Events Add an event Speakers Talks Collections
 
Duration 40:01
16+
Play
Video

Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts

Andrea Little Limbago
VP at Interos Inc
  • Video
  • Table of contents
  • Video
RSAC 2021
May 20, 2021, Online, USA
RSAC 2021
Request Q&A
RSAC 2021
From the conference
RSAC 2021
Request Q&A
Video
Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Add to favorites
86
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speaker

Andrea Little Limbago
VP at Interos Inc

Andrea Little Limbago, Ph.D., is a computational social scientist specializing in the intersection of technology, national security, and society. As the Vice President of Research and Analysis at Interos, she leads the company’s research and analytic work modeling global supply chain risk, with a focus on globalization, cybersecurity, and geopolitics. She is also a Co-Program Director for the Emerging Tech and Cybersecurity Program at the National Security Institute at George Mason. She previously taught in academia, was a technical lead at the Department of Defense, and was Chief Social Scientist at Endgame and Virtru. She earned a Ph.D. in political science from the University of Colorado at Boulder and a BA from Bowdoin College.

View the profile

About the talk

Andrea Little Limbago , Vice President, Research and Methodology, Interos The geopolitical winds of change are upending global supply chains at an unprecedented pace and scope. This session will detail the challenges and opportunities associated with the emergence of distinct technospheres, their regulatory and security considerations, and how organizations can take steps toward greater resilience during significant geopolitical uncertainty.

Share

My name is Andrea little lumbago and I'll be discussing supply chain resilience in a time of tectonic, geopolitical shifts, and feel free to ask him questions in the chat. On, what can I dress up throughout the entire session? Now there's been significant. Transformations already underway special on the one that deal political shifts and emerging Technologies over. The last year, these emerging trends of accelerated. Thanks to the covid-19 pandemic. In addition, to the unprecedented, devastating human scale from the pandemic. We've also seen significant

disruption, to economies across the globe. And specifically, as a perchance of supply chain with regard to global trade, and these charts global trade has plummeted in the first and second quarter of last year. And with that came, a reckoning to supply chains, really exposing a whole range of fragility that had for the most part remain under the under the surface things to do just in time production and really hyper focused on on efficiencies, what was exposed during that time through this major, global trade disruptions was the complexity of Global Supply chains. And this

includes really the cost optimisation and specialization that led to such complexity that there were so many different suppliers, thousands, tens of thousands of Fliers and Supply chains that I made a very hard to know where it is in our connections were and where these interdependencies were until disruption somewhere across the globe. Now, that's all very locally. It also led to very opaque Supply. Chains where companies with private sector in the government were unclear of exactly what the scope of the supply chain looks like that visibility and it's really hard given

such a complex supply chain system. Also expose a concentration risk that we saw and specifically with the emergence of China with the last two decades, as a center of Last Resort at the supplier to the world. When China, when to quarantine, what two enormous concentration risk and destruction, that Ripple throughout the globe, due to the hyper dependencies, and specialization of of aspects within the country. If I would also expose the insecurity of our supply chains, I most recently, we've experienced it with the range of solar winds and Microsoft Exchange supply chain,

attacks indicative of a growing trend of supply chain attacks in. Really, where you see Supply chains being a mode of Entry to a broad attack surface. And so throughout the covid-19 pandemic. We saw all this decade's worth of friends coming together and really exposing his fragility. Unfortunately, that's not all there. A lot there in a larger range of distractions as well underway throughout the last few years and really becoming part of hyper-focus. Looking ahead as far as the range of disruptions that are occurring in the in the Cyber domain. Until I already addressed this or

when supply chain attack. That was the only one of, you know, I was targeting. We see many other examples of this across the globe. We've also seen that range of internet shutdowns and blackouts occur across the globe were seeing that with me and Mark, who going on as a the military is using that to control information, but we seem to really across the globe from Russia, to India to Congo, in light of elections, in to quell protests domestically. Processing arrive, internet sovereignty. And so when he hears the notion of it, the splintering of the balkanization of the internet,

what this refers to is really a local station of information controlled by the government. The China's great firewall. Many other countries are increasingly starting to look at that as a model to follow and Kimbo Kimbo this one more recent wants to try and pursue that. Rossington legislation come along the lines for government, dated access to data is this was where there are some local data storage, requirements. On top of that, enable and require government access to data for supply chain during these countries. Their IP in IP II's at special risk. We are also

seeing did access to government surveillance. And so, we're companies are focusing her in really high surveillance countries. Lauderdale may be exposed, are they didn't know they had that could be used against them or be used for exploitation. And all this comes together with a whole range of risks and really transformation that is underway. Unfortunate for the most part of the discourse that we're hearing points to paradigms and Frameworks from previous eras. And that's why I really like this quote that focuses on how all of our leaders, the first night of scientist envisioned this

return to normal over the next course of the year or two and throw your sweating a lot about failure of imagination. And so, I hope to do throughout this entire talk is Lee to it over coming as collective. Failure imaginations to the Cypress Creek community front and center in determining how our supply chains will be going forward. And I just talking about the Transformations opposed to looking back. We really need to look in your head because that future isn't your five ten years down the road. I think very often we we still imagine. What is

emerging Technologies as some sort of futuristic impact. What's happening now? Where are you staying the chip shortages were seeing your battles over are you? Artificial intelligence regulations Montelongo's line a whole range of that. I talked about the future world order is already here, and we need to be preparing our supply chains to be resilient against these major transformation that are already underway. Largely driven by a shifting deal politics in the emerging technology and digital Revolution. It's the one thinking about these shifts and thinking about how to build a flight and

resilient across the globe. There really are two different techno ideologies that are driving it. And each one of these was a different opportunities and different challenges when thinking about how to restructure and how to build greater and more resilient Supply trains Hands Across the globe. On the one hand, there's digital the rotarians them. This is also referred to as techno dictators, but when governments use digital information and visual information Technologies, for complete information control within their borders, any of those examples I talked about as far as using internet

blackout censorship policy surveillance in the whole, the whole range of a fifties and leveraging, the fiber for information access. When Portland, when we talked about these techno dictators and extends well beyond China. And Russia, I think very often with you, but I'm in Russia or The Usual Suspects and Nate. They absolutely are and they are leading the way what they're doing is providing that Playbook Brothers. A copy of the copycat, starting to emerge and it must State and non-state actors in early with the overarching. Audiology in this complete

quest for information control, controlling it through hoarding of information. They're stealing information, but also manipulation and abuse of that information and data as well. On the other end, the video democracies. And I'd like to deal with repairing his own, which had basically had a Playbook has been involved in for the last few decades, the digital democracy, Playbook? Really still very nascent surprising Because the Internet was built upon to the Notions and aspirations of a free open, secure internet and free flow of information. Unfortunately, those aspirations weren't

supported by any range of policies or laws are norms. It basically, was you internet Anarchy as far as how the information would would emerge in to fill that vacuum. The digital 13 model came in. Unfortunately, we are finally starting to see some democracies come forward and start creating some play books. And so when thinking about looking ahead and how we can actually in Shirley that's personal business, computer reality more policies, and laws and Norms are starting to emerge with really a focus on security and privacy in the free flow of information at the universal, right? As opposed

to the authoritarian do for complete control over information. How does competing ideologies? Ashley impact Supply chains, they very much. So, in fact, both on the the range of data wrist, but when thinking about how Supply chains again, transformed right now, and how companies, or government was thinking about where the suppliers are who to partner with, on how to really Transformer, the resilient these ideologies to become friends Center when thinking about where and it in the locations of your supply chain, And they're coming from fastest to take in

account. When, when doing that one is global Wars of the global trade Wars another's regulatory shifts. And then finally is also, interesting hostilities. It's all walk through each of these very briefly. Although each one could hardly be any that don't presentation. Something about the global trade war, in our security Community. We think about the weaponization of cyber whether you love or hate that phrase, it's something that you has been around for a little while. And really talks about how the cyberspace domain has become an area of global conflict. That's been going on for

quite some time. As I think we have, we all have a condo or a safe for years now and heard a lot easier than kind of attacks. What's relatively new and has been around for who has actually been a bit of a gap for several decades, is the weaponization of trade and this is where industrial policy comes into play, and it's where trade policies are used as a weapon of other governments to pursue and to push for thrown object has incentives. And where will focus on for today is the state access routes through the hardware and software that comes along with that trade. And so, if you think

that's in the tech Giant's across the globe and various kinds of surveillance companies in the various emerging Technologies. Some of those can come along with your very kind of did access risk as far as embedded back doors or vulnerabilities and they because they're becoming part of the with weapons station fire, but also part of the trade conflict that receive a special between the US and China. Until then why don't you? This is growing use of regulations and why they're growing a conflict that were seeing that I'm taking trade of words between us and China, but not just, those were

seeing you Australian time in conflict with Tara, Silver Wine, Taiwan of pineapple. If I was trying to see if there's no shortage of examples right now, as far as the growing range of trade disputes that are popping up, the special law doesn't focus on technology side. And so given that we're already starting to see some private-sector and public-sector entities already shifting their their locations away from China and away from areas toward what they feel are are more resilient cell locations. And don't currently what we're seeing is he roughly quarter of companies are planning on

relocating or Supply chains and for lottie's numbers and statistics the over the course of the covid. Pandemic. They've grown in percentage is as far as those were thinking about moving their supply chains and transforming them across the globe. I think three quarters are enhancing the scope of an existing restoring until this is important point because we're going to restoring was already underway. Thanks the US and China trade war in the Grand Terrace. That's really had escalated over the last year. I don't see. No, we're having at least have two companies are looking at providing

alternative suppliers and so anniversary of suppliers, and back of suppliers of another way, to gain resilience going forward. But not just companies are having these plans governments are also stepping in to incentivize very kind of movement away from areas where they feel, they have too much. She brought the concentration risk. And Frances has allocated over four billion in the last year or so difficult. It's going to message her away from China and they're not alone because it is a significant cost.

And all this discussion about transforming moving across. The globe is written by, this is the range of Harrison technology as we talked about. And I'm really trying to get away from this expose concentration risk, that we saw her over the last year. Nothing about restoring. Moving away from the one higher risk area to lower risk area. Sounds great. The problem is, it's really expensive. Awesome. Estimated to be up to something dollars to shift the supply chain held out of China cost, much more than that other issues of sunk costs. So over the last two decades, said, I'm dusting off a

lot of money and physical infrastructure. That's located there. It's very hard to replicate elsewhere. Finally, we're also seeing labor force requirements that you didn't. Look at that hyper special. There's no talking about the labor force requirements are very hard to find elsewhere and also anything, but where to move could have possibly be stuck somewhere, cyber risk in different areas. Thanks to his whole range of different kinds of government did access requirements and other kinds of risks that I mentioned earlier. So what that, as? A backdrop person is

global trade war between the high in duplicate tensions between the US and China and authoritarianism. A democracy is across the globe. And we are staying at the Techno ideology ideological battle going on and it was coming along with that. Really going to finish this shift in the regulatory landscape and very often. We hear that policy is way behind Technology Innovation, and it's generally has been through what we've seen over the last year to a special United States is really a dynamic regulatory landscape, export controls and will using industrial policy in ways. We

haven't seen unprecedented ways. And I didn't see on this line is it's a hold of Garmin approach as well until walk through a couple examples. Just a highlight. Just how hard it is to stay on top of this Dynamic regulatory landscape. And so I'll start Department of Sanford. You may not think about as a key component of industrial policy, but that's part of the sentence has been leaving away. The 2019 National Defense, authorization, act as section 89, which prohibits five different Chinese companies, and their Affiliates from being within the supply chain of federal contractors. And so

it's Huawei and ZTE or some of them but Hikvision. Hi, Tara are the who are the three others that may not be the ones that are commonly known that are linked to and ask for your concern. And so they cannot be part of the supply chains, for all those who work and support the government and interesting Lee SEC. Just recent also name of the exact same five companies, as a national security threat, is introducing a whole range of a few additional kind of regulations pose on dealing with those five companies. And so I see some reinforcements from a different apartment across the government, focus on

some more companies. We're all the same from the Department of Defense section 12:37 of a 1999, ndaa, do it for twenty years. There has been this requirement that the Pentagon a list companies that are Chinese linked annoying. Sofia, later. I'll bring the United States, hasn't been make a move on it, really for 20 years. And then, since the last June. June of 2020 roughly there in 40 /, 40 companies that unless the TLA. And while 12:37 doesn't have its own compliance requirements. There's an executive order this past November that came out to did

it include investment Provisions to those companies and then was recently those are than an act of their treasury would have initiated a non specially. Doesn't need a communist Chinese military company list and that's where you see those companies start to emerge Department coordination towards. The National Security aspect of these new techno in trade Wars that are ongoing One more aspect of Treasury are the financial penalties. And so that's where it gets into, how he was very hard to stay in compliance with a lot of going on and if you don't it's very costly for you and it was

near the cross your supply chain. Now, that department. You're always in the most, active has been from a Commerce and within that there's a bureau of industry and security that has an entity list that's basically includes prohibitions on x 4, x 4, door in country, transfer of of products that are on the interview list. Prior to 2019, there really weren't many Chinese companies that are listed on it and CTE was and it was delisted. But worse, we seen it is over. 350 companies were out of my 1920, Wisconsin. We're already in 2021 because they're really the

significant significant number of companies that cannot be within within your supply chain or have a whole range of different kinds export restrictions associated with them. And so what we saw in 2019 in May with 68 largely focused on Huawei to see you throughout the year. Additional Huawei Affiliates added on to it, but it wasn't just for a while away without trying to tell me that. So I can write violations from out of her ties to 11 to mass destruction of those December of 2020 is all over a hundred different companies added. And those are

the random, a security Tech surveillance concerns, the human rights concerns, and then also building islands in the South China Sea. And then we also sell were even additional once, so she would have a new list called the military end-user list. And so concerned over this technology is being used by Foreign governments and their militaries and what's even be on top of this food. That wasn't just trying to get out of your whole bunch of Russian companies as well at the same time. And so, that might be a harbinger of what we're going to be seeing more more, this year is additional companies

outside of just tryna being added to the list. And in January, saw a few. And since then, we've also already seen some targeting Saudi Arabia and More in Russia and China as well. That's a lot to stay on top of across the globe. Now, if I drive home to tell you, it's not just the United States that's working in this area. We're also seeing our these democracy to cross the globe, get into the game of leveraging export and other kind of probation restrictions to control what technologies are being used within within their Sovereign down. And so across Europe

we're seeing is a patchwork of different laws apply to 5G. And while I actually was one of the first to ban while I nut back in 2018 and it is taking a different route as far as Banning hundreds of different apps went to China and part of that really started was during the conflict between China and India over the last year that led to the Banning of the apps in increasingly hostility. Between them is a good example of what we talked about the rising instability that were staying across the globe. No, also, I think it's important to note how some of these are starting to

get coordinates in his Provisions restrictions, according coordinated across country companies and countries. And so, most recently, what we saw was seeing you for the first time since 1989. I should sanctions against China for the human rights violations. And they did that in coordination with the US and the UK and Canada into Russia is doing her. Two boxes are starting to come together and to look at the various to coordinate and organized at the permissions restrictions as a united front, a China quickly and introduce their own sanctions against the EU. And that also is part of how to use

respond to the growing probations restrictions against it and so they've introduced their own unreliable, Space Station 3 S us defense AutoZone response in arms sales to Taiwan and administration's just a section, 28 us former Administration officials. There's plenty of the Tit for Tat going back and forth on that angle. Am I going to see if that wasn't your Dynamic? You a fast-paced and moving it making very hard to stay. On top of these. They should be dynamic and Export control requirements. There's a whole range of additional data privacy and protection requirements and a

helping companies that are secure their data and and democracy is what we're seeing is this emerging through privacy and data protection regulations, and the general deer protection regulation to you is, are you at the most prominent one with the others in California, Brazil and Japan salt on to it and then across United States at the state level. I was trying to pursue this kind of data protection policies processing security policy pop up as well. So I'm screaming. Treating multiplications, one of them to incentivize greater security, but also for doesn't apply chance to see the walk back

into a sure that their suppliers are also maintain a certain level of security. No, I see that happened on Democracy that you were trying to take a different angle, although using some of the very similar terminology under the auspices of ensuring data protection to sharing data rights. What we're seeing our new cyber security and data protection laws that are actually stayed there actually aimed at enabling the government to access that data and have greater surveillance over it. And the National Security Law Hong Kong. Wonder example, tell me the others. I've already talked about as far

as creating their own internal talking, Cambodia to Ecuador larger surveillance system into contacts and start the day on and off. Again, require on all computers have been in college stand in the Baseline, able to meet in the middle attack for access to data. And then on top of all of that, there's is the range of a note, destruction that are going on in under the auspices of maintaining National Security. It's really different attacks on data protection and data security and it's really important to see. How does air get back to using the reality that have been to jail for attorney Mel

is spreading much faster than those state of Texas and security and privacy requirements in the democracy. Define. I also want to get into this notion of major power competition for those of you in that in that security committee. Perhaps I hear a lot about this move towards made up. Our competition. The pivot to Asia has been going on for for several years now. And we talked about for the better. Of course of this of this presentation. We can't have a hyper phobic, sometimes nor seen the other and Billy would have quite a resilience. And so looking at how the

asymmetric nature cyber, which means that mineral resources and smaller States. Now, have an outsize impact. Thanks to the emerging Technologies in cyber security and we see that you compared to the past or power used to be measured on things like military spending and personnel and Iron and Steel and those things don't matter. But the whole nature of warfare and Global power is really shifted. Thanks to the asymmetric nature of both emerging Technologies in cyber and said I can provide a couple of examples to highlight how that's the case. The first one time on The Usual

Suspects and we hereby China, Russia, Iran, and North Korea, and that's great. And absolutely, they are the ones that we're seeing the bigger attacks. They're having global impact. And was important to highlight in that is at your in general. They are smaller. They aren't the major power to receive in the globe, but they're having a very big impact when it comes in very strange. Us of cyber attacks in and Newfound campaigns and different kinds baby. She's linked to them. We're also seeing though that doesn't get quite as much notice and really think that we're seeing more and more is how

smaller States supposed to say. And not and not date are learning from the other from China. Russia, Iran, North Korea and of mind their own strategies and give me thinking about that over a hundred different countries. Now, have offensive cyber capabilities and it's no wonder that was trying to see a rise of the use of those capabilities, especially when it comes to various kinds of conflicts that are starting to pop up around the globe. Wedding about chewing going to cyber domain. Vietnam has an apt associated with its of having outside Global impact. That way on

Lebanon had dark hair towel, link to it for the Google Android now or campaign. Interesting from this Mark Country Store in a pop-up and having a larger impact, our having linked to empty that do. We're also seeing is the emergence of hot spots and really focus on Geographic conflicts. Land was on the biggest cause of the war historically and that's coming back again, and we see it in a couple different areas that I'll highlight. The first is Western Sahara and Morocco where these drones has been identified and playing a component and what the sensibility also matters though to

supply chains, that also blocked on the biggest trading routes and it West Africa. Until we reach of these were seeing through the intersection of House are going to Billy, come to intersects with deer. With a supply chain resilience. Neither consideration to restrain his due to his degree interdependencies. I'm a similar story in Armenia and Azerbaijan where drones against a data roll. Interesting later as well as from the first thing showing through social media in emerging Technologies. It concerns over security of the other Global energy

Market due to some pipeline there on that run through that area. They finally, in the teacher region, Pio Pia. Can we see some drawings are starting to appear? We also Supply chains, specialty manufacturing disrupted, do that instability. If I were to see a lot more has to sit with some of the Cyber in emerging Technologies coming together within an area is in Myanmar or Burma. We're seeing them in the military coup, the leader of the Ku, the flying drone, as well as a phone, a computer cracking software to base with her Builder. The population has had a really

significant disruptions, especially for two ports, in to wash shipping centers, that's dependent on going through that area. And so, all of it, altogether leads to arrange a roof across a little bit are really threatening supply chain, security, and resilience. And don't we think about this new normal is, we can't think of the new normal is that it was for the previous few decades. We really need to prepare for what is coming next. And so I'd like to spend the next ten minutes or so talking about how to build the supply chain. Originally the monk season normal shift that are

underway. The first session is the I really like this quote because if the perimeter is dadaism that we hear over and over and over again, but often times we think about that just in the context of cloud security. We don't really think about in the context of thing about our partners as part of our you are. Now he goes to centimeter, make sure remain safe and secure and so this is a really good at that was from last year that talks about how you got something your own a security completely undermined. If I'm your suppliers has weakened sent us for their own security.

Another rule of thumb to think about it. Seriously depends on where your data sets relations and I talked about where you stand, depends on where you said. So as far as your, your perspective on things, same goes for weird. If your data is in any of these locations, that might be increasingly at risk due today to storage and get a government access laws, or in areas where the government has your growing cyber capabilities, are your dad might be much more at risk and so I can be start thinking about transforming their slot Supply chains. They really think about where their data is in the

security of it really does depend on where it is across the globe. Narcissism have mentioned before I'm going to keep on messing it up as we prepare for this new normal with will keep hearing over and over again. We must avoid the Tennessee to prepare for yesterday's risks and disruptions and we can learn from them while lessons in there. So we really need to overcome the failure of collective imagination and really focus on what we can be doing better, what we can be doing to prepare for this whole range of risks that are out there cuz I'm pressing the scope. I'm assuming

that everything is going the same from Dexter, as it was in 2019 is just not the reality that we're entering into right now. We really need to prepare for the Transformations that are underway. And so what you expect in this new world order, so they'll be challenges to be sure. And I talked a lot about them. And yeah, it's not to to sugarcoat it in or wait until you so much of the fight. But they really are a big Transformations on your way and I can do it. It's going to be important but not easy to prepare for the transformations, in to be better prepared to help Delta flight and resilience

in that regard and tell something about the coupling and reassuring. So that's moving away from various. We may have your graphic concentration risk. It is expensive and it's going to cost a lot of money, but we can keep in mind as it doesn't have to be all or nothing. And that's a really important component. They think it often gets overlooked, you can focus on what your core competencies are what your most important IP that you need to protect support, resources are and make sure those are protected in an area that are much more resilient than others and you can

still maintain various other kinds of trade flows, you know. Maybe a higher risk, but be not at matter. As much to your bottom line. Even knowing where your data is going to get another problem. It's easier said than done because Jim the free flow of information that they really need to really think about where you're saying your dad. If you're sharing it with and think about your own data sharing strategy, that both can shape to create greater security, but also ensure that's not going Beyond. Where is necessary. I'm keeping up with the regulations. Do you? Another seems

increasingly hard to do as I showed when he brought 350 company that are added to a list and see you less over the last few years. It's very hard to know on top of that. On top of that. It's it's even hard to know how many of those are even with an extended supply chain. You may not have in their initial supply chain, but they may be their second, third, fourth tier and so forth, the game of his ability is another challenge. And finally met the walls are hard to shift in this might seem like these are the idiots one. But again, we hear time and time again, that you were to return to normal

that things are going to go somewhere to how they were before, and it's really not the reality. And while 2020 was an inflection point, a lot of Trends were already well underway and just accelerated them. It's, we really need to ship them at the model and think about what this new world order is going to look like and prepare accordingly. Fortunately, there are also opportunities in this is where I think I would feel with a lot of effort is important to maintain security and awareness of us in the challenges. Really think about how can we make these Transformations into something that's

much more. So, an opportunity to focus on trustworthy networks with the firm in the nation state level. And by that thinking, that mean the whole gamut from we are partnering with also looking at weird where your companies are going as well as thinking about you. How you can build trust through very kind of technological innovation and building across your Partnerships as you think about how who is within your supply chain. Immigrant become a competitive Advantage. As we undergo this Transformer Transformations. There was, he wants to go head in the sand and pretend that nothing's changed

and everything is just the same as it was before, I can be in for a surprise the next few years. Those are making us corporations. Now for the, for the whole range of options. I think I can pay off for them down. The road will be much better prepared, and I'll be something that they can take it as a competitive advantage over their competitors. Uh, I think we're all, but you're stronger, when working together and Social Security. It's more my something. You see anything on your favorite office and they can think about, in building up your supply, to an ecosystem, how to strengthen security?

Technology,, I talked to Howell Payton complex. They are technology. Can help overcome with my thoughts and help you see exactly where you are across the globe, where your suppliers are and from the risks and opportunities that might emerge in those areas. What can you next? The one like I was talking about. Do you have that visibility know The Who and the what of your immediate supply chain Network want to know that the on your first-tier see if you can do that if you on your second or third year and so forth, but you don't know who's your supplier Network? I stopped and had that be

your number one priority and really start to figure out what visibility can gain across your entire supply chain. And then as well every technology, love your partners for information sharing to help get that visibility. I'd rethink how you think about cyber risk. Do you know where your data is? Do you know where those insecure link? Sorry, that we talked about earlier, and that means within the physical world in the digital world and him to take it a step further to had to come to understand where your, those wrists are across the globe. At the firm level. Do you know where you are? As far as

your industry? What it? What's in the taxman's are within your industry that the country-level, what were some of different kind of country? All the rest are out there. And how do they vary in how to do is inform? How you Transformer supply chain going forward? It's really important. Think about that goes for both of your Spanish book printer game. And finally, I get again, don't look back, really weren't in the past. I prepare for these Transformations. They are underway. That future is here for quite some time when we talked about borders, not nicer existing

on the internet are they do end up coming. Front-and-center geopolitics is coming into play. We're seeing the splintering of the internet. We're also doing the splintering up in the balkanization of a trade as well. And so we're seeing those Trends coming together, borders are matter more than ever in. Those can help you inform you on where you should be transforming your own supply chain for greater resilience. And while most of his really focused on looking at the various branches cybertech, technological wrists are starting to emerge. I didn't even addressing the other supply chain

disruptions that we see and continue to see increasingly climate change. The natural disasters impact of the kindergarten teacher. Pandemics and then environmental social and governance risk switch back in the compliance concerns where we are increasingly government and acting very kind of lost to help and promotes various kinds of USG compliance. And so it's a range of a transformation that already under way. And so I still leave us with his, you think the thought of whether we can either be shaped by all this transformation to help shape them? And for me, are we

working or not relations and a strong proponent of democracy and a free and open internet, your help with the community can come together in a boy. That's like a failure of imagination and helped lead the way and re-imagined how supply chain risk can be more resilient and Beyond card with some great Transformations. Great Innovation, great collaboration within the community for all of us to help ensure supply chain resilience into the future, help preserve the freedoms and Innovation, to help provide the foundation to our way of life, but you told in a way that also

can support the bottom line. It's all this. They don't have to be mutually exclusive. And so that's where we can go eat at the future, be shaped by that. And so with that, I'd love to tell you open up two questions. Look forward to hearing from you. Thank you.

Cackle comments for the website

Buy this talk

Access to the talk “Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Ticket

Get access to all videos “RSAC 2021”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Ticket

Similar talks

Vasu Jakkal
CVP Microsoft Security, Compliance & Identity at Element
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Mauricio Guerra
Director Global Information Security at The Dow Chemical Company
+ 1 speaker
Mary O’Brien
General Manager at IBM
+ 1 speaker
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Rohit Ghai
President at RSA
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Buy this video

Video

Access to the talk “Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
816 conferences
32658 speakers
12329 hours of content