IN-PERSON

Atlanta CISO Executive Summit

June 13, 2024 | Westin Atlanta Perimeter North

June 13, 2024
Westin Atlanta Perimeter North

Collaborate with your peers

Get together with Atlanta's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Cultivating influence as a business-savvy CISO amid rising expectations

Assessing and communicating risk posture amid increasing regulatory and liability scrutiny

Securing AI adoption across the enterprise to enable growth and innovation

Atlanta CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Derek Benz

The Coca-Cola Company
Chief Information Security Officer

Tim Callahan

Aflac
SVP, Global CISO

John Dickson

Colonial Pipeline
VP, Chief Information Security Officer

Meredith Harper

Synchrony Financial
Senior Vice President, Chief Information Security Officer

Bob Varnadoe

NCR
Global CISO

Stacy Hughes

ABM
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Atlanta CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 12, 2024

June 13, 2024

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception at Del Frisco's Steakhouse

Join the Atlanta CISO Governing Body on the eve of the Executive Summit for an evening of peer networking and dinner at Del Frisco's Steakhouse.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

"Those who tell the stories rule society." (Plato) Busy executives don’t have time to learn complex communication models or esoteric storytelling processes — you need a simple, effective framework that can help you not only connect with any audience, but also elicit real change. Enter the SWARM Effect.

Join this session with Arthur Zards — an expert on storytelling, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling”

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

A United Front – Bridging Gaps with Your CIO

Harold Shannon headshot

Harold Shannon

VP, Technology and CIO

CoreCivic

Mike Marsilio headshot

Mike Marsilio

CISO

Paradies Lagardere

Establishing security as a team sport can be a challenge when key players have competing priorities, so security leaders and CIOs must find common ground to achieve the same goal – to securely enable the business.
 
Join this session to hear insight on:

  • Considering and understanding varied priorities and perspectives
  • Establishing a shared agenda and adopting a ‘team mindset’
  • Building trust and fostering partnership through communication

9:40am - 10:25am  Breakout Session

Unlocking Full Cloud Potential — Security Enhancements for Today’s Enterprise

Corey Elinburg headshot

Corey Elinburg

Sr. Vice President and Chief Information Security Officer

CommonSpirit Health

Bradon Rogers headshot

Bradon Rogers

Global Head of Customer Experience

Island

While the vast majority of infrastructure has been upgraded and modernized to secure the shift to the cloud, enterprise IT teams are still missing an equally seamless access method to safely deliver those now cloud-native apps and data. While traditional browsers have become the de facto access point for the majority of business critical applications, they lack the deep inspection capabilities and hyper-granular security controls enterprises need. This results in security teams surrounding their browsers with layers of tech to meet those needs.

Join this breakout session to discover:

  • Why traditional cloud security methods undermine your modernization efforts and end-user experience
  • Embracing technological momentum to adapt to a "more-with-less" security landscape
  • How enterprise CISOs are using this solution to bolster cloud security

9:40am - 10:25am  Executive Boardroom

Threat Intelligence and Third-Party Risk ― Doubling Down on Critical Vulnerabilities

Austin Starowicz headshot

Austin Starowicz

Director, Solutions Consulting

RiskRecon - A MasterCard Company

Tamika Bass headshot

Tamika Bass

Cybersecurity Director

Gannett Fleming

Irene Thong headshot

Irene Thong

Senior Director, IT and Project Management - CIO/CISO

Printpack

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). 

To reserve your seat, please contact: Kimberly Lewis at kimberly.lewis@evanta.com 

9:40am - 10:25am  Executive Boardroom

From Z to A — Extending Zero Trust to APIs

Sean Flynn headshot

Sean Flynn

Director, Security Technology and Strategy

Akamai Technologies

Matt Moore headshot

Matt Moore

Information Security Director and BISO

IHG

Ravi Pentapaty headshot

Ravi Pentapaty

CISO

Cardlytics

As more and more organizations adopt a Zero Trust architecture (ZTA), many initiatives overlook the increased prevalence of API-based access to sensitive application functionality and data. As CISOs move forward in their ZTA journey, how can they extend these principles to their API strategy to ensure security from the network layer to the application layer?

Join this session to discuss:

  • Breaking the kill chain by stopping infection vectors and protecting against lateral movement
  • Shielding sensitive data and limiting how APIs interact with data
  • Increasing real-time visibility across the business to mitigate threats

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). 

To reserve your seat, please contact: Kimberly Lewis at kimberly.lewis@evanta.com 

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Lessons Only a Breach Can Teach in Resiliency

John Gift headshot

John Gift

Chief Information Security Officer

WestRock

Cybersecurity incidents are not an 'if' but a 'when' even for organizations with mature programs. From initial alert to remediation, there's an opportunity in every incident to emerge stronger, more resilient.
 
Join this session led by John Gift, CISO at Westrock, to understand:

  • Embracing a mindset shift from crisis to opportunity
  • Engaging and communicating with key partners and stakeholders
  • Enabling security and business operations to move forward through turbulence

11:05am - 11:50am  Breakout Session

Endpoint, Cloud and the Board — Identifying Risk that Matters

Richard Seiersen headshot

Richard Seiersen

Chief Risk Technology Officer

Qualys

Prioritizing and eliminating the cyber risks that matter most is the ultimate goal of security leaders. But how do you validate that your efforts are hitting the mark? It all comes down to well-crafted measurements: metrics that are reliable and easily understood by all stakeholders across the business.

In this session, we will discuss:

  • Cybersecurity risk assessment essentials and which risks truly carry weight
  • Concrete approaches to determine effectiveness of security capabilities
  • Creating simple "metric cards" to communicate across stakeholders

11:05am - 11:50am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

David May headshot

David May

Senior Solutions Architect

Expel

Ray Griffin headshot

Ray Griffin

CISO and Head of Cyber Security

Cox Media Group

Carl Scaffidi headshot

Carl Scaffidi

CISO

Vystar Credit Union

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). 

To reserve your seat, please contact: Kimberly Lewis at kimberly.lewis@evanta.com 

11:05am - 11:50am  Executive Boardroom

Generative AI — Should CISOs be Guardians or Gatekeepers?

Arian Massoudi headshot

Arian Massoudi

Director of Solutions Engineering

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

Kevin Morrison headshot

Kevin Morrison

VP, CISO

Driven Brands

Murtaza Nisar headshot

Murtaza Nisar

Chief Information Security Officer

Clario

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). 

To reserve your seat, please contact: Kimberly Lewis at kimberly.lewis@evanta.com 

11:50am - 12:25pm  Networking

Rising Together — Empowered Women, Empower Women

Katie Ewers headshot

Katie Ewers

Director of Cybersecurity

McKesson

Join this dedicated networking session for women in cybersecurity leadership roles and their allies to freely discuss best practices, key challenges and mission-critical priorities. Come prepared to share ideas and forge new connections that can help empower each other to make an impact in your organizations and the greater Atlanta area.

This session is aimed at, but not limited to, women who are leading the cybersecurity function at their organizations (CISO or equivalent) and those reporting directly to the CISO/equivalent. Priority access will be reserved to these groups.

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Optimizing for Agility — Network and Security Convergence

Steve Riley headshot

Steve Riley

VP & Field CTO

Netskope

Integrating a complex ecosystem across all security areas can optimize defenses without simplifying adversaries’ challenges. This approach balances robust security with efficiency, crucial for navigating generative AI and tech advancements. Achieving this requires strategic selection and consolidation of platforms to enhance agility, reduce risk, and maintain cost-effectiveness.

In this session, you’ll learn:

  • The composition of an effective security architecture
  • Value you can derive from a converged networking and security platform
  • Common consolidation mistakes people make and how to avoid them

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Workshop — CISO Hot Topics & Industry Small Groups

Kevin Clark headshot

Kevin Clark

CISO

Rollins

Robbie Hudec headshot

Robbie Hudec

VP-IT M&A and Technology Integration

Rollins

As the spotlight on security grows, so does the opportunity for CISOs to collaborate and share best practices across industries to remain secure and informed against today's sophisticated threat actors.

Join this interactive session to:

  • Engage with like-minded CISO peers on shared priorities
  • Validate strategies and uncover new ways of thinking
  • Hear proven best practices across industries

1:35pm - 2:20pm  Breakout Session

The Forgotten Last Layer of Securing Digital Transformation

Poornima DeBolle headshot

Poornima DeBolle

Co-Founder and CTO

Menlo Security

In an age of ever-evolving security threats and hybrid work environments, browser security has become a critical pillar in securing the business' most valuable assets and enabling a secure user experience.

Join this session to explore cases studies on:

  • Closing the browser security gap to improve security posture
  • Getting ahead of browser-enabled zero-day threats
  • Navigating and identifying the business impact of browser security adoption

1:35pm - 2:20pm  Executive Boardroom

Prioritizing Vulnerabilities Like an Attacker

Julian Waits headshot

Julian Waits

SVP Corporate Development and Strategic Alliances

Rapid7

Scott Stanton headshot

Scott Stanton

BISO & Director, Cybersecurity Threat & Vulnerability Management

Owens & Minor Inc

Ben Leggett headshot

Ben Leggett

Director of IT Operations

Benevis

It's an all-too-familiar scenario: Thousands of vulnerabilities are identified across your hybrid ecosystem. How do you identify and prioritize remediation for the vulnerabilities most likely to exploit your cloud and on-prem environments? 

Join this session to discuss:

  • Prioritizing actively exploited vulnerabilities
  • Measuring the value of a vulnerability to an attacker
  • Communicating risk posture cross-functionally

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). 

To reserve your seat, please contact: Kimberly Lewis at kimberly.lewis@evanta.com 

1:35pm - 2:20pm  Executive Boardroom

Bridging the Gap — Interpreting Tech Speak to Exec Speak

Kaden Douglas headshot

Kaden Douglas

Sr. Director of IT GRC, Identity & Access Management

Pluralsight

Gretchen Hiley headshot

Gretchen Hiley

CISO

Randstad North America

Ray Strubinger headshot

Ray Strubinger

NA CISO

TK Elevator

In the rapidly evolving landscape of security, CISOs must be able to effectively translate complex technical concepts into strategic business language. These skills are necessary to communicate the value of security initiatives in terms that resonate with executive stakeholders and contribute to informed decision-making processes.

Join this conversation to find out more on:

  • Strategies for effective communication
  • Understanding executive priorities and translating security value
  • Building a common language and storytelling through data

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). 

To reserve your seat, please contact: Kimberly Lewis at kimberly.lewis@evanta.com 

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

A New Era of Liability for CISOs

Stacy Hughes headshot

Stacy Hughes

CISO

ABM

Laura Levin headshot

Laura Levin

Vice President, Claims Counsel

CAC Specialty

Phyllis Sumner headshot

Phyllis Sumner

Partner and Chief Privacy Officer

King and Spalding

CISOs are accustomed to answering for the business when security programs fall victim to attack. However, recent personal legal scrutiny of CISOs has set a precedent, stirred up concern and left security leaders questioning their protection.

Join this panel discussion to uncover:

  • Resources to prepare for increased scrutiny and potential liability
  • Best practices to proactively protect personal assets and reputation
  • Keys to communicate of the state of security practices to stakeholders

3:00pm - 3:45pm  Executive Boardroom

Cybersecurity at Scale — Best of Breed vs. Standardization

Craig Burns headshot

Craig Burns

SOC Transformation Leader

Palo Alto Networks

Tera Ladner headshot

Tera Ladner

Global Practice Lead and VP, Information Risk Management and Governance

Aflac

For over a decade, security leaders and architects utilized a disparate best of breed point solution framework to solve their security challenges. This resulted in bloated security architectures, overlap in capabilities and significant security architecture and integration failures. These failures impacted organization’s ability to scale to meet business demands and reduced stability of the security architecture as environments and data volumes grew. The use of AI driven detections, automation, endpoint security, attack surface management and real-time threat intelligence application were the moonshot achievements for security solutions like SIEM, but were never achieved.

Join this session to discuss:

  • Scaling to meet business demands and stabilizing your security architecture
  • Reimagining organizational security operations programs based on standardization
  • Achieving the impossible with security information and event management

3:00pm - 3:45pm  Executive Boardroom

Data Security as a Business Driver

Zak Pellecchia headshot

Zak Pellecchia

Head of Solutions Engineering for Americas & SME Cloud Cyber Security

Fortanix

John Dickson headshot

John Dickson

VP, Chief Information Security Officer

Colonial Pipeline

Bob Jett headshot

Bob Jett

Global Data Privacy Officer

Bunge

Kenneth Viciana headshot

Kenneth Viciana

VP, Global Data & Analytics Products

TSYS

Sensitive data is everywhere – from mobile apps to medical devices. CISOs must remain informed on the use of data throughout the pipeline to securely enable the business.

During this peer-led discussion you will explore:

  • Gaining visibility and securing sensitive data in all its states
  • Identifying and communicating the impact of data security on the business
  • Leveraging data security as a team sport

3:00pm - 3:45pm  Executive Boardroom

CISO Role Evolution — How Are You Adapting?

Phani Dasari headshot

Phani Dasari

CISO

Hinduja Global Solutions

Mike Frazee headshot

Mike Frazee

Chief Information Security Officer (CISO)

Lendlease

Joshua Harshbarger headshot

Joshua Harshbarger

Executive Director of Information Security

RaceTrac, Inc.

Being a well-rounded CISO can’t be hacked. It takes consistent reflection and re-invention as the role evolves from a solely technology-focused position to a business-enabling one.

Join this peer-led boardroom to discuss: 

  • Embracing the evolving demands of the CISO role
  • Building trust and influence amongst C-Suite peers and key stakeholders
  • Demonstrating your value as a proven leader and business-enabler

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

Getting on the Board — #LifeAfterCISO Live Podcast

Jerry Perullo headshot

Jerry Perullo

Founder, Former CISO, ICE/NYSE Professor of the Practice, Georgia Tech

Guest Speaker

You've spent a majority of your career in information security, climbing your way to the top – and you're likely considering what's next. With boardroom cyber expertise requirements rumored by the SEC, board membership has become an attractive next step for many security leaders. But what does it truly take to be a board-ready CISO?

Attend this keynote to gain valuable insights on:

  • The hidden concerns Boards have about CISOs
  • The influence of regulatory trends on Board composition
  • Steps for Board service that enhance your value as a sitting CISO

4:45pm - 5:00pm  Closing Comments and Prize Drawing

June 12, 2024

June 13, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Westin Atlanta Perimeter North
MORE INFORMATION

A block of rooms has been reserved at the Westin Atlanta Perimeter North at a reduced conference rate. Reservations should be made online or by calling (770) 395-3900.

Deadline to book using the discounted room rate of $199 USD (plus tax) is May 20, 2024.

Your Community Partners


Global Thought Leader
CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Kimberly Lewis

Community Program Manager

9723450198

kimberly.lewis@evanta.com