Network security is steadily becoming more complex. There are more ways to connect than ever before, including 5G, Wi-Fi, and hardwired connections. There are also more devices connecting: mobile phones, tablets, laptops, and the internet of things. All these devices are subject to the threat landscape, which must also contend with security challenges from the growing popularity of remote and hybrid work. Dr. Sally Eaves is the CEO of Tomorrow’s Tech Today and Helen Yu is the founder and CEO of Tigon Advisory. They are both well-versed in the cyber security policies and practices being applied by leading companies today. Listen in as they join host Kevin L. Jackson in this session sponsored by AT&T Business to discuss how to support cyber risk management through strategy and cost benefit analysis.
Welcome to Digital Transformers, the show that connects you with what you need to build, manage, and operate your digital supply chain. Join your host in a timely discussion on new and future business models with industry leading executives. The show will reveal global customer expectations, real world deployment challenges, and the value of advanced business technologies like artificial intelligence, blockchain, and robotic process engineering. And now we bring you Digital Transformers.
Kevin L. Jackson (00:32):
Hello everyone, and welcome to AT&T BizTalk, LinkedIn Live, cybersecurity and network modernization. My name is Kevin L. Jackson, the host of Digital Transformers on Supply Chain Now, and I will serve as the moderator for today’s exciting discussion.
Kevin L. Jackson (00:52):
You know, network security is getting more complex. There are so many more ways to connect than ever before with 5G and Wi-Fi and hardwired connections. And now, just far more devices connecting mobile phones, tablets, laptops, the internet of things and these devices, all expand the threat landscape. The growing popularity of remote and hybrid work also introduces a new security challenge.
Kevin L. Jackson (01:30):
So, joining me to discuss the challenges and opportunities surrounding network modernization, our respected industry thought leader in digital transformation, AI, cybersecurity, and IoT Helen Yu. And the torch bearer for ethical tech international advocate for opening access to opportunity and professor in advanced technologies and global strategic advisor, oh, and by the way, the birthday girl. Say, happy birthday to Sally Eaves.
Sally Eaves (02:13):
Thank you. Thank you very much. You’re most kind. Thank you very much. Thank you, everyone. Great to spend it with you.
Kevin L. Jackson (02:18):
And, you know, welcome to you both. It’s clear that cybersecurity needs to be a major part of the network modernization process. So, to get things started, please give us a bit more on your background and your initial views on the importance of network modernization. So, since it’s your birthday, let’s start with Sally.
Sally Eaves (02:46):
Oh, most kind, Kevin. Thank you. Lovely to be here with you and obviously with Helen as well. Great conversation, Harry. And thank you for the kind intro as well. So, yes, basically I won’t repeat those, kind of, different, kind of, roll hats and things.
Sally Eaves (02:57)
But, you know, I work across, obviously, Emergent Technology but also education and social impact and how you fuse those together, you know, for shared value. I also come very much from Met telco background fully enough from like CTO and change manager roles. So, everything around this subject, around network modernization and embedding cybersecurity at the heart of that, you know, it rings so close to heart.
Sally Eaves (03:17):
I think you set it up brilliantly actually, Kevin, in that intro. I mean, how many different vectors of change have we had over recent years? You know, whether it’s geopolitical or the escalation of cyber threats, the accelerating threat verticals and areas as well.
Sally Eaves (03:30):
Our postures need to react to all these different threat verticals, but also not lose sight. It’s not just a technology proposition. This is around culture, it’s around change management, it’s around processes, around skills as well. So, when we look at kind of that acceleration of digital transformation, we’ve seen it all across the world, all across different verticals, different speed, you know, depending on different, um, baselines, et cetera. But we can’t lose sight of reflecting of where we’ve come from.
Sally Eaves (03:53):
And as we create new opportunities, we also, you know, create risk verticals as well. And that’s my biggest thing around network modernization, focusing on cybersecurity. It’s not an add-on. It’s not an extra. It’s that embedded by design approach that we have to have. We have to look at it holistic. We have to look at it from a multilayered approach as well. I know we’re going to this in more detail as we go through it but (INAUDIBLE).
Kevin L. Jackson (04:15):
No, no. Thank you very. And you’re in London today?
Sally Eaves (04:20):
Yes, absolutely. I’m in London today, indeed.
Kevin L. Jackson (04:21):
Our network is strong. And, Helen, you’re joining us from Chicago land, right?
Helen Yu (04:28):
Yes. Yes, greetings from the winter Wonderland. Thank you for — yes, thank you for the warm introduction, Kevin. Happy birthday to you, Sally. I can’t wait to celebrate that in person with you in the months. Kevin, it’s great to see you again. You know, when it —
Kevin L. Jackson (04:44):
And you’re making a big move here soon, aren’t you?
Helen Yu (04:50):
Absolutely. I saw Kevin last time in New York and he was the one carrying all the gadgets with him. So, you — yes. You know, let me share a little bit about the — my background, right? How I got into cybersecurity. I got in cybersecurity by accident back in 2019 when I was invited to a keynote at IRM event in Zurich. And then that got me hooked, right. I realized how much — how important it is for people to gain more knowledge.
Helen Yu (5:22):
And also, realize you don’t have to be super technical to get into the field of cybersecurity. And since then, I’m a vice chair — sitting on a board of Global Cybersecurity Association. And we got to speak to experts — industry experts to learn more about what it is, right? Cybersecurity evolves every single day. There’s no expert as a result of that.
Helen Yu (05:44):
So, that being said — and then, I’m also as a founder and CEO of Tigon Advisory. We provide value creation or value creation accelerator providing CXO — fractional CXO services. Manage security service or service is one of the services we provide. Partnering with other vendors or industry leaders.
Helen Yu (6:09):
And when it comes to network modernization or cyber, as all of you know or heard, IDC really talks about there will be 41.6 billion IoT devices in 2025, right? That’s only, only two years away. It’s going to generate 79.4 zettabytes of data. What that means is this sheer volume of data presents challenge.
Helen Yu (6:32):
And so, network security investment is not as solid — as I said, it’s not a — nice to have anymore. You have to really understand where you are at, where your threat, I would say, vulnerability is or associated with firewalls intrusion, for example, prevention and network segmentation. And then — or access control in — because of strong network security posture can help you ensure regulatory compliance, build customer trust, protect reputation of the organization.
Helen Yu (7:07):
And most importantly, to keep you really — I would say, keep you stay current or keep you stay in the business, right? Because you can easily disappear if you don’t really pay attention to or embed cybersecurity as a strategy within your company.
Kevin L. Jackson (07:25):
Wow. That’s a — that’s an important thought. And as cybersecurity professionals, we are all, right now, getting ready for the RSA Conference 2023. And, sort of, to follow on on your statements there, Helen, the theme at the conference is stronger together. What does that mean when you’re talking about cybersecurity?
Helen Yu (07:54):
I love that theme, as a matter of fact, because cybersecurity is a team sports, right? That means that — it means about importance of collaboration and cooperation. We all know that cybersecurity is no single organization, individual can effectively protect against all the potential risk, right? So, this also talks about, you know, not only the collaboration corporation between the private sector and the public sector. And then it talks about industry can be more effective if we work together protecting against the cyber threats and ensuring that all the digital infrastructure remains secure and resilient.
Kevin L. Jackson (08:36):
Yes. So, Helen, I know you are really, you know, at the forefront of sustainability. And as we look at protecting our information and the numbers of devices and the amount of data, what does, being stronger together mean to you?
Sally Eaves (09:01):
No problem. I’ll come back in on that, Kevin. No problem at all. So, first of all, just echoing really, I think Helen’s comments there about how important that thematic is about stronger again, I think, is absolutely imperative. And it leads off other events we’ve seen as well where ecosystem collaboration, it’s right before MWC being a great example of that, too.
Sally Eaves (9:18):
So, love the fact that RSA is really embodying that. And for me, it kind of tells a story as well. I mean, we’ve always had a history about collaboration in cybersecurity. You know, it pays no heed, does it, cybercrime? You know, what border you are in. What geographical boundary? It transgresses all of those things. We’ve always fought on that best when we’ve collaborated and shared data in a safe way.
Sally Eaves (9:39):
But I think what’s happened, and again, we mentioned it earlier with these different vectors of change. We’ve got geopolitical uncertainty. In some ways we’ve had to close off certain mechanisms where we would traditionally have collaborated. So, we’ve got that. We’ve also got more technical, say, complexity. And in sometimes you’ve had product incompatibility, which can impede collaboration, too.
Sally Eaves (9:57):
So, we’ve got that history. We’ve got some challenges. But to go forward, we’ve got this appetite to come together. And why is that so critical now? I think probably the best example I would give is, you know, what the bad guys doing right now? Now, how many times are we seeing bad actors come together to affect negative change around cyber risk? And they’re even helping to, kind of, bring back old risks as well.
Sally Eaves (10:18):
I did some work recently around EmTech and I called it chameleon of the cyber threat world, because it just keeps reimagining itself. So, it’s got a lovely, kind of, visual image there. And that was brought back in many ways because of the power of bad actors coming together. So, if there’s any, you know, any kind of bigger, kind of, catalyst to do this better, that stronger together vibe that, I think, is a great example of why we need to do this.
Sally Eaves (10:40):
And for me, also, as a final point, you know, collaboration, it goes beyond things like governance and things they’re obligated to do is a step beyond that. A bit like with sustainability, as you mentioned just then as well. There are certain targets that are embedded in different legislation, but you can go beyond that, like science-based targets, for example. So, my big point there is, kind of, we can go even further still. So, yes, love that theme and I think it’s so important.
Kevin L. Jackson (11:02):
So, as the extensive side is coming together to be stronger because the attackers are coming together. One of the things that the —
Sally Eaves (11:10):
Kevin L. Jackson (11:11):
— recent ATT insight cybersecurity report highlighted was a need for a balanced cybersecurity spin. Well, what does that really mean? How do you balance your investment against everyone coming together, Sally?
Sally Eaves (11:29):
It’s a great question, and I think my answer is partly how we communicate about this, what the narrative is. So, rather than this cost of investment, what about the cost of insecurity? Reframe it around that. Now, we’ve seen this kind of scale scope, sophistication of risk accelerating. Lots of different, you know, things affecting that, one of which being IT and OT convergence, I’m seeing right up there at the moment.
Sally Eaves (11:51):
So, to address these particular threats, we need to look at things more holistically. So, for example, as we treat these issues, we need to treat them, say, as part of business outcomes. It’s not different, kind of, component separate siloed parts. I think that’s really, really important. And the narrative around that matters too.
Sally Eaves (12:07):
One example of that I’ve seen quite effectively at the moment, particularly with the rise of edge use cases is merging edge with cybersecurity principles and policies. So, it’s just bringing together this holistic treatment, I think, is really important too. As I mentioned at the top, I think about culture, process change, management, et cetera, and skills too.
Sally Eaves (12:24):
But I think the other thing that’s really interesting about that question because you mentioned there about balance, too. I think sometimes, as well does that holistic look, we also have to go more granular and more focused. So, within that brilliant research from AT&T as well, what I loved is the fact it gets broken down into different parts too.
Sally Eaves (12:40):
And one, where I’ve done a lot of work recently because of my sustainability actions in particular is around the rise of cyber risk in say, utilities. Big, big, big hit there at the moment. And if you drill into that particular research you see, for example, there might need to be more attention, in particular, spend around securing that area. Probably something we’ll come back to a bit later on. So, I’ll pass that back, but I just think a really great question that we can tackle that in some ways.
Kevin L. Jackson (13:02):
Well, I want to bring Helen into that. So, Helen, because you — your company provides fractional CSO services. And as a CSO you have to look at all of these threats. What does investment balance mean to you?
Helen Yu (13:20):
Absolutely. So, when it comes to investment, we all think about what is the cost benefit, right? That’s when I — when — from cybersecurity perspective is about perceived cost of ownership and effectiveness of control, especially for mid-size companies. They don’t have a, you know, really big budget to spend what you’re going to do. So, I always feel like the cost and benefit analysis would be a good starting point.
Helen Yu (13:47):
For example, you — there are many areas you can, you know, when it comes to network modernization, right, as ideas, we all know intrusion detection could be really an area’s overall benefit winner, right? People — every single company needs to have the intrusion detection in place, regardless of industry and the size of a company.
Helen Yu (14:08):
So, then password is another thing. How do you relate? Make sure every user or every employee and your contractors all are in compliance with your password protection. Then there’s also, these days, about cloud. Cloud is really viewed as needing the most security followed by IoT networks. But when it comes to these details, company need to really know where they’re at, right? Start with an assessment, comprehensive risk assessment can help them identify where they have the most critical assets, potential threats, and vulnerabilities that need to be addressed.
Helen Yu (14:46):
And then you can prioritize cybersecurity investment based on risk management principles to me and aligning your investment with your — where you have the most vulnerability and, and challenges there. And also aligning with the resource needed. Sometimes you may want to outsource. So, having that initial awareness and do a cost benefit analysis, to me, is where I would —
Kevin L. Jackson (15:11):
Yes, but a lot of the things that you’re talking about, like, companies, modern companies today, they probably already have a lot of investment in some of those basic things. But, but now we’re talking about going to the next level when it comes to network security.
Kevin L. Jackson (15:33):
How does the investment in network modernization align with this balance when it comes to security with dealing with things like IoT and multiple clouds, and quite frankly, hybrid work and working from home? And, you know, how do we deal with these other network security concerns as we modernize in this balance?
Helen Yu (16:09):
Yes, that’s a great question, Kevin. As a matter of fact, as I mentioned earlier, right, we talk about 41.6 billion IoT devices two years from today. And the sheer amount of volume of data itself is beyond our capability to manage. So, that being said, network security is something we must pay attention now.
Helen Yu (16:33):
And what happened is that, you know, how do you do — I mean, a strong network, we talk about is a balanced approach, right? We have to address all the critical areas of cyber, and we talk about firewall, intrusion prevention, network segmentation, and then some secured access control. And to me, automating that whole process is a must, right? Because if you rely on a human, imagine you rely — the hacker is not doing that manually, right? They leverage the advanced tools technologies to hack the network. And then organizations need to be really mindful.
Helen Yu (17:10):
And how do you automate that entire network is really critical. To me, that is not just about doing one thing, but you have to have holistic strategies. Sally mentioned that earlier, holistic view of where exactly you are at from network perspective. Where you have the most exposure and then implement that locally because you may — if you have a large enterprise, you may have local — the vulnerability might be different, depending on the region you are in, then there are different regulations there, you have to also be mindful.
Helen Yu (17:43):
So, it’s very important to start with the roadmap, right. Here’s where I’m at holistically my cybersecurity principle. To me it could be, you know, how do you automate? What kind of analytics you have in place? And then, what about architecture? Those three things you look into — three principles you look into when it comes to network modernization and then apply that to each of the region or segmentations you are in.
Helen Yu (18:09):
And verticals can be different, healthcare might be different than financial services or government or public sector might be different. So, you have to have all those details mapped out before you go apply that into your strategy. But investment network security should be top of mind. It should be the first thing you think about rather than, you know —
Kevin L. Jackson (18:34):
Right. So, Sally, Helen talks a lot about automation and the important for the organization to automate the network security processes. But does it all lie on the organization? There are a lot of managed services for network security out there. Is there a balance between what the organization or enterprise does for network security versus maybe, you know, leveraging some of these network managed services for your modernization efforts?
Sally Eaves (19:17):
That’s a great follow up question there. And firstly, I’ll echo what Helen said about know where you’re starting from. I think that’s absolutely huge. You know, with any of these challenges we’re dealing with at the moment, you need to have that baseline and then benchmark from there. And then again, you get more buy-in as you progress through as well. So, I think that’s really, really important.
Sally Eaves (19:33):
In terms of, of your question there, Kevin, as well, I think a couple little elements kind of bring to bear. First of all, I would say, is as you modernize, as you develop, as you bring in more automation, there’s an opportunity to bring in embedded software security by design as well. So, as we improve the network, you get more benefits. So, low latency, you’ve got software defined, you’ve got higher bandwidth. All these different benefits coming together, that gives you new opportunities.
Sally Eaves (19:57):
So, as I said, build that software security right from — into the network by design. So, I think that’s an important point to make, too. We can bring these two elements of investment together. Also, I think, this echoes of things around sustainability here as well. This kind of has to be done by design. You know, you can’t retrofit some of these things.
Sally Eaves (20:13):
So again, you need to think about whether it’s security or sustainability, you have to do that from the network up. So, it is looking at the different layers around network, around architecture, even processor, too. So I think that’s very important too.
Sally Eaves (20:25):
But the role of managed threat detection and response, I think, is key. And we mentioned that the top about the power of collaboration, didn’t we? But also, the power of trusted partnership to help, you know, navigate some of this noise around cybersecurity too, to filter through to what’s really relevant for you, your organization in that sector that you’re particularly in and where you want to develop and grow as well.
Sally Eaves (20:45):
So, that personalized support, that filtering, that trusted partnership, access to the latest information and technology and supporting you as you grow and navigate through this very changing world. And particularly, I give a shout out as well to a lot of developing SMEs, SMBs at the moment too. They can be the weakest link sometimes in cybersecurity risk, particularly around supply chains. And sometimes feel kind of most exposed and less supported. And there’s actually a lot of support out there that can be tailored to organizations of all sizes as well.
Sally Eaves (21:13):
So, definitely recommend what you were saying there, Kevin, about getting support and that facilitation to support you through this progress even if your enterprise level, I think the great role, to play for this. It really is.
Kevin L. Jackson (21:22):
Well, you know, one of things about managed threat or managed security is that in this year’s AT&T insights report on cybersecurity, the number one threat was DDoS, I mean, that’s a huge network out there to, to protect. And as we expand, as enterprises expand with the internet of things and IoT, organizations need to deal with this. So, does managed services help with this challenge as you — as the — with the DDoS challenge?
Sally Eaves (22:00):
I think it definitely does, absolutely. I mean, just look at the cost of this as well. I’m actually involved in a report on this very subject at the moment. And we’re roughly looking at costs of about $300,000 per hour as the downtime of a DDoS attack. It’s that significant. And then there’s other, obviously, costs as well around in terms of reputation, for example, in other areas too.
Sally Eaves (22:20):
So, it’s not just about the cost and the downtime, et cetera, but it’s a really significant challenge. We’ve got different, kind of, roots in to DDoS attacks as well. So, it might be protocol, it could be application layer, it could be volume as well. So, different areas to look at as well. And I think a lot of organizations are remaining vulnerable in this way because of issues around complexity, lack of visibility. You mentioned they’re around IoT acceleration. But also, we have that integration across IO — IT, sorry, and OT as well.
Sally Eaves (22:47):
So, lots of different technologies converging as well. And as a result of that, we’re getting more and more possibilities for, you know, threat surface areas to extend, to become more complicated, become potentially siloed, and do not have that kind of 360 view of what’s happening in your organization. So, again — and also things that sprawl as well. You can inadvertently, kind of, bring in more techniques to try and solve problems.
Sally Eaves (23:09):
And actually, they confuse people and take you away from that active knowledge of what’s happening right now and getting ahead of things. And you’re chasing back and you’re chasing alerts and, you know, we see it, don’t we in operational teams at the moment. Lots of challenges around burnout, too. So, absolutely. That facilitation, that support, that expertise across technology, but also across deployment and across education and across research into the latest trends in cyber risk, et cetera. It’s the way to go forward and navigate a lot of this noise in many cases. I think —
Kevin L. Jackson (23:37):
So, Helen, from a CSO point of view, how should the organization deal with this DDoS challenge?
Helen Yu (23:47):
Well, as I’m preparing for a keynote speech on cybersecurity, I’m just doing some research, right. And, and cybersecurity venture expects global cybercrime costs to grow by 15% per year. So, that means in the next five years that would reach 10.5 trillion by 2025, two years from now, again, right, up from 3 trillion in 2015.
Helen Yu (24:13):
So, if DDoS, number one, you can imagine the amount of gross, you know, threat, right, from threat perspective. As I mentioned earlier, both Sally and I talk about, you know, you have to know where you’re at first. But really important — few things, really important when it comes to DDoS, you have to secure your IoT devices. We all know there’s so many of them, not just the employees within our organization, there are suppliers, there are contractors out there. You have to make sure you understand where these endpoints are all.
Helen Yu (24:43):
And then I work with the customer and they told me they have 300 endpoints, it turned out to be 3,000 endpoints after the assessment, right. We laughed but that’s reality. Not knowing where exactly you are at would put you — really expose you bigger risk. Secondly, you got to segment your networks, right, because you want to — network segmentation and help you limit the impact of DDoS attack.
Helen Yu (25:09):
And then the other thing is, how do you deploy DDoS mitigation solution? There are many of them. Then you have to really assess, making sure you have something in place. But most importantly, I think Sally mentioned about this, about employee training, most importantly you have to plan a practice, an incident response.
Helen Yu (25:29):
I’ve been to so many kind — we’ve been in board — I’ve been in board meetings where we talk about strategy. Everyone knows the important strategy, but if you need to come up how you react now, this moment is, you know, DDoS attack right this moment. How are you going to reply? You know, really respond to that.
Helen Yu (25:45):
So, every organization should have that at your fingertip, right? If this happens, what I’m going to do? And really important for you to think about how you block the attack and then how you examine and analyze and then, so what happened? What triggered that? Most importantly, how you recover and what lesson you learned from this to want that from happening again?
Kevin L. Jackson (26:06):
So, wait a second though. I mean, you could probably forgive a CSO for having a bit of whiplash because last year everyone was trying to protect themselves against ransomware, which was the number one threat. It’s now dropped to number eight, which was where DDoS was last year. Is ransomware no longer an issue?
Helen Yu (26:34):
Well, it’s interesting, right, perception here because if you — cybersecurity venture predicts that by 2031, ransomware will cost victims 265 billion each year. It will attack the business consumer device every two seconds, right. I’m surprised to hear it’s no longer number one.
Helen Yu (26:55):
You know, imagine you get 30 attacks within a minute, what’s going to happen? Maybe it dropped for now, but to me, ransomware continues to be a major cybersecurity threat, right, despite dropping from number one to number eight because these numbers evolve all the time. But you know, we all know ransomware could have bigger impact than any other attack, right, significantly and then causing financial losses, reputation damage, business disruptions.
Helen Yu (27:27):
And so, I would say, you need continue to stay vigilant and then regularly take the action to make sure you have a respond — you know, understand how you recover if that happens.
Kevin L. Jackson (27:39):
Yes. So, Sally, what’s your view? Ransomware versus DDoS? Sally?
Sally Eaves (27:46):
Well, it sounds like a battle, doesn’t it? We need to get that a little bit. It speaks now —
Kevin L. Jackson (27:48):
In this corner.
Sally Eaves (27:49):
I know, it really does. I would say — so, first of all, I’d echo the point Helen made there. Ransomware is still a big issue. I’d totally concur with that. And I think what really interests me as well is that maybe we need to look at it more from a vertical stance. So, when you look at that data — so again, I do put a lot around energy and sustainability and it actually came out as number two in the AT&T research as being the number, kind of, two threat in that particular vertical, so for energy and utilities.
Sally Eaves (28:18):
And I think it reflects the fact that for some of these particular challenges and types of attacks, certain verticals are more prone to certain types of vulnerability, to put it that way. So, definitely it’s still a major threat, but depending on where you are, what sector you are in, and kind of the advance of digital transformation where you are, different ones will have more of a kind of risk profile for you.
Sally Eaves (28:38):
And I think energy and utilities is right up there. And not even just ransomware, I don’t if you’ve seen about this, Kevin, Killware has been a rising area in this particular sector when bad actors are not just threatening, you know, digital estate and physical estate. They’re actually threatening individuals who are managing those as well. So, it’s a critical, critical area.
Sally Eaves (28:58):
I’d also say around the rise of edge as well. Again, in the AT&T research, I think it was around the two thirds mark, so, it’s 66% or something like that. But it was showing concern around ransomware attacks at the edge as well. And given the growth in that area, I think, you know, protection there is another one to absolutely focus on too.
Sally Eaves (29:14):
So, yes, I think we have to, kind of, look at all these different areas in the round but maybe just get a bit more granular about your specific vertical and threats that are very relevant for you. I think the other area to look at that maybe hasn’t come up so far is around APIs as well. I really think ransomware and API attacks are still very prevalent. I mean, Experian was a very recent one example of that, and Twitter too back in January. So, yes, you definitely want to still keep an eye on absolute —
Kevin L. Jackson (29:37):
Oh, wow. So, you bring up another point of this many, many other threats, other than DDoS in in ransomware. How can decision makers, Sally, really keep up with this changing threat landscape? It seems to be overwhelming.
Sally Eaves (29:55):
Yes, I mean there is a lot of information out there. Research — like, research we’ve been talking about today, I think is very, very powerful, particularly when it’s broken down and gets more specific so you can personalize it to your particular sector and kind of type of organization. I think that’s really, really helpful around the relevancy of that as well.
Sally Eaves (30:13):
And the fact when you’ve got continual barometers of change, so it’s not like an — just an annual report. You’ve got those continuations of updates in between, you’ve got executive releases. I’ve been really impressed by a lot of organizations really coming together as well and open data sharing around these threats as too. Now, education is empowerment, isn’t it, in so many different ways. So, keeping up with that, I think, is important. Doing your own research into this area too, and collaborating, I think, is important too.
Sally Eaves (30:38):
This also, you know, where you’re getting your information sources from, the makeup of your teams, it’s that area that’s important too. Ensuring that everyone’s got a voice. You know, we talk about shared responsibility about cybersecurity a lot, don’t we? But to do that and to really action that, everyone in your organization, no matter kind of what their role or experience level is, whether even a tech facing role or not, every role is a cybersecurity facing one.
Sally Eaves (31:00):
So, we have to back up, you know, education at decision maker level with education for all and helping people feel empowered to kind of speak up and say, do you know what, I’ve seen that, I’m not sure if that’s right. And I — and do not feel afraid to do that because that can hold people back a lot. So, I think that’s important.
Sally Eaves (31:14):
And also, specific personalized training at C-Suite level too. I think a lot of roles have changed. You know, the agency, the CFO role becoming more operational, for example, let alone, you know, the CISO role, you know, impacting so many different elements today. You know, the very heart network modernization going back to the top of our discussion.
Sally Eaves (31:32):
So, absolutely education is important. The right voices, the right makeup of teams and making sure you’ve got external and internal knowledge sharing too. It can’t just be that internal echo chamber conversation. You need everything to come together to be —
Kevin L. Jackson (31:44):
So, Helen, as you support and provide CSOs across multiple industry, verticals, do you see difference how these decision makers under different industries can keep up with this changing threat?
Helen Yu (32:03):
Absolutely. I mean, I would — as Sally said, what I put that into six S, right. The first S is, stay informed. Decision makers should really stay up to date to — on the latest cybersecurity threats and then trends through the industry publications. Number two is to stay alert. So, they need conduct regular risk assessment.
Helen Yu (32:25):
And then we talk about zero trust all the time. How do we identify the risk and vulnerabilities, align their cybersecurity strategy and resource allocation accordingly? The third ask S is stay engaged, right. You got to stay engaged with cybersecurity expert. Maybe go to these RSA conference and then — so that — not — and you can really connect with them to learn more about additional insights into threat landscape and develop adaptable cybersecurity strategy.
Helen Yu (32:53):
The fourth is safeguard. How do you safeguard your — through multilayered approach to security is so essential. So, when it comes to network, edge to edge, right. And security strategy, governance and threat management all work together on a single platform for threat detection incident response and compliance management, that would be awesome, right? The solution like AT&T offers.
Helen Yu (33:17):
The fourth S to me — the last S for me here is how do you really think about from service perspective, right? Sometimes you may want to manage in cybersecurity landscape continues to grow in complexity, managed security service should be something, might be a better option than in-house management for increasing numbers of organization. If you’re mid-size company, you may not have a deep pocket to hire a large team of cyber security, then maybe you want to engage, outsource certain element of the work.
Helen Yu (33:52):
So, at the end of the day, cyber operation service is very, very critical. You want to really look at for — I mean, companies like AT&T offers that solution. Not only the product technology, but also the resource can help you set it up in the least cost perspective or way, right? In the most, I say, cost effective way.
Kevin L. Jackson (34:16):
You know, you mentioned going to the RSA conference. I just made my flight reservations and I can’t wait. I’m really looking forward to learning more about how managed services can help when enterprise is trying to modernize it, the network security. So, here’s a question. You know, Sally, what are you looking forward to at RSA this year?
Sally Eaves (34:45):
Well, I’ll tell you what Kevin, as you said at the top, you know, birthday and we’re talking all things RSA. So that tells you how much I’m looking forward to it. Honestly, I can’t wait. Honestly, I think it’d be great. I mean, we saw it recently, didn’t we, with events like MWC coming back to almost full levels again. There’s such a joy about being in person. You can’t beat it.
Sally Eaves (35:03):
You know, going to the AT&T booth, immersing with those conversations, doing the demos, getting hands-on with things, I absolutely love that. Speaking to customers and also just seeing what people are experiencing, you know, in terms of challenges, but also opportunities in this area too. And just the acceleration of different trends, you know, around diversity and security. I think it’s massively important.
Sally Eaves (35:21):
What we’ve seen so far today in terms of talking about network modernization, that embedding of security by design, going through those different levels. You know, from networks, application to processor, biometric security there, but just breaking down some of the silos we’ve had in the past, seeing that movement to the edge that we’ve been talking about too. But overall, it’s that word coming together, isn’t it?
Sally Eaves (35:41):
Community. Is community get — you know, come together, negate the bag exes, and have the joy of doing that in person and sharing the knowledge for everyone as well. Because again, that’s massively important. If you can’t be there, there’s so much we’ll be sharing from the event, you know. To gain democratize that access to learning about security as well so that everyone can benefit from it. So, yes, I can’t wait. I can’t wait to see you then.
Kevin L. Jackson (36:00):
Oh, no. I can’t wait to see you in IRL. And I know that Helen will probably be joining us on demand because there is a parallel virtual. So, from the on-demand point of view for RSA conference, Helen, what are you looking forward to?
Helen Yu (36:19):
You know, I’m most excited about, you know, the opportunity to learn from industry thought leaders. And then also, network with my peers. And I look forward to hearing what AT&T’s — I heard there’s a major announcement they’re going to make during the RSA. I can’t wait to hear what that is about. Also, you know, I would love to hear more from both of you what you’ve learned from that conference. Unfortunately, I have a conflict — scheduling conflict. I won’t be there in person, but I will be supporting multiple customers remotely to celebrate with all of you during the RSA conference.
Kevin L. Jackson (36:59):
No, great. You know, that’s the power of the network, right? Being to collaborate and communicate in a secure way. So, thank you both for sharing your tremendous insight. Unfortunately, that kind of brings us to the end of the AT&T Business Biztalk on cybersecurity and network modernization.
Kevin L. Jackson (37:26):
For more information, please download the AT&T cybersecurity insights report and visit the AT&T booth if you’re going be at RSA Conference 2023. And make sure you tap me on your show, I’d love to talk to you. The link for the cybersecurity insights report and the information the AT&T booth is provided.
Kevin L. Jackson (37:58):
So, you should also be on the lookout for the next BizTalk Twitter chat that’s coming very, very soon. So, from all of us here at AT&T Business, this is Kevin L. Jackson wishing all of you a bright and transformational future. We’ll see you next time on AT&T Business BizTalk.
Thank you for supporting Digital Transformers and for being a part of our global Supply Chain Now community. Please check out all of our programming at supplychainnow.com. Make sure you subscribe to Digital Transformers anywhere you listen to or view the show, and follow us on Facebook, LinkedIn, Twitter, and Instagram. See you next time on Digital Transformers.
Sally Eaves has been described as the “torchbearer for ethical tech.” Sally’s depth of experience includes roles as Chief Executive Officer, Chief Technology Officer, and Global Strategy Advisor. Her specialties include the application and integration of Artificial Intelligence, 5G, IoT, Cloud, Blockchain and associated emergent technologies for business and societal benefit. As CEO of Tomorrow’s Tech Today, Sally works globally with leading-edge disruptors, governments, academia, and leading corporate institutions to apply her expertise for achieving sustainable competitive advantage alongside purpose-driven change.
Sally is an international advocate for opening-up access to opportunity and founded Aspirational Futures to help skill, empower, and support the next generation of interdisciplinary talent into careers yet to be conceived. Additionally, Sally is the Senior Policy Advisor and Chair of Cyber Trust for the Global Foundation of Cyber Studies and Research and contributes to parliamentary policy thought leadership on related themes. She was also an inaugural recipient of the Frontier Technology and Social Impact award, presented at the United Nations in 2018. An accomplished author, international keynote speaker, and respected online influencer across Digital Transformation (AI, Security, IoT, 5G, Cloud, Blockchain) alongside Culture, Skills, Sustainability and SDGs Impact, Sally is consistently rated in the top 10 for influence worldwide. Sally is editor of Cyber Insights, has developed courses across the data and technology discipline spectrum and is publishing her new book for good causes – ‘Tech for Good’ – in 2023. Connect with Sally on LinkedIn.
Helen Yu is the founder and CEO of TigonAdvisory; Host of CXO Spice podcast and a wall-street journal best-selling author. She drives growth for tech companies from start-ups to global titans like Oracle and Adobe, and helps CEOs achieve multibillion-dollar revenue growth and record profitability. She’s a board advisor to fast-growth SaaS companies and is on the board of the Global Cybersecurity Association. She is named as top 50 women in Tech by Award Magazine and was ranked a Top 30 thought leader by Thinkers 360, and a top 10 digital transformation influencer by IBM. Her CXO Spice podcast was named top 70 podcast you should listen to in 2022 by Thinkers360. She’s spoken at SXSW, TiECon, DMS, Money20/20 and NAMIC. An avid adventurer who trekked to Mt. Everest base camp and ice climbed glaciers, her book Ascend Your Start-up: Conquer the 5 Disconnects to Accelerate Growth won first place in business category at New York book festival and firebird award in addition to wall street journal best seller. You can subscribe to her weekly #CXOSpice newsletter https://lnkd.in/gBpfAfxt or subscribe to #CXOSpice podcastYouTube https://www.youtube.com/c/HelenYu. You can also follow her on Twitter at @YuHelenYu. Or follow Tigon Advisory at https://tigonadvisory.com/ Connect with Helen on LinkedIn.
Host, Logistics with Purpose
Adrian Purtill serves as Business Development Manager at Vector Global Logistics, where he consults with importers and exporters in various industries to match their specific shipping requirements with the most effective supply chain solutions. Vector Global Logistics is an asset-free, multi-modal logistics company that provides exceptional sea freight, air freight, truck, rail, general logistic services and consulting for our clients. Our highly trained and professional team is committed to providing creative and effective solutions, always exceeding our customer’s expectations and fostering long-term relationships. With more than 20+ years of experience in both strategy consulting and logistics, Vector Global Logistics is your best choice to proactively minimize costs while having an exceptional service level.
Joshua is a student from Institute of Technology and Higher Education of Monterrey Campus Guadalajara in Communication and Digital Media. His experience ranges from Plug and Play México, DearDoc, and Nissan México creating unique social media marketing campaigns and graphics design. Joshua helps to amplify the voice of supply chain here at Supply Chain Now by assisting in graphic design, content creation, asset logistics, and more. In his free time he likes to read and write short stories as well as watch movies and television series.
Director of Communications and Executive Producer
Donna Krache is a former CNN executive producer who has won several awards in journalism and communication, including three Peabodys. She has 30 years’ experience in broadcast and digital journalism. She led the first production team at CNN to convert its show to a digital platform. She has authored many articles for CNN and other media outlets. She taught digital journalism at Georgia State University and Arizona State University. Krache holds a bachelor’s degree in government from the College of William and Mary and a master’s degree in curriculum and instruction from the University of New Orleans. She is a serious sports fan who loves the Braves. She is president of the Dave Krache Foundation. Named in honor of her late husband, this non-profit pays fees for kids who want to play sports but whose parents are facing economic challenges.
Vicki has a long history of rising to challenges and keeping things up and running. First, she supported her family’s multi-million dollar business as controller for 12 years, beginning at the age of 17. Then, she worked as an office manager and controller for a wholesale food broker. But her biggest feat? Serving as the chief executive officer of her household, while her entrepreneur husband travelled the world extensively. She fed, nurtured, chaperoned, and chauffeured three daughters all while running a newsletter publishing business and remaining active in her community as a Stephen’s Minister, Sunday school teacher, school volunteer, licensed realtor and POA Board president (a title she holds to this day). A force to be reckoned with in the office, you might think twice before you meet Vicki on the tennis court! When she’s not keeping the books balanced at Supply Chain Now or playing tennis matches, you can find Vicki spending time with her husband Greg, her 4 fur babies, gardening, cleaning (yes, she loves to clean!) and learning new things.
Founder, CEO, & Host
As the founder and CEO of Supply Chain Now, you might say Scott is the voice of supply chain – but he’s too much of a team player to ever claim such a title. One thing’s for sure: he’s a tried and true supply chain expert. With over 15 years of experience in the end-to-end supply chain, Scott’s insights have appeared in major publications including The Wall Street Journal, USA Today, and CNN. He has also been named a top industry influencer by Thinkers360, ISCEA and more.
From 2009-2011, Scott was president of APICS Atlanta, and he continues to lead initiatives that support both the local business community and global industry. A United States Air Force Veteran, Scott has also regularly led efforts to give back to his fellow veteran community since his departure from active duty in 2002.
Host, Logistics with Purpose
Allison Krache Giddens has been with Win-Tech, a veteran-owned small business and aerospace precision machine shop, for 15 years, recently buying the company from her mentor and Win-Tech’s Founder, Dennis Winslow. She and her business partner, John Hudson now serve as Co-Presidents, leading the 33-year old company through the pandemic.
She holds undergraduate degrees in psychology and criminal justice from the University of Georgia, a Masters in Conflict Management from Kennesaw State University, a Masters in Manufacturing from Georgia Institute of Technology, and a Certificate of Finance from the University of Georgia. She also holds certificates in Google Analytics, event planning, and Cybersecurity Risk Management from Harvard online. Allison founded the Georgia Chapter of Women in Manufacturing and currently serves as Treasurer. She serves on the Chattahoochee Technical College Foundation Board as its Secretary, the liveSAFE Resources Board of Directors as Resource Development Co-Chair, and on the Leadership Cobb Alumni Association Board as Membership Chair and is also a member of Cobb Executive Women. She is on the Board for the Cobb Chamber of Commerce’s Northwest Area Councils. Allison runs The Dave Krache Foundation, a non-profit that helps pay sports fees for local kids in need.
Principal, Supply Chain Now
Host of Supply Chain Now and TECHquila Sunrise
When rapid-growth technology companies, venture capital and private equity firms are looking for advisory, they call Greg – a founder, board director, advisor and catalyst of disruptive B2B technology and supply chain. An insightful visionary, Greg guides founders, investors and leadership teams in creating breakthroughs to gain market exposure and momentum – increasing overall company esteem and valuation.
Greg is a founder himself, creating Blue Ridge Solutions, a Gartner Magic Quadrant Leader in cloud-native supply chain applications, and bringing to market Curo, a field service management solution. He has also held leadership roles with Servigistics (PTC) and E3 Corporation (JDA/Blue Yonder). As a principal and host at Supply Chain Now, Greg helps guide the company’s strategic direction, hosts industry leader discussions, community livestreams, and all in addition to executive producing and hosting his original YouTube channel and podcast, TEChquila Sunrise.
Principal, Supply Chain Now
Host of Supply Chain is Boring
Talk about world-class: Chris is one of the few professionals in the world to hold CPIM-F, CLTD-F and CSCP-F designations from ASCM/APICS. He’s also the APICS coach – and our resident Supply Chain Doctor. When he’s not hosting programs with Supply Chain Now, he’s sharing supply chain knowledge on the APICS Coach Youtube channel or serving as a professional education instructor for the Georgia Tech Supply Chain & Logistic Institute’s Supply Chain Management (SCM) program and University of Tennessee-Chattanooga Center for Professional Education courses.
Chris earned a BS in Industrial Engineering from Bradley University, an MBA with emphasis in Industrial Psychology from the University of West Florida, and is a Doctoral in Supply Chain Management candidate.
Director of Sales
Tyler Ward serves as Supply Chain Now's Director of Sales. Born and raised in Mid-Atlantic, Tyler is a proud graduate of Shippensburg University where he earned his degree in Communications. After college, he made his way to the beautiful state of Oregon, where he now lives with his wife and daughter.
With over a decade of experience in sales, Tyler has a proven track record of exceeding targets and leading high-performing teams. He credits his success to his ability to communicate effectively with customers and team members alike, as well as his strategic thinking and problem-solving skills.
When he's not closing deals, you can find Tyler on the links or cheering on his favorite football and basketball teams. He also enjoys spending time with his family, playing pick-up basketball, and traveling back to Ocean City, Maryland, his favorite place!
Host of Digital Transformers
Kevin L. Jackson is a globally recognized Thought Leader, Industry Influencer and Founder/Author of the award winning “Cloud Musings” blog. He has also been recognized as a “Top 5G Influencer” (Onalytica 2019, Radar 2020), a “Top 50 Global Digital Transformation Thought Leader” (Thinkers 360 2019) and provides strategic consulting and integrated social media services to AT&T, Intel, Broadcom, Ericsson and other leading companies. Mr. Jackson’s commercial experience includes Vice President J.P. Morgan Chase, Worldwide Sales Executive for IBM and SAIC (Engility) Director Cloud Solutions. He has served on teams that have supported digital transformation projects for the North Atlantic Treaty Organization (NATO) and the US Intelligence Community. Kevin’s formal education includes a MS Computer Engineering from Naval Postgraduate School; MA National Security & Strategic Studies from Naval War College; and a BS Aerospace Engineering from the United States Naval Academy. Internationally recognizable firms that have sponsored articles authored by him include Cisco, Microsoft, Citrix and IBM. Books include “Click to Transform” (Leaders Press, 2020), “Architecting Cloud Computing Solutions” (Packt, 2018), and “Practical Cloud Security: A Cross Industry View” (Taylor & Francis, 2016). He also delivers online training through Tulane University, O’Reilly Media, LinkedIn Learning, and Pluralsight. Mr. Jackson retired from the U.S. Navy in 1994, earning specialties in Space Systems Engineering, Carrier Onboard Delivery Logistics and carrier-based Airborne Early Warning and Control. While active, he also served with the National Reconnaissance Office, Operational Support Office, providing tactical support to Navy and Marine Corps forces worldwide.
Host of Logistics with Purpose and Supply Chain Now en Español
Enrique serves as Managing Director at Vector Global Logistics and believes we all have a personal responsibility to change the world. He is hard working, relationship minded and pro-active. Enrique trusts that the key to logistics is having a good and responsible team that truly partners with the clients and does whatever is necessary to see them succeed. He is a proud sponsor of Vector’s unique results-based work environment and before venturing into logistics he worked for the Boston Consulting Group (BCG). During his time at BCG, he worked in different industries such as Telecommunications, Energy, Industrial Goods, Building Materials, and Private Banking. His main focus was always on the operations, sales, and supply chain processes, with case focus on, logistics, growth strategy, and cost reduction. Prior to joining BCG, Enrique worked for Grupo Vitro, a Mexican glass manufacturer, for five years holding different positions from sales and logistics manager to supply chain project leader in charge of five warehouses in Colombia.
He has an MBA from The Wharton School of Business and a BS, in Mechanical Engineer from the Technologico de Monterrey in Mexico. Enrique’s passions are soccer and the ocean, and he also enjoys traveling, getting to know new people, and spending time with his wife and two kids, Emma and Enrique.
Host of Dial P for Procurement
Kelly is the Owner and Managing Director of Buyers Meeting Point and MyPurchasingCenter. She has been in procurement since 2003, starting as a practitioner and then as the Associate Director of Consulting at Emptoris. She has covered procurement news, events, publications, solutions, trends, and relevant economics at Buyers Meeting Point since 2009. Kelly is also the General Manager at Art of Procurement and Business Survey Chair for the ISM-New York Report on Business. Kelly has her MBA from Babson College as well as an MS in Library and Information Science from Simmons College and she has co-authored three books: ‘Supply Market Intelligence for Procurement Professionals’, ‘Procurement at a Crossroads’, and ‘Finance Unleashed’.
Host, Veteran Voices
Mary Kate Soliva is a veteran of the US Army and cofounder of the Guam Human Rights Initiative. She is currently in the Doctor of Criminal Justice program at Saint Leo University. She is passionate about combating human trafficking and has spent the last decade conducting training for military personnel and the local community.
Jeff Miller is the host of Supply Chain Now’s Supply Chain is the Business. Jeff is a digital business transformation and supply chain advisor with deep expertise in Industry 4.0, ERP, PLM, SCM, IoT, AR and related technologies. Through more than 25 years of industry and consulting experience, he has worked with many of the world’s leading product and service companies to achieve their strategic business and supply chain goals, creating durable business value for organizations at the forefront of technology and business practices. Jeff is the managing director for North America at Transition Technologies PSC, a global solution integrator, and the founder and managing principal of BTV Advisors, a firm that helps companies secure business transformation value from digital supply chain technologies and their breakthrough capabilities.
Chief Marketing Officer
Amanda is a marketing veteran and entrepreneur with over 15 years of experience across a variety of industries and organizations including Von Maur, Anthropologie, AmericasMart Atlanta, and Children’s Healthcare of Atlanta. In 2016, Amanda founded and grew the Magnolia Marketing Group into a successful digital media firm, and now she develops modern marketing strategies, social campaigns, innovative operational processes, and implements creative content initiatives for Supply Chain Now. But that’s just the beginning of her supply chain impact. Amanda also served as the VP of Information Systems and Webmaster on the Board of Directors for APICS Savannah for several years, and is the face behind the scenes welcoming you to every Supply Chain Now livestream! She was also recently selected as one of the Top 100 Women in Supply Chain by Supply Chain Digest and IBM. When she’s not leading the Supply Chain Now marketing team, you can find Amanda with her and her husband Scott’s three kids, in the kitchen cooking, or reading.
Business Development Manager
Clay is passionate about two things: supply chain and the marketing that goes into it. Recently graduated with a degree in marketing at the University of Georgia, Clay got his start as a journalism major and inaugural member of the Owl’s football team at Kennesaw State University – but quickly saw tremendous opportunity in the Terry College of Business. He’s already putting his education to great use at Supply Chain Now, assisting with everything from sales and brand strategy to media production. Clay has contributed to initiatives such as our leap into video production, the guest blog series, and boosting social media presence, and after nearly two years in Supply Chain Now’s Marketing Department, Clay now heads up partnership and sales initiatives with the help of the rest of the Supply Chain Now sales team.
Trisha is new to the supply chain industry – but not to podcasting. She’s an experienced podcast manager and virtual assistant who also happens to have 20 years of experience as an elementary school teacher. It’s safe to say, she’s passionate about helping people, and she lives out that passion every day with the Supply Chain Now team, contributing to scheduling and podcast production.
Host of Dial P for Procurement
Billy Taylor is a Proven Business Excellence Practitioner and Leadership Guru with over 25 years leading operations for a Fortune 500 company, Goodyear. He is also the CEO of LinkedXL (Excellence), a Business Operating Systems Architecting Firm dedicated to implementing sustainable operating systems that drive sustainable results. Taylor’s achievements in the industry have made him a Next Generational Lean pacesetter with significant contributions.
An American business executive, Taylor has made a name for himself as an innovative and energetic industry professional with an indispensable passion for his craft of operational excellence. His journey started many years ago and has worked with renowned corporations such as The Goodyear Tire & Rubber Co. (GT) leading multi-site operations. With over 3 decades of service leading North America operations, he is experienced in a deeply rooted process driven approach in customer service, process integrity for sustainability.
A disciple of continuous improvement, Taylor’s love for people inspires commitment to helping others achieve their full potential. He is a dynamic speaker and hosts "The Winning Link," a popular podcast centered on business and leadership excellence with the #1 rated Supply Chain Now Network. As a leadership guru, Taylor has earned several invitations to universities, international conferences, global publications, and the U.S. Army to demonstrate how to achieve and sustain effective results through cultural acceptance and employee ownership. Leveraging the wisdom of his business acumen, strong influence as a speaker and podcaster Taylor is set to release "The Winning Link" book under McGraw Hill publishing in 2022. The book is a how-to manual to help readers understand the management of business interactions while teaching them how to Deine, Align, and Execute Winning in Business.
A servant leader, Taylor, was named by The National Diversity Council as one of the Top 100 Diversity Officers in the country in 2021. He features among Oklahoma's Most Admired CEOs and maintains key leadership roles with the Executive Advisory Board for The Shingo Institute "The Nobel Prize of Operations" and The Association of Manufacturing Excellence (AME); two world-leading organizations for operational excellence, business development, and cultural learning. He is also an Independent Director for the M-D Building Products Board, a proud American manufacturer of quality products since 1920.
Social Media Manager
My name is Chantel King and I am the Social Media Specialist at Supply Chain Now. My job is to make sure our audience is engaged and educated on the abundant amount of information the supply chain industry has to offer.
Social Media and Communications has been my niche ever since I graduated from college at The Academy of Art University in San Francisco. No, I am not a West Coast girl. I was born and raised in New Jersey, but my travel experience goes way beyond the garden state. My true passion is in creating editorial and graphic content that influences others to be great in whatever industry they are in. I’ve done this by working with lifestyle, financial, and editorial companies by providing resources to enhance their businesses.
Another passion of mine is trying new things. Whether it’s food, an activity, or a sport. I would like to say that I am an adventurous Taurus that never shies away from a new quest or challenge.
Lori is currently completing a degree in marketing with an emphasis in digital marketing at the University of Georgia. When she’s not supporting the marketing efforts at Supply Chain Now, you can find her at music festivals – or working toward her dream goal of a fashion career. Lori is involved in many extracurricular activities and appreciates all the learning experiences UGA has brought her.
Sales and Marketing Coordinator
Katherine is a marketing professional and MBA candidate who strives to unite her love of people with a passion for positive experiences. Having a diverse background, which includes nonprofit work with digital marketing and start-ups, she serves as a leader who helps people live their most creative lives by cultivating community, order, collaboration, and respect. With equal parts creativity and analytics, she brings a unique skill set which fosters refining, problem solving, and connecting organizations with their true vision. In her free time, you can usually find her looking for her cup of coffee, playing with her puppy Charlie, and dreaming of her next road trip.
Ben Harris is the Director of Supply Chain Ecosystem Expansion for the Metro Atlanta Chamber. Ben comes to the Metro Atlanta Chamber after serving as Senior Manager, Market Development for Manhattan Associates. There, Ben was responsible for developing Manhattan’s sales pipeline and overall Americas supply chain marketing strategy. Ben oversaw market positioning, messaging and campaign execution to build awareness and drive new pipeline growth. Prior to joining Manhattan, Ben spent four years with the Georgia Department of Economic Development’s Center of Innovation for Logistics where he played a key role in establishing the Center as a go-to industry resource for information, support, partnership building, and investment development. Additionally, he became a key SME for all logistics and supply chain-focused projects. Ben began his career at Page International, Inc. where he drove continuous improvement in complex global supply chain operations for a wide variety of businesses and Fortune 500 companies. An APICS Certified Supply Chain Professional (CSCP), Ben holds an Executive Master’s degree in Business Administration (EMBA) and bachelor’s degree in International Business (BBA) from the Terry College at the University of Georgia.
Host, The Freight Insider
Prior to joining TeamOne Logistics, Page Siplon served as the Executive Director of the Georgia Center of Innovation for Logistics, the State’s leading consulting resource for fueling logistics industry growth and global competitiveness. For over a decade, he directly assisted hundreds of companies to overcome challenges and capitalize on opportunities related to the movement of freight. During this time, Siplon was also appointed to concurrently serve the State of Georgia as Director of the larger Centers of Innovation Program, in which he provided executive leadership and vision for all six strategic industry-focused Centers. As a frequently requested keynote speaker, Siplon is called upon to address a range of audiences on unique aspects of technology, workforce, and logistics. This often includes topics of global and domestic logistics trends, supply chain visibility, collaboration, and strategic planning. He has also been quoted as an industry expert in publications such as Forbes, Journal of Commerce, Fortune, NPR, Wall Street Journal, Reuters, American Express, DC Velocity, Area Development Magazine, Site Selection Magazine, Inbound Logistics, Modern Material Handling, and is frequently a live special guest on SiriusXM’s Road Dog Radio Show. Siplon is an active industry participant, recognized by DC Velocity Magazine as a “2012 Logistics Rainmaker” which annually identifies the top-ten logistics professionals in the Nation; and named a “Pro to Know” by Supply & Demand Executive Magazine in 2014. Siplon was also selected by Georgia Trend Magazine as one of the “Top 100 Most Influential Georgians” for 2013, 2014, and 2015. He also serves various industry leadership roles at both the State and Federal level. Governor Nathan Deal nominated Siplon to represent Georgia on a National Supply Chain Competitiveness Advisory Committee, where he was appointed to a two-year term by the U.S. Secretary of Commerce and was then appointed to serve as its vice-chairman. At the State level, he was selected by then-Governor Sonny Perdue to serve as lead consultant on the Commission for New Georgia’s Freight and Logistics Task Force. In this effort, Siplon led a Private Sector Advisory Committee with invited executives from a range of private sector stakeholders including UPS, Coca-Cola, The Home Depot, Delta Airlines, Georgia Pacific, CSX, and Norfolk Southern. Siplon honorably served a combined 12 years in the United States Marine Corps and the United States Air Force. During this time, he led the integration of encryption techniques and deployed cryptographic devices for tactically secure voice and data platforms in critical ground-to-air communication systems. This service included support for all branches of the Department of Defense, multiple federal security agencies, and aiding NASA with multiple Space Shuttle launches. Originally from New York, Siplon received both a bachelor’s and master’s degree in electrical and computer engineering with a focus on digital signal processing from the Georgia Institute of Technology. He earned an associate’s degree in advanced electronic systems from the Air Force College and completed multiple military leadership academies in both the Marines and Air Force. Siplon currently lives in Cumming, Georgia (north of Atlanta), with his wife Jan, and two children Thomas (19) and Lily (15).
Host, Logistics with Purpose
Kristi Porter is VP of Sales and Marketing at Vector Global Logistics, a company that is changing the world through supply chain. In her role, she oversees all marketing efforts and supports the sales team in doing what they do best. In addition to this role, she is the Chief Do-Gooder at Signify, which assists nonprofits and social impact companies through copywriting and marketing strategy consulting. She has almost 20 years of professional experience, and loves every opportunity to help people do more good.
Host, Logistics with Purpose
Kevin Brown is the Director of Business Development for Vector Global Logistics. He has a dedicated interest in Major Account Management, Enterprise Sales, and Corporate Leadership. He offers 25 years of exceptional experience and superior performance in the sales of Logistics, Supply Chain, and Transportation Management. Kevin is a dynamic, high-impact, sales executive and corporate leader who has consistently exceeded corporate goals. He effectively coordinates multiple resources to solution sell large complex opportunities while focusing on corporate level contacts across the enterprise. His specialties include targeting and securing key accounts by analyzing customer’s current business processes and developing solutions to meet their corporate goals. Connect with Kevin on LinkedIn.
Host, Supply Chain Now en Espanol
Sofia Rivas Herrera is a Mexican Industrial Engineer from Tecnologico de Monterrey class 2019. Upon graduation, she earned a scholarship to study MIT’s Graduate Certificate in Logistics and Supply Chain Management and graduated as one of the Top 3 performers of her class in 2020. She also has a multicultural background due to her international academic experiences at Singapore Management University and Kühne Logistics University in Hamburg. Sofia self-identifies as a Supply Chain enthusiast & ambassador sharing her passion for the field in her daily life.
Host, Logistics with Purpose
Jose Manuel Irarrazaval es parte del equipo de Vector Global Logistics Chile. José Manuel es un gerente experimentado con experiencia en finanzas corporativas, fusiones y adquisiciones, financiamiento y reestructuración, inversión directa y financiera, tanto en Chile como en el exterior. José Manuel tiene su MBA de la Universidad de Pennsylvania- The Wharton School. Conéctese con Jose Manuel en LinkedIn.
Host, Supply Chain Now en Espanol
Demo Perez started his career in 1997 in the industry by chance when a relative asked him for help for two just weeks putting together an operation for FedEx Express at the Colon Free Zone, an area where he was never been but accepted the challenge. Worked in all roles possible from a truck driver to currier to a sales representative, helped the brand introduction, market share growth and recognition in the Colon Free Zone, at the end of 1999 had the chance to meet and have a chat with Fred Smith ( FedEx CEO), joined another company in 2018 who took over the FedEx operations as Operations and sales manager, in 2004 accepted the challenge from his company to leave the FedEx operations and business to take over the operation and business of DHL Express, his major competitor and rival so couldn’t say no, by changing completely its operation model in the Free Zone. In 2005 started his first entrepreneurial journey by quitting his job and joining two friends to start a Freight Forwarding company. After 8 months was recruited back by his company LSP with the General Manager role with the challenge of growing the company and make it fully capable warehousing 3PL. By 2009 joined CSCMP and WERC and started his journey of learning and growing his international network and high-level learning. In 2012 for the first time joined a local association ( the Panama Maritime Chamber) and worked in the country’s first Logistics Strategy plan, joined and lead other associations ending as president of the Panama Logistics Council in 2017. By finishing his professional mission at LSP with a company that was 8 times the size it was when accepted the role as GM with so many jobs generated and several young professionals coached, having great financial results, took the decision to move forward and start his own business from scratch by the end of 2019. with a friend and colleague co-founded IPL Group a company that started as a boutique 3PL and now is gearing up for the post-Covid era by moving to the big leagues.
Host, Supply Chain Now
The founder of Logistics Executive Group, Kim Winter delivers 40 years of executive leadership experience spanning Executive Search & Recruitment, Leadership Development, Executive Coaching, Corporate Advisory, Motivational Speaking, Trade Facilitation and across the Supply Chain, Logistics, 3PL, E-commerce, Life Science, Cold Chain, FMCG, Retail, Maritime, Defence, Aviation, Resources, and Industrial sectors. Operating from the company’s global offices, he is a regular contributor of thought leadership to industry and media, is a professional Master of Ceremonies, and is frequently invited to chair international events.
He is a Board member of over a dozen companies throughout APAC, India, and the Middle East, a New Zealand citizen, he holds formal resident status in Australia and the UAE, and is the Australia & New Zealand representative for the UAE Government-owned Jebel Ali Free Zone (JAFZA), the Middle East’s largest Economic Free Zone.
A triathlete and ex-professional rugby player, Kim is a qualified (IECL Sydney) executive coach and the Founder / Chairman of the successful not for profit humanitarian organization, Oasis Africa (www. oasisafrica.org.au), which has provided freedom from poverty through education to over 8000 mainly orphaned children in East Africa’s slums. Kim holds an MBA and BA from Massey & Victoria Universities (NZ).
Host, Logistics with Purpose
Nick Roemer has had a very diverse and extensive career within design and sales over the last 15 years stretching from China, Dubai, Germany, Holland, UK, and the USA. In the last 5 years, Nick has developed a hawk's eye for sustainable tech and the human-centric marketing and sales procedures that come with it. With his far-reaching and strong network within the logistics industry, Nick has been able to open new avenues and routes to market within major industries in the USA and the UAE. Nick lives by the ethos, “Give more than you take." His professional mission is to make the logistics industry leaner, cleaner and greener.
Sales Support Intern
Alex is pursuing a Marketing degree and a Certificate in Legal Studies at the University of Georgia. As a dual citizen of both the US and UK; Alex has studied abroad at University College London and is passionate about travel and international business. Through her coursework at the Terry College of Business, Alex has gained valuable skills in digital marketing, analytics, and professional selling. She joined Supply Chain Now as a Sales Support Intern where she assists the team by prospecting and qualifying new business partners.