move to the edge, how are they thinking cybersecurity as they move to the edge, what are they thinking about in terms of their network architecture, their use cases and so on. And we’ll do that same thing for US public sector, manufacturing, and energy and utilities.
Kevin L. Jackson (32:16):
Oh, great. Oh, I’ll tell you. Thank you. Thank you for your time and perspective today, Theresa. So, unfortunately, our time has come to the end, but I want to get your commitment to come back and tell us more about those other industry vertical reports, but –
Theresa Lanowitz (32:35):
I will definitely come back.
Kevin L. Jackson (32:37):
Okay, great, great. So, how can the audience get a copy of the report? We’re going to have the link in below. But how can they like reach out to you if they have more questions?
Theresa Lanowitz (32:51):
Sure. I am on LinkedIn, Theresa, T-H-E-R-E-S-A, Lanowitz, L-A-N-O-W-I-T-Z. I’m on LinkedIn and I am on Twitter. I’m far more active on LinkedIn than I am on Twitter. I think Kevin can attest to that. So, reach out to me on LinkedIn. I am happy to answer any questions. And visit cybersecurity.att.com to download your copy of the report. And, you know, one of the things I really wanted to close with, Kevin, is cybersecurity for so long has been perceived to be it’s a technical problem. And what we saw with the pandemic, and we saw so many industries and we saw this certainly with healthcare, where they had to very quickly spin up testing sites and so on, every business really pivoted. And what we see now is that cybersecurity is really not a technical problem. It’s a business enabler. And as you think about digital transformation, cybersecurity is at the core of every conversation about digital transformation. So, take this report, this AT&T Cybersecurity insights report. It is vendor neutral. Take it back to your organization. Think about the types of things that you’re thinking about with edge. Think about your network architecture, your use cases and so on, and use it to spark those discussions internally.
Kevin L. Jackson (34:11):
Yes. The cybersecurity is at the heart of digital transformation. So, in closing, I would like to invite everyone and to check out the wide variety of industry thought leadership that we provide at supplychainnow.com. And you can find digital Transformers and supply chain Now wherever you get your podcast. So be sure to subscribe. So, on behalf of the entire team here at Supply Chain Now, this is Kevin L. Jackson wishing all of our listeners a bright and transformational future. We’ll see you next time on Digital Transformers.
Thank you for supporting Digital Transformers and for being a part of our goal global Supply Chain Now Community. Please check out all of our programming at supplychainnow.com. Make sure you subscribe to Digital Transformers anywhere you listen to or view the show and follow us on Facebook, LinkedIn, Twitter, and Instagram. See you next time on digital Transformers.
Theresa Lanowitz is a proven global influencer and speaks on trends and emerging technology poised to help today’s enterprise organizations flourish. Theresa is currently the head of cybersecurity evangelism at AT&T Business. Prior to joining AT&T, Theresa was an industry analyst with boutique analyst firm voke and Gartner. While at Gartner, Theresa spearheaded the application quality ecosystem, championed application security technology, and created the successful Application Development conference. As a product manager at Borland International Software, Theresa launched the iconic Java integrated development environment, JBuilder. While at Sun Microsystems, Theresa led strategic marketing for the Jini project – a precursor to IoT (Internet of Things). Theresa’s professional career began with McDonnell Douglas where she was a software developer on the C-17 military transport plane and held a US Department of Defense Top Secret security clearance. Theresa holds a Bachelor of Science in Computer Science from the University of Pittsburgh, Pittsburgh, PA. Connect with Theresa on LinkedIn.
Host, Logistics with Purpose
Adrian Purtill serves as Business Development Manager at Vector Global Logistics, where he consults with importers and exporters in various industries to match their specific shipping requirements with the most effective supply chain solutions. Vector Global Logistics is an asset-free, multi-modal logistics company that provides exceptional sea freight, air freight, truck, rail, general logistic services and consulting for our clients. Our highly trained and professional team is committed to providing creative and effective solutions, always exceeding our customer’s expectations and fostering long-term relationships. With more than 20+ years of experience in both strategy consulting and logistics, Vector Global Logistics is your best choice to proactively minimize costs while having an exceptional service level.
Joshua is a student from Institute of Technology and Higher Education of Monterrey Campus Guadalajara in Communication and Digital Media. His experience ranges from Plug and Play México, DearDoc, and Nissan México creating unique social media marketing campaigns and graphics design. Joshua helps to amplify the voice of supply chain here at Supply Chain Now by assisting in graphic design, content creation, asset logistics, and more. In his free time he likes to read and write short stories as well as watch movies and television series.
Data Analytics and Metrics Intern
Patch is a fourth-year Management Information Systems and Marketing major at the University of Georgia. He is working with Supply Chain Now in data analysis, finding insights and best practices to increase company efficiency. Patch previously worked as an intern at AnswerRocket, a data analytics company where he gained invaluable knowledge about analytics, webpage SEO and B2B marketing best practices. In his free time, he enjoys playing tennis, going to concerts, and watching movies.
Vicki has a long history of rising to challenges and keeping things up and running. First, she supported her family’s multi-million dollar business as controller for 12 years, beginning at the age of 17. Then, she worked as an office manager and controller for a wholesale food broker. But her biggest feat? Serving as the chief executive officer of her household, while her entrepreneur husband travelled the world extensively. She fed, nurtured, chaperoned, and chauffeured three daughters all while running a newsletter publishing business and remaining active in her community as a Stephen’s Minister, Sunday school teacher, school volunteer, licensed realtor and POA Board president (a title she holds to this day). A force to be reckoned with in the office, you might think twice before you meet Vicki on the tennis court! When she’s not keeping the books balanced at Supply Chain Now or playing tennis matches, you can find Vicki spending time with her husband Greg, her 4 fur babies, gardening, cleaning (yes, she loves to clean!) and learning new things.
Founder, CEO, & Host
As the founder and CEO of Supply Chain Now, you might say Scott is the voice of supply chain – but he’s too much of a team player to ever claim such a title. One thing’s for sure: he’s a tried and true supply chain expert. With over 15 years of experience in the end-to-end supply chain, Scott’s insights have appeared in major publications including The Wall Street Journal, USA Today, and CNN. He has also been named a top industry influencer by Thinkers360, ISCEA and more.
From 2009-2011, Scott was president of APICS Atlanta, and he continues to lead initiatives that support both the local business community and global industry. A United States Air Force Veteran, Scott has also regularly led efforts to give back to his fellow veteran community since his departure from active duty in 2002.
Host, Logistics with Purpose
Allison Krache Giddens has been with Win-Tech, a veteran-owned small business and aerospace precision machine shop, for 15 years, recently buying the company from her mentor and Win-Tech’s Founder, Dennis Winslow. She and her business partner, John Hudson now serve as Co-Presidents, leading the 33-year old company through the pandemic.
She holds undergraduate degrees in psychology and criminal justice from the University of Georgia, a Masters in Conflict Management from Kennesaw State University, a Masters in Manufacturing from Georgia Institute of Technology, and a Certificate of Finance from the University of Georgia. She also holds certificates in Google Analytics, event planning, and Cybersecurity Risk Management from Harvard online. Allison founded the Georgia Chapter of Women in Manufacturing and currently serves as Treasurer. She serves on the Chattahoochee Technical College Foundation Board as its Secretary, the liveSAFE Resources Board of Directors as Resource Development Co-Chair, and on the Leadership Cobb Alumni Association Board as Membership Chair and is also a member of Cobb Executive Women. She is on the Board for the Cobb Chamber of Commerce’s Northwest Area Councils. Allison runs The Dave Krache Foundation, a non-profit that helps pay sports fees for local kids in need.
Principal, Supply Chain Now
Host of Supply Chain Now and TECHquila Sunrise
When rapid-growth technology companies, venture capital and private equity firms are looking for advisory, they call Greg – a founder, board director, advisor and catalyst of disruptive B2B technology and supply chain. An insightful visionary, Greg guides founders, investors and leadership teams in creating breakthroughs to gain market exposure and momentum – increasing overall company esteem and valuation.
Greg is a founder himself, creating Blue Ridge Solutions, a Gartner Magic Quadrant Leader in cloud-native supply chain applications, and bringing to market Curo, a field service management solution. He has also held leadership roles with Servigistics (PTC) and E3 Corporation (JDA/Blue Yonder). As a principal and host at Supply Chain Now, Greg helps guide the company’s strategic direction, hosts industry leader discussions, community livestreams, and all in addition to executive producing and hosting his original YouTube channel and podcast, TEChquila Sunrise.
Principal, Supply Chain Now
Host of Supply Chain is Boring
Talk about world-class: Chris is one of the few professionals in the world to hold CPIM-F, CLTD-F and CSCP-F designations from ASCM/APICS. He’s also the APICS coach – and our resident Supply Chain Doctor. When he’s not hosting programs with Supply Chain Now, he’s sharing supply chain knowledge on the APICS Coach Youtube channel or serving as a professional education instructor for the Georgia Tech Supply Chain & Logistic Institute’s Supply Chain Management (SCM) program and University of Tennessee-Chattanooga Center for Professional Education courses.
Chris earned a BS in Industrial Engineering from Bradley University, an MBA with emphasis in Industrial Psychology from the University of West Florida, and is a Doctoral in Supply Chain Management candidate.
Host of TEKTOK
If there’s one Supply Chain ‘Pro to Know,’ it’s Karin. She’s earned the title for three years and counting – culminating in her designation as the “2020 Supply Chain Pro to Know of the Year.” Karin is also an award-winning digital supply chain, business strategy and technology marketing executive. A sought-after speaker at industry conferences, you will find her quoted in a variety of supply chain publications – and active in forums like ASCM/APICS and CSCMP.
With more than 25 years of supply chain experience, Karin spearheaded strategy and marketing for Gartner Magic Quadrant Leader and IDC MarketScape Leader, Logility. Karin has the heart of a teacher and has helped nearly 1,000 customers transform their businesses and tell their success stories. Today, she is a sought-after advisor helping high-growth B2B technology companies with everything from defining their unique value propositions to introducing new products and capturing customer success. No matter their goals, she makes sure her clients have actionable marketing strategies that help grow global revenue, market share and profitability.
Host of Digital Transformers
Kevin L. Jackson is a globally recognized Thought Leader, Industry Influencer and Founder/Author of the award winning “Cloud Musings” blog. He has also been recognized as a “Top 5G Influencer” (Onalytica 2019, Radar 2020), a “Top 50 Global Digital Transformation Thought Leader” (Thinkers 360 2019) and provides strategic consulting and integrated social media services to AT&T, Intel, Broadcom, Ericsson and other leading companies. Mr. Jackson’s commercial experience includes Vice President J.P. Morgan Chase, Worldwide Sales Executive for IBM and SAIC (Engility) Director Cloud Solutions. He has served on teams that have supported digital transformation projects for the North Atlantic Treaty Organization (NATO) and the US Intelligence Community. Kevin’s formal education includes a MS Computer Engineering from Naval Postgraduate School; MA National Security & Strategic Studies from Naval War College; and a BS Aerospace Engineering from the United States Naval Academy. Internationally recognizable firms that have sponsored articles authored by him include Cisco, Microsoft, Citrix and IBM. Books include “Click to Transform” (Leaders Press, 2020), “Architecting Cloud Computing Solutions” (Packt, 2018), and “Practical Cloud Security: A Cross Industry View” (Taylor & Francis, 2016). He also delivers online training through Tulane University, O’Reilly Media, LinkedIn Learning, and Pluralsight. Mr. Jackson retired from the U.S. Navy in 1994, earning specialties in Space Systems Engineering, Carrier Onboard Delivery Logistics and carrier-based Airborne Early Warning and Control. While active, he also served with the National Reconnaissance Office, Operational Support Office, providing tactical support to Navy and Marine Corps forces worldwide.
Host of Logistics with Purpose and Supply Chain Now en Español
Enrique serves as Managing Director at Vector Global Logistics and believes we all have a personal responsibility to change the world. He is hard working, relationship minded and pro-active. Enrique trusts that the key to logistics is having a good and responsible team that truly partners with the clients and does whatever is necessary to see them succeed. He is a proud sponsor of Vector’s unique results-based work environment and before venturing into logistics he worked for the Boston Consulting Group (BCG). During his time at BCG, he worked in different industries such as Telecommunications, Energy, Industrial Goods, Building Materials, and Private Banking. His main focus was always on the operations, sales, and supply chain processes, with case focus on, logistics, growth strategy, and cost reduction. Prior to joining BCG, Enrique worked for Grupo Vitro, a Mexican glass manufacturer, for five years holding different positions from sales and logistics manager to supply chain project leader in charge of five warehouses in Colombia.
He has an MBA from The Wharton School of Business and a BS, in Mechanical Engineer from the Technologico de Monterrey in Mexico. Enrique’s passions are soccer and the ocean, and he also enjoys traveling, getting to know new people, and spending time with his wife and two kids, Emma and Enrique.
Host of Dial P for Procurement
Kelly is the Owner and Managing Director of Buyers Meeting Point and MyPurchasingCenter. She has been in procurement since 2003, starting as a practitioner and then as the Associate Director of Consulting at Emptoris. She has covered procurement news, events, publications, solutions, trends, and relevant economics at Buyers Meeting Point since 2009. Kelly is also the General Manager at Art of Procurement and Business Survey Chair for the ISM-New York Report on Business. Kelly has her MBA from Babson College as well as an MS in Library and Information Science from Simmons College and she has co-authored three books: ‘Supply Market Intelligence for Procurement Professionals’, ‘Procurement at a Crossroads’, and ‘Finance Unleashed’.
Host, Veteran Voices
Mary Kate Soliva is transitioning from active duty in the US Army. She is currently in the Doctor of Criminal Justice program at Saint Leo University. She is passionate about combating human trafficking and has spent the last decade conducting training for military personnel and the local community.
Jeff Miller is the host of Supply Chain Now’s Supply Chain is the Business. Jeff is a digital business transformation and supply chain advisor with deep expertise in Industry 4.0, ERP, PLM, SCM, IoT, AR and related technologies. Through more than 25 years of industry and consulting experience, he has worked with many of the world’s leading product and service companies to achieve their strategic business and supply chain goals, creating durable business value for organizations at the forefront of technology and business practices. Jeff is the managing director for North America at Transition Technologies PSC, a global solution integrator, and the founder and managing principal of BTV Advisors, a firm that helps companies secure business transformation value from digital supply chain technologies and their breakthrough capabilities.
Chief Marketing Officer
Amanda is a marketing veteran and entrepreneur with over 15 years of experience across a variety of industries and organizations including Von Maur, Anthropologie, AmericasMart Atlanta, and Children’s Healthcare of Atlanta. In 2016, Amanda founded and grew the Magnolia Marketing Group into a successful digital media firm, and now she develops modern marketing strategies, social campaigns, innovative operational processes, and implements creative content initiatives for Supply Chain Now. But that’s just the beginning of her supply chain impact. Amanda also served as the VP of Information Systems and Webmaster on the Board of Directors for APICS Savannah for several years, and is the face behind the scenes welcoming you to every Supply Chain Now livestream! She was also recently selected as one of the Top 100 Women in Supply Chain by Supply Chain Digest and IBM. When she’s not leading the Supply Chain Now marketing team, you can find Amanda with her and her husband Scott’s three kids, in the kitchen cooking, or reading.
Business Development Manager
Clay is passionate about two things: supply chain and the marketing that goes into it. Recently graduated with a degree in marketing at the University of Georgia, Clay got his start as a journalism major and inaugural member of the Owl’s football team at Kennesaw State University – but quickly saw tremendous opportunity in the Terry College of Business. He’s already putting his education to great use at Supply Chain Now, assisting with everything from sales and brand strategy to media production. Clay has contributed to initiatives such as our leap into video production, the guest blog series, and boosting social media presence, and after nearly two years in Supply Chain Now’s Marketing Department, Clay now heads up partnership and sales initiatives with the help of the rest of the Supply Chain Now sales team.
Trisha is new to the supply chain industry – but not to podcasting. She’s an experienced podcast manager and virtual assistant who also happens to have 20 years of experience as an elementary school teacher. It’s safe to say, she’s passionate about helping people, and she lives out that passion every day with the Supply Chain Now team, contributing to scheduling and podcast production.
Host of Dial P for Procurement
Billy Taylor is a Proven Business Excellence Practitioner and Leadership Guru with over 25 years leading operations for a Fortune 500 company, Goodyear. He is also the CEO of LinkedXL (Excellence), a Business Operating Systems Architecting Firm dedicated to implementing sustainable operating systems that drive sustainable results. Taylor’s achievements in the industry have made him a Next Generational Lean pacesetter with significant contributions.
An American business executive, Taylor has made a name for himself as an innovative and energetic industry professional with an indispensable passion for his craft of operational excellence. His journey started many years ago and has worked with renowned corporations such as The Goodyear Tire & Rubber Co. (GT) leading multi-site operations. With over 3 decades of service leading North America operations, he is experienced in a deeply rooted process driven approach in customer service, process integrity for sustainability.
A disciple of continuous improvement, Taylor’s love for people inspires commitment to helping others achieve their full potential. He is a dynamic speaker and hosts "The Winning Link," a popular podcast centered on business and leadership excellence with the #1 rated Supply Chain Now Network. As a leadership guru, Taylor has earned several invitations to universities, international conferences, global publications, and the U.S. Army to demonstrate how to achieve and sustain effective results through cultural acceptance and employee ownership. Leveraging the wisdom of his business acumen, strong influence as a speaker and podcaster Taylor is set to release "The Winning Link" book under McGraw Hill publishing in 2022. The book is a how-to manual to help readers understand the management of business interactions while teaching them how to Deine, Align, and Execute Winning in Business.
A servant leader, Taylor, was named by The National Diversity Council as one of the Top 100 Diversity Officers in the country in 2021. He features among Oklahoma's Most Admired CEOs and maintains key leadership roles with the Executive Advisory Board for The Shingo Institute "The Nobel Prize of Operations" and The Association of Manufacturing Excellence (AME); two world-leading organizations for operational excellence, business development, and cultural learning. He is also an Independent Director for the M-D Building Products Board, a proud American manufacturer of quality products since 1920.
Social Media Manager
My name is Chantel King and I am the Social Media Specialist at Supply Chain Now. My job is to make sure our audience is engaged and educated on the abundant amount of information the supply chain industry has to offer.
Social Media and Communications has been my niche ever since I graduated from college at The Academy of Art University in San Francisco. No, I am not a West Coast girl. I was born and raised in New Jersey, but my travel experience goes way beyond the garden state. My true passion is in creating editorial and graphic content that influences others to be great in whatever industry they are in. I’ve done this by working with lifestyle, financial, and editorial companies by providing resources to enhance their businesses.
Another passion of mine is trying new things. Whether it’s food, an activity, or a sport. I would like to say that I am an adventurous Taurus that never shies away from a new quest or challenge.
Lori is currently completing a degree in marketing with an emphasis in digital marketing at the University of Georgia. When she’s not supporting the marketing efforts at Supply Chain Now, you can find her at music festivals – or working toward her dream goal of a fashion career. Lori is involved in many extracurricular activities and appreciates all the learning experiences UGA has brought her.
Sales and Marketing Coordinator
Katherine is a marketing professional and MBA candidate who strives to unite her love of people with a passion for positive experiences. Having a diverse background, which includes nonprofit work with digital marketing and start-ups, she serves as a leader who helps people live their most creative lives by cultivating community, order, collaboration, and respect. With equal parts creativity and analytics, she brings a unique skill set which fosters refining, problem solving, and connecting organizations with their true vision. In her free time, you can usually find her looking for her cup of coffee, playing with her puppy Charlie, and dreaming of her next road trip.
Ben Harris is the Director of Supply Chain Ecosystem Expansion for the Metro Atlanta Chamber. Ben comes to the Metro Atlanta Chamber after serving as Senior Manager, Market Development for Manhattan Associates. There, Ben was responsible for developing Manhattan’s sales pipeline and overall Americas supply chain marketing strategy. Ben oversaw market positioning, messaging and campaign execution to build awareness and drive new pipeline growth. Prior to joining Manhattan, Ben spent four years with the Georgia Department of Economic Development’s Center of Innovation for Logistics where he played a key role in establishing the Center as a go-to industry resource for information, support, partnership building, and investment development. Additionally, he became a key SME for all logistics and supply chain-focused projects. Ben began his career at Page International, Inc. where he drove continuous improvement in complex global supply chain operations for a wide variety of businesses and Fortune 500 companies. An APICS Certified Supply Chain Professional (CSCP), Ben holds an Executive Master’s degree in Business Administration (EMBA) and bachelor’s degree in International Business (BBA) from the Terry College at the University of Georgia.
Host, The Freight Insider
Prior to joining TeamOne Logistics, Page Siplon served as the Executive Director of the Georgia Center of Innovation for Logistics, the State’s leading consulting resource for fueling logistics industry growth and global competitiveness. For over a decade, he directly assisted hundreds of companies to overcome challenges and capitalize on opportunities related to the movement of freight. During this time, Siplon was also appointed to concurrently serve the State of Georgia as Director of the larger Centers of Innovation Program, in which he provided executive leadership and vision for all six strategic industry-focused Centers. As a frequently requested keynote speaker, Siplon is called upon to address a range of audiences on unique aspects of technology, workforce, and logistics. This often includes topics of global and domestic logistics trends, supply chain visibility, collaboration, and strategic planning. He has also been quoted as an industry expert in publications such as Forbes, Journal of Commerce, Fortune, NPR, Wall Street Journal, Reuters, American Express, DC Velocity, Area Development Magazine, Site Selection Magazine, Inbound Logistics, Modern Material Handling, and is frequently a live special guest on SiriusXM’s Road Dog Radio Show. Siplon is an active industry participant, recognized by DC Velocity Magazine as a “2012 Logistics Rainmaker” which annually identifies the top-ten logistics professionals in the Nation; and named a “Pro to Know” by Supply & Demand Executive Magazine in 2014. Siplon was also selected by Georgia Trend Magazine as one of the “Top 100 Most Influential Georgians” for 2013, 2014, and 2015. He also serves various industry leadership roles at both the State and Federal level. Governor Nathan Deal nominated Siplon to represent Georgia on a National Supply Chain Competitiveness Advisory Committee, where he was appointed to a two-year term by the U.S. Secretary of Commerce and was then appointed to serve as its vice-chairman. At the State level, he was selected by then-Governor Sonny Perdue to serve as lead consultant on the Commission for New Georgia’s Freight and Logistics Task Force. In this effort, Siplon led a Private Sector Advisory Committee with invited executives from a range of private sector stakeholders including UPS, Coca-Cola, The Home Depot, Delta Airlines, Georgia Pacific, CSX, and Norfolk Southern. Siplon honorably served a combined 12 years in the United States Marine Corps and the United States Air Force. During this time, he led the integration of encryption techniques and deployed cryptographic devices for tactically secure voice and data platforms in critical ground-to-air communication systems. This service included support for all branches of the Department of Defense, multiple federal security agencies, and aiding NASA with multiple Space Shuttle launches. Originally from New York, Siplon received both a bachelor’s and master’s degree in electrical and computer engineering with a focus on digital signal processing from the Georgia Institute of Technology. He earned an associate’s degree in advanced electronic systems from the Air Force College and completed multiple military leadership academies in both the Marines and Air Force. Siplon currently lives in Cumming, Georgia (north of Atlanta), with his wife Jan, and two children Thomas (19) and Lily (15).
Host, Logistics with Purpose
Kristi Porter is VP of Sales and Marketing at Vector Global Logistics, a company that is changing the world through supply chain. In her role, she oversees all marketing efforts and supports the sales team in doing what they do best. In addition to this role, she is the Chief Do-Gooder at Signify, which assists nonprofits and social impact companies through copywriting and marketing strategy consulting. She has almost 20 years of professional experience, and loves every opportunity to help people do more good.
Host, Logistics with Purpose
Kevin Brown is the Director of Business Development for Vector Global Logistics. He has a dedicated interest in Major Account Management, Enterprise Sales, and Corporate Leadership. He offers 25 years of exceptional experience and superior performance in the sales of Logistics, Supply Chain, and Transportation Management. Kevin is a dynamic, high-impact, sales executive and corporate leader who has consistently exceeded corporate goals. He effectively coordinates multiple resources to solution sell large complex opportunities while focusing on corporate level contacts across the enterprise. His specialties include targeting and securing key accounts by analyzing customer’s current business processes and developing solutions to meet their corporate goals. Connect with Kevin on LinkedIn.
Host, Supply Chain Now en Espanol
Sofia Rivas Herrera is a Mexican Industrial Engineer from Tecnologico de Monterrey class 2019. Upon graduation, she earned a scholarship to study MIT’s Graduate Certificate in Logistics and Supply Chain Management and graduated as one of the Top 3 performers of her class in 2020. She also has a multicultural background due to her international academic experiences at Singapore Management University and Kühne Logistics University in Hamburg. Sofia self-identifies as a Supply Chain enthusiast & ambassador sharing her passion for the field in her daily life.
Host, Logistics with Purpose
Jose Manuel Irarrazaval es parte del equipo de Vector Global Logistics Chile. José Manuel es un gerente experimentado con experiencia en finanzas corporativas, fusiones y adquisiciones, financiamiento y reestructuración, inversión directa y financiera, tanto en Chile como en el exterior. José Manuel tiene su MBA de la Universidad de Pennsylvania- The Wharton School. Conéctese con Jose Manuel en LinkedIn.
Host, Supply Chain Now en Espanol
Demo Perez started his career in 1997 in the industry by chance when a relative asked him for help for two just weeks putting together an operation for FedEx Express at the Colon Free Zone, an area where he was never been but accepted the challenge. Worked in all roles possible from a truck driver to currier to a sales representative, helped the brand introduction, market share growth and recognition in the Colon Free Zone, at the end of 1999 had the chance to meet and have a chat with Fred Smith ( FedEx CEO), joined another company in 2018 who took over the FedEx operations as Operations and sales manager, in 2004 accepted the challenge from his company to leave the FedEx operations and business to take over the operation and business of DHL Express, his major competitor and rival so couldn’t say no, by changing completely its operation model in the Free Zone. In 2005 started his first entrepreneurial journey by quitting his job and joining two friends to start a Freight Forwarding company. After 8 months was recruited back by his company LSP with the General Manager role with the challenge of growing the company and make it fully capable warehousing 3PL. By 2009 joined CSCMP and WERC and started his journey of learning and growing his international network and high-level learning. In 2012 for the first time joined a local association ( the Panama Maritime Chamber) and worked in the country’s first Logistics Strategy plan, joined and lead other associations ending as president of the Panama Logistics Council in 2017. By finishing his professional mission at LSP with a company that was 8 times the size it was when accepted the role as GM with so many jobs generated and several young professionals coached, having great financial results, took the decision to move forward and start his own business from scratch by the end of 2019. with a friend and colleague co-founded IPL Group a company that started as a boutique 3PL and now is gearing up for the post-Covid era by moving to the big leagues.
Host, Supply Chain Now
The founder of Logistics Executive Group, Kim Winter delivers 40 years of executive leadership experience spanning Executive Search & Recruitment, Leadership Development, Executive Coaching, Corporate Advisory, Motivational Speaking, Trade Facilitation and across the Supply Chain, Logistics, 3PL, E-commerce, Life Science, Cold Chain, FMCG, Retail, Maritime, Defence, Aviation, Resources, and Industrial sectors. Operating from the company’s global offices, he is a regular contributor of thought leadership to industry and media, is a professional Master of Ceremonies, and is frequently invited to chair international events.
He is a Board member of over a dozen companies throughout APAC, India, and the Middle East, a New Zealand citizen, he holds formal resident status in Australia and the UAE, and is the Australia & New Zealand representative for the UAE Government-owned Jebel Ali Free Zone (JAFZA), the Middle East’s largest Economic Free Zone.
A triathlete and ex-professional rugby player, Kim is a qualified (IECL Sydney) executive coach and the Founder / Chairman of the successful not for profit humanitarian organization, Oasis Africa (www. oasisafrica.org.au), which has provided freedom from poverty through education to over 8000 mainly orphaned children in East Africa’s slums. Kim holds an MBA and BA from Massey & Victoria Universities (NZ).
Host, Logistics with Purpose
Nick Roemer has had a very diverse and extensive career within design and sales over the last 15 years stretching from China, Dubai, Germany, Holland, UK, and the USA. In the last 5 years, Nick has developed a hawk's eye for sustainable tech and the human-centric marketing and sales procedures that come with it. With his far-reaching and strong network within the logistics industry, Nick has been able to open new avenues and routes to market within major industries in the USA and the UAE. Nick lives by the ethos, “Give more than you take." His professional mission is to make the logistics industry leaner, cleaner and greener.
Sales Support Intern
Alex is pursuing a Marketing degree and a Certificate in Legal Studies at the University of Georgia. As a dual citizen of both the US and UK; Alex has studied abroad at University College London and is passionate about travel and international business. Through her coursework at the Terry College of Business, Alex has gained valuable skills in digital marketing, analytics, and professional selling. She joined Supply Chain Now as a Sales Support Intern where she assists the team by prospecting and qualifying new business partners.