Atlanta CISO Virtual Executive Summit

May 6, 2021 | 8:00am - 2:30pm EDT

May 6, 2021 | 8:00am - 2:30pm EDT


Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Atlanta CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes


Derek Benz

Coca-Cola Company
Chief Information Security Officer

Tim Callahan

Global Chief Security Officer

John Dickson

Republic National Distributing Company
VP, IT Infrastructure & Cybersecurity

David Levine

Ricoh Americas
VP, Information Security & CISO

Dean Mallis


Dan Webber

UST Global
VP Technology

Deborah Wheeler

Delta Air Lines
Chief Information Security Officer

What to Expect

Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.


Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join intimate, interactive discussions with peers in Boardroom sessions.

Meet the Speakers

Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Atlanta community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. Be sure to opt in when you register and get matched based on your key priorities.


May 6, 2021

8:00am - 8:45am EDT Virtual Summit Keynote

People Before Things — Always!

Chris Laping headshot

Chris Laping


Guest Speaker

Gallup reports that 70% of all change initiatives are unsuccessful. Why do some organizations succeed at delivering change while others don’t? Quite simply, their leaders put people before things. Using concepts from his best-selling book, Chris takes his audience on a journey to help them visualize how they can become CHANGE leaders. Intended for any executive, middle manager or grassroots influencer, this is an inspirational message for all levels of leadership!

8:45am - 9:00am EDT Break

9:00am - 10:00am EDT Virtual Summit Boardroom

Securing the Sprawling Endpoint

Tom Kellermann headshot

Tom Kellermann

Chief Cybersecurity Officer

VMware Carbon Black

Martin Fisher headshot

Martin Fisher

Manager, IT Security

Northside Hospital

David Levine headshot

David Levine

VP, Information Security & CISO

Ricoh Americas

David Nolan headshot

David Nolan

Director Information Security


The global health pandemic has forced CISOs into a new era of evolving challenges. With fully remote workforces and assets continuously moving to the cloud, securing endpoint protection has never been more critical. So how are CISOs deploying next-generation endpoint protection to solve these obstacles?

Join this interactive session to discuss:

  • Securing critical applications even in a state of compromise
  • Tactics for monitoring a sprawling attack surface
  • Leveraging new technologies to quantify threats

9:00am - 10:00am EDT Virtual Summit Boardroom

Is Identity and Access Enlightenment Possible?

Mat Mathews headshot

Mat Mathews

VP of Information Technology

Boys & Girls Clubs of America

Dan Webber headshot

Dan Webber

VP Technology

UST Global

Jake Randall headshot

Jake Randall

VP, CIAM and Workflows


 What would it mean for the world of business if an organization could fully and effortlessly manage the access of its users? Every enterprise requires safeguards to ensure that the right people are accessing the right systems and information, and finding that balance between agility and security is a unique challenge for any CISO. After so many years spent tackling this issue, has a new way forward revealed itself?

Join this session to discuss:

  • Prudent approaches to right-size the balance of security controls and agile access
  • Ways your peers discuss strategy for trust and access with other senior leaders
  • New technologies that are improving the world of IAM

9:00am - 10:00am EDT Virtual Summit Boardroom

Do You Speak Risk?

Mike Marsilio headshot

Mike Marsilio


Paradies Lagardere

Jonathan Commanday headshot

Jonathan Commanday

VP, Information Security

Cortland Partners

Added to the list of bona fides for today’s information security leader is a multilingual mandate for speaking the languages of risk. Business risk, legal risk and more all intertwine with an effective security strategy, yet the owners of each area don’t always see eye to eye. Where business units aren’t looking at risk the same way, an opportunity opens for malicious actors.

Join this session to discuss:

  • Successful examples of cross-functional partnerships in risk management
  • Metrics that effectively describe risk within, and outside of, security
  • Tips for leveraging risk discussions to gain support for security

10:00am - 10:45am EDT Virtual Summit Keynote

Taking Control in the Cloud

Koos Lodewijkx headshot

Koos Lodewijkx



Dean Mallis headshot

Dean Mallis



Are you challenged with uncontrolled costs and unknown risks from your adoption of cloud services? Concerned with whether your IaaS investments are endangering your security or compliance? Or perhaps you’re just watching your budget disappear seemingly on its own. You are not alone.

Join your peers for a discussion around:

  • Optimizing the cost of the cloud
  • Improving security, compliance and governance in cloud architectures
  • Leveraging the resources and controls you already have

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address:

10:45am - 11:00am EDT Break

11:00am - 12:00pm EDT Virtual Summit Boardroom

Leadership and the CISO

Jeffrey Gardner headshot

Jeffrey Gardner

Practice Advisor of Detection & Response


Thomas Dager headshot

Thomas Dager

Chief Information Security Officer


What is unique about CISO leadership? Information security executives must protect their organization from ever-present antagonists with one hand, and with the other, enable business outcomes. With mandates that often conflict and a mission that can never fail, it takes a special knack to thrive as a CISO. What have your peers learned that can help you grow as a leader?

Join this session to discuss:

  • Common challenges unique to leadership as a CISO
  • Leadership best practices for gaining influence across the organization
  • The measures of a truly exceptional CISO

11:00am - 12:00pm EDT Virtual Summit Boardroom

Rethink Vulnerability Management via Exposure Risk

Haggai Polak headshot

Haggai Polak

Chief Product Officer

Skybox Security

Bobby Alldread headshot

Bobby Alldread

Director – Global Security

Manhattan Associates

Tim Callahan headshot

Tim Callahan

Global Chief Security Officer


Chris Carrow headshot

Chris Carrow

Vice President | Mergers & Acquisitions Capability Manager

US Bank

With 18,341 new vulnerabilities discovered in 2020, every year there are more and more vectors of potential cyberattacks into your organization. Vulnerabilities are ‘gateways’ for cyber threat actors to exploit and leverage to break into your networks, move around laterally, exfiltrate sensitive data and even launch a ransomware attack.

Join Skybox Security where we will explore

  • What is needed to establish more effective vulnerability management programs
  • Eye-opening realities and trends regarding the expansion of vulnerabilities
  • Ways for you to eliminate exposure risk in the most effective and efficient way possible.

11:00am - 12:00pm EDT Virtual Summit Boardroom

Next-Gen Third Party Risk

John Dickson headshot

John Dickson

VP, IT Infrastructure & Cybersecurity

Republic National Distributing Company

Lane Sullivan headshot

Lane Sullivan

VP Information Technology and Deputy Chief Information Security Officer

Magellan Health

In this era of digital transformation, organizations rely heavily on their third parties, however, third-party relationships come with risks. To help mitigate those risks, CISOs must work closely with their partners to ensure security.

Join this session to discuss:

  • Strategies to establish a process for continuous assessment and monitoring of third parties
  • How to create an accurate inventory of all vendors within your ecosystem
  • What to do when your third party gets breached

12:00pm - 12:30pm EDT Networking

Meet the Speakers

Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Atlanta community. Plan to have a conversation around how you give back to the community, lend a hand to help others exceed or partner with non-profit organizations focused in cybersecurity. 

12:30pm - 2:00pm EDT Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues


Your Community Partners

Key Partners
Program Partners

Atlanta CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Alyssa Berry

Program Manager