Past Event
Seminar

Managing Risks in the Cyber Supply Chain

Open to the Public

Speaker: Denise Peake, NSA Lead, Supply Chain Risk Management

The cyber focus moves forward in many government and private industry discussions.  However, within those discussions and planning initiatives, risk to supply chain management lingers as the white elephant.   The global marketplace changed the dynamics of supply chain years ago, and industry/government adapted.  Add cyber to that progression in the marketplace and new challenges emerge. At issue is how to develop protection and meet any future threat. The Comprehensive National Cyber Plan addresses the broad issues associated with supply chain risk management in Initiative 11. But where do we go from there?  Is government regulation and control the answer?  Why would industry partner with the government to brainstorm viable solutions?  What incentives can be put in place that would support investing in risk mitigations?   To meet tomorrow's cyber supply chain threat, we must develop protection measures across product lifecycle and reinforce these measures through acquisition processes and effective implementation of information assurance practices.  And this discussion will focus on best practice and how to get there.

About

Speaker: Denise Peake, NSA Lead, Supply Chain Risk Management

The cyber focus moves forward in many government and private industry discussions.  However, within those discussions and planning initiatives, risk to supply chain management lingers as the white elephant.   The global marketplace changed the dynamics of supply chain years ago, and industry/government adapted.  Add cyber to that progression in the marketplace and new challenges emerge. At issue is how to develop protection and meet any future threat. The Comprehensive National Cyber Plan addresses the broad issues associated with supply chain risk management in Initiative 11. But where do we go from there?  Is government regulation and control the answer?  Why would industry partner with the government to brainstorm viable solutions?  What incentives can be put in place that would support investing in risk mitigations?   To meet tomorrow's cyber supply chain threat, we must develop protection measures across product lifecycle and reinforce these measures through acquisition processes and effective implementation of information assurance practices.  And this discussion will focus on best practice and how to get there.

 

Denise Peake has a 29 year career with the National Security Agency. Her focus for the past ten years has been program management and technical services--including mission assurance for the Information Assurance Directorate. She has experience in governance and process development, strategic planning, systems architecture, applications development, organizational leadership, and financial management. In her former position, as Chief Information Technology Officer, Denise managed a diverse set of technical and administrative professionals and two cross-organizational councils that govern outsourced services and continuity of operations planning. Denise wears two hats in her current position: the NSA Lead for Comprehensive National Cyber Initiative (CNCI) 11, Supply Chain Risk Management, as well as Director of the Information Assurance Supply Chain Risk Management Special Project Office.  Mrs. Peake is a recipient of the Director's Productivity and Service Award. She is a Senior Member in the Computer Science Technical Track, actively participates in the NSA Mathematics and Education Partnership Program, and mentors in many venues.

 

This talk is part of the series "Cyber International Relations," sponsored by the MIT's Center for International Studies and the Belfer Center for Science and International Affairs at the Harvard Kennedy School of Government. The series develops  a multi-dimensional view of international conflict and cooperation within and regarding cyber space.  During the Fall, 2009, semester, the series will focus on economic dimensions of such conflict and cooperation.