FCW Supply Chain Workshop - Agenda
Register    ➤

Agenda

Times are subject to change.

8:30 AM EDT

Tuesday, June 27

Custom

Welcome Remarks

Description

Welcome to the Supply Chain Workshop!

On Demand

8:32 AM EDT

Tuesday, June 27

Underwritten

Opening Remarks by Mandiant

Underwritten by: Intel

8:34 AM EDT

Tuesday, June 27

Underwritten

Opening Remarks by Intel

Cameron Chereh, Vice President & General Manager Public, Intel

Underwritten by: Mandiant

Description

Hear from Cameron Chereh, Intel's Vice President & General Manger for Public Sector kick off today's event!

On Demand

8:39 AM EDT

Tuesday, June 27

Exclusive Interview

Opening Keynote

Jeanette J. McMillian, Assistant Director, Supply Chain and Cyber Directorate, National Counterintelligence and Security Center

Description

Hear from a senior government leader on how they're approaching supply chain modernization at their organization.

On Demand

9:05 AM EDT

Tuesday, June 27

Underwritten

Technology Insights: Carahsoft | Blackberry

Christine Gadsby, Vice President, Product Security Operations, Blackberry

Underwritten by: Carahsoft | Blackberry

Description

Session presented by Elite Underwriter, Carahsoft | Blackberry. Hear from Christine Gadsby, Blackberry's Vice President, Product Security Operations. 

On Demand

9:25 AM EDT

Tuesday, June 27

Exclusive Interview

Agency Spotlight: GAO

Kim Gianopoulos, Director, International Affairs and Trade, GAO

Description

Hear from GAO Director Kimberly Gianopoulos on how her agency is identifying and working to address supply chain issues in the federal space.

On Demand

9:50 AM EDT

Tuesday, June 27

Underwritten

Roadmap Preview: Vendor and Third Party Risk in ServiceNow

Stephanie Mercedes Rizzo, Senior Product Manager, Vendor and Third Party Management, ServiceNow

Underwritten by: Servicenow

Description

Join us for an exclusive presentation where we will unveil our latest ServiceNow Third Party Risk Management product vision. During this presentation, we will showcase our new comprehensive due diligence workflows for onboarding, renewals, additional due diligence and offboarding processes, complemented by innovative Concentration Risk dashboards. Additionally, we will provide a glimpse into our upcoming roadmap capabilities, designed to empower organizations in effectively managing and mitigating third-party risks. Be part of this informative session and discover how our cutting-edge solutions can elevate your risk management strategies to new levels of success.

On Demand

10:10 AM EDT

Tuesday, June 27

Coffee Break

Coffee Break

10:15 AM EDT

Tuesday, June 27

Exclusive Interview

Agency Spotlight: GSA

Tom Smith, Supervisory IT Specialist, General Services Administration’s Federal Acquisition Service (FAS)

Description

Hear from GSA IT Branch Director Tom Smith on how his agency is using technology to optimize federal supply chains.

10:40 AM EDT

Tuesday, June 27

Underwritten

Securing Business Operations: Demystifying the Illusion of Vendor Safety in Supply Chains

Description

It is easy for a vendor to promise a solution, but the reality is often far different, less complete, and has hidden operational costs for resources most can’t afford. Sadly, the current state of supply chain security is a perfect example of this. Marketing claims mixed with operations and productivity blockers are obfuscating reality. In this session we want to help navigate the fog with a harsh look at the truth so decision makers can set informed strategy.

11:00 AM EDT

Tuesday, June 27

Interview

Agency Spotlight: CISA

Shon L. Lyublanovits, C-SCRM PMO Lead, Cybersecurity and Infrastructure Security Agency (CISA)

Description

Hear from CISA IC-SCRM PMO Lead at the Cybersecurity Division Shon Lyublanovits on how their agency is using employing secure solutions for the supply chain.

On Demand

11:25 AM EDT

Tuesday, June 27

Underwritten

Don’t Take Code from Strangers

Pete Chesta, Ciso, North America, Checkmarx

Underwritten by: Checkmarx

Description

What if I told you that 80% of the source code for your application was written by strangers? Today we are seeing the rise of the criminal coder. Through various means, they are injecting open source software with malicious code. Join us to learn about software supply chain and how to bring real improvements back to your agency.

On Demand

11:45 AM EDT

Tuesday, June 27

Interview

Agency Spotlight: Army Materiel Command

Wayne (Tom) Ray, Civilian Deputy for the Director of the Supply Chain Management Directorate (SCMD), G-3 HQ, Army Materiel Command

Description

Hear from Civilian Deputy for the Director of the Supply Chain Management Directorate at Army Materiel Command Tom Ray for a closer look at how AMC is using employing secure solutions for supply chain defense.

On Demand

12:10 PM EDT

Tuesday, June 27

Closing Remarks

Closing Remarks

Description

Thanks for attending the Supply Chain Workshop!