Agenda

8:00 – 8:50

Registration and breakfast

8:50 – 9:00

Chair’s opening remarks

9:00 – 9:40

REGULATION 
Global supply chain: A law enforcement perspective

View Session Details

  • Reviewing national security
  • Assessing community outreach
  • Ensuring public safety
HEADSHOT8-1-100x100-1-1

Senior Executive, FBI

9:40 – 10:20

GEOPOLITICAL RISK
Managing supply chains across jurisdictions and continued uncertainties of external factors

View Session Details

  • Spillover effects of disruptions to supply chains
  • Impact of geopolitical factors on assessment of risks
  • Making complex global interlinkages
  • Managing increasingly confrontational global relations
    • Spill over into trade relations and tariff disputes
  • Changes to processes as a result of trade tensions
    • Ripple effect of changes throughout the supply chain
  • Impact to manufacturing with reliance on China and Taiwan
    • Understanding level of exposure
    • Managing short and long term disruptions
  • Updating contractual obligations in line with geopolitical changes
HEADSHOT8-1-100x100-1-1

Lacrecia Billings, Interim Vice President, Supply Chain Acceleration, Walmart

10:20-10:50

Morning refreshment break and networking

10:50 – 11:30

ECONOMIC VOLATILITY
Monitoring global economic volatility and reliance of global economies on supply chains

View Session Details

  • Reviewing progress made towards recovery post pandemic
    • Absorbing pent up demand
  • Balancing recovery and mitigating recession risks
  • Complexities of Covid-19 supply shock
  • Impact of structural supply shocks on inflation
  • Understanding mechanisms for the Inflation reduction act
  • Global economy tightly integrated through trading relations
    • Reliance on efficient and effective processes
  • Assessing the global impact of a US interest rate hike on supply chains
  • Making global supply chains part of economic policy thinking

11:30 – 12:20

RESILIENCE – PANEL DISCUSSION
Gaining visibility across suppliers and subcontractors and enhancing resilience

View Session Details

  • Conducting security assessments to drive resilience
  • Understanding and quantifying supply chain resiliency
    • Identifying challenges and vulnerabilities
  • Identifying key suppliers and steps to manage relationship
  • Reviewing impact of global events on supply chain resilience
  • Understanding market forces that could impact supply base
  • Business continuity in case of supply chain disruptions
  • Understanding where reliance lies on certain products or services
  • Reviewing traceability requirements across industries
HEADSHOT8-1-100x100-1-1

Sara Ricci, VP, Information Risk,  HBC

HEADSHOT8-1-100x100-1-1

Senior Executive,  Black Kite

HEADSHOT8-1-100x100-1-1

Robert Peters, Manager of Supply Chain Implementation,  HealthTrust Performance Group

12:20-1:20

Lunch break and networking

1:20 – 2:00

PROGRAM DEVELOPMENT
Financial services case study: introducing layers of risk management to build a true risk program

View Session Details

  • Understanding how financial services conduct supply chain oversight
  • Introducing cyber and IT security controls
  • Reviewing interagency guidance to set as cross industry standard
  • Developing infrastructure to manage third party risk
  • Building out unified platforms and common approaches
  • Calculating inherent risk for all third parties
  • Quantifying risk beyond tiering high, medium, low
    • Focusing on risk beyond just assessments

2:00- 2:40

GOVERNANCE
Reviewing governance structures in global organizations and making the business case for an evolving program

View Session Details

  • Keeping third party risk on a level playing field with areas including security
  • Highlighting third party risk as an area of importance at board level
  • Governance requirements to ensure sufficient budget and funding
  • Staying proactive with prioritization of third party risk
  • Ensuring teams are appropriately staffed
  • Investing in technologies and data sources

2:40- 3:20

INDEPENDENT ASSESSMENTS
Identifying which third parties to undertake deep dive independent assessments

View Session Details

  • Determining frequency of assessments
  • Understanding IT, cyber and physical security risks
  • Differentiating different types of third parties and services
    • Identifying high risk third parties
  • Demonstrating value to secure budget
  • Identifying criticality via inherent risk questionnaires
  • Inclusion of likelihood factors
    • Identifying the likelihood of risks manifesting themselves
  • Developing risk data: Driving a cultural change towards risk management
HEADSHOT8-1-100x100-1-1

Tausif Khan,, Associate Director, Third Party Risk, DTCC

HEADSHOT8-1-100x100-1-1

Michael Rivas, , Head of Third Party, DTCC

3:20-3:50

Afternoon refreshment break and networking

3:50- 4:30

CYBER SECURITY
Prioritizing cyber security defenses across third parties and supply chain

View Session Details

  • Talking risk: aligning with Cyber, IT, and IT Audit on the definition of ‘risk from an enterprise standpoint
  • Compliance Vs Risk: The two are not synonyms!
  • The currently rising criticality of third party security risks
  • Your company’s must-have general security processes and technologies at a high (non-tech) level
  • Obtaining reasonable assurance your company’s third parties also implement must-have security measures
  • Challenges to achieving optimized 3rd party security risk assurance
HEADSHOT8-1-100x100-1-1

Cindy Chadwick, , Supplier Cyber Security Risk & Assurance Principle Architect, , GSK

4:30- 5:20

PRIVACY – PANEL DISCUSSION
Incorporating privacy as part of a security framework to protect confidential data

View Session Details

  • Managing access controls to data
  • Aligning privacy controls with security controls
  • Protecting confidentiality of data
  • Technical access controls to implement privacy rules
  • Distinguishing between privacy and security
    • Managing interconnected nature whilst understanding differences
  • Inclusion of privacy officer in event of a security incident
  • Managing regulations across states and jurisdictions
  • Privacy risks with increased use of AI and large language models
HEADSHOT8-1-100x100-1-1

Phani Dasari, former Head of Business Security Officer, TikTok

5:20-5:30

Chair’s closing remarks

5:30

End of day one and networking drinks reception

8:00- 8:50

Registration and breakfast

8:50- 9:00

Chair’s opening remarks

9:00- 9:40

RECOVERY
Post pandemic recovery: Long-term repercussions of global disruptions

View Session Details

  • Managing long lead times and impact downstream
  • Impact to industries reliant on semiconductors still facing delays
  • Managing and navigating delays
  • Lessons learnt across industries
  • Global labor and manufacturing shortages
  • National infrastructure to manage changes
HEADSHOT8-1-100x100-1-1

Callie Kennedy, Associate Director of Supply Chain, HCA Healthcare

9:40- 10:30

NEARSHORING – PANEL DISCUSSION
Managing global trends of onshoring and deglobalization post pandemic

View Session Details

  • US move to buying onshore with limited build capability
  • Developing infrastructure to move manufacturing operations
  • Time consuming and cost prohibitive nature of onshoring
  • Transition to green economy
    • Scaling up green technologies domestically
  • Mitigating concentration risks with over reliance in certain jurisdictions
  • Capitalizing on the move and developing long term capabilities
  • US regulations on sourcing in certain jurisdictions
HEADSHOT8-1-100x100-1-1

Elizabeth Anderson, Senior Director, Supply Chain Lead, JLL

HEADSHOT8-1-100x100-1-1

Gonzalo Lopez-Polin, Operations/Supply Chain, American Industrial Partners

10:30-11:00

Morning refreshment break and networking

11:00- 11:40

CONTRACTS

Reviewing third party controls to mitigate risks and key features to include within a contract

View Session Details

  • Filling unknown gaps
  • Including unknown variables within contract clauses
  • Controls to monitor during onboarding
  • Including clauses for cyber insurance
  • Ensuring indemnification in the event of a breach or business continuity impact
  • Balancing business priorities and risk management
  • Including SLA requirements as part of contract
HEADSHOT8-1-100x100-1-1

Patrick Carr, Supply Chain Director, Pelco Products

11:40- 12:20

CONCENTRATION
Identifying concentration of supplier to ensure stability and security of supply chains

View Session Details

  • Material shortages and product availability
  • Ensuring parts are in the right place at the right time
  • Implementing risk mitigation checkpoints to limit disruption
  • Ripple effect of shortages
  • Controlling risk in the supply chain to get products to customers
  • Identifying third and fourth party concentration
  • Developing a program to assess concentration risk

12:20-1:20

Lunch break and networking

1:20- 2:00

4TH PARTIES
Fourth parties/subcontracting: Gaining a holistic view of subcontractors to understand full risk landscape

View Session Details

  • Keeping track of third party vendors and identifying critical fourth parties
  • Gaining control of fourth party oversight
  • Monitoring capabilities beyond third parties
  • Understanding full subcontracting ecosystem
  • Getting sufficient information for due diligence on subcontracting
  • Tracking percentage of a single project outsourced to fourth parties
    • Identifying critical supply chain
HEADSHOT8-1-100x100-1-1

Anit Banerjee, Third Party Risk Officer – Legal Risk Management, Meta

2:00- 2:50

ESG – PANEL DISCUSSION
Reviewing ESG aspects across supply chains to understand impacts and considerations beyond environmental

View Session Details

  • Mitigating the impact of supply chains on the environment
  • Ensuring sustainability of supply chains
  • Understanding environmental impacts at all stages
  • Balancing higher costs and sustainability
  • Customer support in decarbonizing and creating a greener economy
  • Progress of global organizations regulated across jurisdictions
  • Monitoring supply chain for social challenges
    • Tracking modern slavery and child labor
  • Updating policies in line with ESG requirements
HEADSHOT8-1-100x100-1-1

Kim Bach Vu, Sr Manager, Supply Chain Responsibility, Applied Materials

2:50-3:20

Afternoon refreshment break

3:20- 4:00

HUMAN TRAFFICKING
Mitigating human trafficking and 
exploitation risk exposure

View Session Details

  • Incorporating third party data provided through public private partnerships
  • Overlapping datasets as a means of resolving entities
  • Monitoring for social, political unrest and failed nation states to minimize intersection with exploitation
  • Incorporate monitoring, tracking trends of missing persons globally to harden supply chains to exploitation
  • Pig butchering “the most egregious form of Human Rights violations”
HEADSHOT8-1-100x100-1-1

Christopher Kemp, Senior Operations Manager, Anti-Human Trafficking Intelligence Initiative

4:00- 4:40

AI
Leveraging advanced technology to gain insight across the supply chain whilst understanding potential new risks

View Session Details

  • Uses of AI for supply chain and third party risk
  • Analyzing and leveraging data and outputs
  • Recruiting or retraining to effectively leverage AI tools
  • Impact of Covid-19 on AI outputs with skewed historical input
    • Managing retrospective tools
  • Balancing AI as an enabler and a risk
  • Risks with ChatGPT public information
  • Building capabilities to enhance decision support and analytics intelligence
  • Data privacy concerns with access to online tools

4:40-4:50

Chair’s closing remarks

4:50

End of End of event