Cisco Blogs / Michelle Fleury
Supply Chain Transformation
Michelle leads the Supply Chain Transformation (SCT) team for Cisco. Her team plays a critical role in enabling the supply chain to execute on fundamentals and to adapt rapidly to the changing needs of the business and of Cisco’s customers. SCT is essential in creating supply chain strategy, digitizing the supply chain, providing leadership in acquisition integration, and partnering to develop the operational model for Cisco’s expanding businesses.
Prior to Supply Chain, Michelle lead the Data Protection team within the Security and Trust Organization for Cisco as Chief Data Protection Officer. In her time with the Data Protection Program she built a framework that encompassed corporate data governance, enterprise-wide data incident response, and a comprehensive security certification and compliance strategy.
With more than 17 years of global leadership experience at Cisco, Michelle has led organizations within a majority of Cisco’s critical functions: Engineering, Channel Sales, Services, Operations, and Corporate Governance. From leading Engineering Business Operations to serving as Chief of Staff and Corporate Director of Worldwide Channel Operations, Michelle focus and commitment to operational excellence has been a driving force in her tenure at Cisco.
Michelle holds a Masters of Science in Management from Stanford University’s Graduate School of Business and a Bachelor of Arts in Economics from Eastern Illinois University, as well as numerous technical certifications.
Outside of Cisco, Michelle has advised and continues to serve on the Board of Directors at numerous Silicon Valley startups. You can find her online at LinkedIn.
Keeping the “House” in Order: A Look Inside Cisco’s Data Protection Program
When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there “watching” us where we live, picking up on our daily patterns and scouring our home’s exterior to find the easiest way “in.” Acknowledging this, we buy door and window locks, alarm systems […]
5 Steps to an Effective Data Incident Response Program
All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at the critical processes […]
Protecting Data Globally: A Modern Mandate
Data is the currency of the knowledge economy. This makes it a highly valuable commodity – for organizations and cybercriminals alike. As threats to data security mount, organizations must find...