IN-PERSON

Atlanta CISO Executive Summit

November 19, 2024 | Westin Atlanta Perimeter North

November 19, 2024
Westin Atlanta Perimeter North

Collaborate with your peers

Get together with Atlanta's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Maximizing organizational security and efficiency with proven strategies for cyber executives

Balancing the dangers and benefits of AI innovation in an ethical way

Facilitating secure decision-making with outcome-driven metrics

Atlanta CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Derek Benz

The Coca-Cola Company
Chief Information Security Officer

Tim Callahan

Aflac
SVP, Global CISO

John Dickson

Colonial Pipeline
VP, Chief Information Security Officer

Meredith Harper

Synchrony Financial
Senior Vice President, Chief Information Security Officer

Stacy Hughes

ABM
CISO

Bob Varnadoe

NCR
Global CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Atlanta CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


November 19, 2024

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Telling Your Data Story

Scott Taylor headshot

Scott Taylor

Author, Telling Your Data Story

Guest Speaker

The way we talk about data—and its security—is holding the industry back, so it’s time to rework your “data speak.” Are you struggling with leadership support, craving stakeholder engagement, and begging for proper funding? Even though you may create Gen AI wonders with your data, it won’t matter unless you explain the value in practical business terms.

Join The Data Whisperer’s rollicking and riotous review of current buzzwords, with added insights on the role that cloud security, user access, and risk management play in your data narrative. Learn practical tips to secure sponsorship and align your efforts with business goals, including:

  • Differentiating between a data management narrative and other data storytelling and data literacy efforts
  • Developing strategies to secure sponsorship and funding while ensuring data security
  • Executing a simple storytelling approach that integrates security and risk management into your data story

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Hybrid Enterprise— Hybrid Attackers

Mark Wojtasiak headshot

Mark Wojtasiak

VP of Strategy and Research

Vectra AI

Hybrid attackers are making traditional threat detection and response methods ineffective, damaging SOC confidence. To defend against hybrid attacks, we need to change our approach and focus on building SOC confidence and competence.

Join this session to explore:

  • Rethinking threat detection
  • Improving SOC resilience
  • Resiliency through organization security

9:40am - 10:25am  Executive Boardroom

Governing Generative AI in your Organization

Anthony Scarfe headshot

Anthony Scarfe

Deputy CISO

Elastic

Jason Maddox headshot

Jason Maddox

Director of Information Technology & Chief Information Security Officer

Roark Capital Group

Brian Powers headshot

Brian Powers

VP, Information Technology and Security

Cumulus Media

Kemper Seay headshot

Kemper Seay

VP Infrastructure & Chief Information Security Officer

Carter's

Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?

Join this interactive roundtable to explore:

  • What to expect from the threat landscape as generative AI becomes increasingly normalized
  • What adopting generative AI does to your attack surface, and if you should even allow it
  • How to implement governance rules that your organization will follow

9:40am - 10:25am  Executive Boardroom

Rethinking the Relationship Between Cybersecurity Teams and the People They Protect

Brian Reed headshot

Brian Reed

Senior Director, Cybersecurity Strategy

Proofpoint

Brian Phillips headshot

Brian Phillips

VP, Information Security

Macy's

Ray Griffin headshot

Ray Griffin

CISO and Head of Cyber Security

Cox Media Group

You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?

Join this session for a fresh perspective on:

  • Moving security alerts from the SOC to where users work
  • Protecting end users perception of security controls
  • Transforming security teams’ interactions with end users

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Balancing Innovation & Governance in AI Initiatives

Klint Walker headshot

Klint Walker

Senior Cyber Security Advisor

Cybersecurity and Infrastructure Security Agency

Keyaan Williams headshot

Keyaan Williams

Board Member & Adjunct Professor

CISOs are exploring how innovative AI tools can transform internal processes, delight users and impact the bottom line. The challenge is in ensuring each initiative follows a right-sized governance framework, is aligned to the company’s mission and impacts organizational goals. How are leaders driving this process vigor around AI? 

Join this session to learn:

  • How AI tools can enhance employee support and streamline tasks
  • Strategies for balancing innovation and governance
  • AI’s impact on business performance and ROI

11:05am - 11:50am  Executive Boardroom

Patch Perfect -- Mastering Vulnerability Management for a Safer Cyber World

Patrick Long headshot

Patrick Long

Sr Principal Analyst

Gartner

Darryl Defendorf headshot

Darryl Defendorf

Chief Information Security Officer

Marshall Health Network

Pete Statia headshot

Pete Statia

Director, Information Security & Compliance

Saia

Gartner Research emphasizes that effective vulnerability management is critical to reducing the attack surface and improving cybersecurity resilience. By leveraging automation, real-time threat intelligence, and a risk-based approach, organizations can prioritize and address vulnerabilities more efficiently. 

Join this Gartner Info Series for:

  • Automation and intelligence solutions to prioritize and address vulnerabilities based on risk
  • Continuous scanning and remediation processes to maintain a strong security posture
  • Integration with risk management to optimize resources and improve overall resilience

11:05am - 11:50am  Executive Boardroom

The Dark Side of Gen AI

James Baird headshot

James Baird

VP Information Security & CISO

GoToFoods

Leo Howell headshot

Leo Howell

VP, Technology & CIO

Georgia Tech

Trey Tunnell headshot

Trey Tunnell

CISO

Floor & Decor

Monique Hart headshot

Monique Hart

CISO, VP of Information Security

Piedmont Healthcare

Generative AI is changing the way software is developed and is already a part of every developer's life. However, there is a dark side to using GenAI when it comes to security. What are the upcoming risks of using GenAI solutions and what has been done about them? 

Join this session to discuss: 

  • Your security exposure and risks based on your GenAI use
  • New types of manufacturing attacks 
  • Prompt-injection attacks and how to minimize your risk

11:50am - 12:30pm  Networking

Breaking Barriers in Cybersecurity

Stacy Hughes headshot

Stacy Hughes

CISO

ABM

Female, non-binary and allied cyber leaders are invited to eat lunch in our reserved networking space. Hosted by Stacy Hughes, SVP & CISO at ABM, those in attendance can freely discuss best practices, key challenges, and mission-critical priorities before heading over to the midday keynote. 

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Transforming Application and Service Delivery for the Modern Security Environment

Eric Appel headshot

Eric Appel

Global GTM Strategy Officer

Island

Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organization.

In this session, we will discuss:

  • Revolutionizing workspaces by balancing productivity, security, availability and user experience
  • How quickly new technologies like the enterprise browser can be adopted to provide a competitive advantage
  • Strategies for reducing the effort required to deliver applications and enhance organizational operations

 

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Security Practices and Priorities With Your Peers

Josh Landuyt headshot

Josh Landuyt

Senior Director, Information Security

Cracker Barrel Old Country Store

Mike Marsilio headshot

Mike Marsilio

CISO

Paradies Lagardere

Security practitioners are humans and so are their users. But it's also a security practitioner's job to enable the business, wearing multiple hats to successfully secure the organization. How do CISOs prioritize properly to ensure that security and useability become that much easier -- for all parties involved? 

Join this interactive session to:

  • Collaborate with your peers to validate best practices and priorities
  • Discuss advantages and expected challenges of adopting new tech 
  • Analyze case studies and methodologies to identify successful outcomes 

1:35pm - 2:20pm  Executive Boardroom

Establishing Cyber Resilience Across the Cloud

Robert Andriulli headshot

Robert Andriulli

CISO

Mativ

Clarissa Banks headshot

Clarissa Banks

CISO

Deluxe

Sulohita Vaddadi headshot

Sulohita Vaddadi

CISO

GE Aerospace

In an era where users are ubiquitous and digital operations sit in the cloud and beyond, it’s key to move beyond a foundational security approach and focus on achieving true cyber resilience. The task involves navigating complexity, upholding visibility and control to ensure uninterrupted operations despite cyber threats.

Join this session to explore:

  • Enhancing security and cost-effectiveness across diverse cloud environments
  • Leveraging AI innovations while addressing global regulatory and data privacy standards
  • Sharing best practices for implementing effective cloud best practices across a global footprint

1:35pm - 2:20pm  Executive Boardroom

Managing Threat Exposure -- Building a Strategic Roadmap to Success

Armghan Malik headshot

Armghan Malik

Sr Manager Global Cybersecurity Services

Graphic Packaging

Will DeMar headshot

Will DeMar

CISO

Mandarin Oriental

Irene Thong headshot

Irene Thong

Senior Director, IT and Project Management - CIO/CISO

Printpack

With the recent NIST 2.0 Regulatory Landscape update, it helps to identify the inflection points that security and risk management leaders can leverage to reduce threat exposure risk and create better working relationships. The evolution of exposure management over the next three to five years will be imperative to how it is implemented, and implemented well. 

Join this session to explore: 

  • Benefits of implementing a continuous threat exposure management (CTEM) program
  • Recommendations for CISOs establishing enhancing exposure management
  • Priorities and migration plans to evolve into the next stage of the CTEM framework

1:35pm - 2:20pm  Breakout Session

The Art and Science of Using AI to Make Data Security Easy

Jason Clark headshot

Jason Clark

Chief Strategy Officer

Cyera

Pete Chronis headshot

Pete Chronis

Former EVP & CISO

Paramount

As leaders you’re being asked to find ways to securely enable your business to use data to drive innovation - and become a data master. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used. This interactive discussion will cover the challenges and solutions CISOs and CIOs use to discover their data attack surface, monitor, detect and respond to data threats - including the scope of breach identification - and ensure data compliance.

Join this session to discuss:

  • Gaining data visibility as a foundation for data governance
  • Managing the evolving landscape of laws, regulations, and industry standards around data security
  • Working with the right tools and teams across a shared responsibility model to ensure compliance

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:00pm  Break

3:00pm - 3:45pm  Breakout Session

Shaping the Future -- The Next GENeration

Jonathan Hay headshot

Jonathan Hay

VP, Information Security

AmWINS Group

The growing complexity of cyber threats makes developing a skilled cybersecurity workforce more critical than ever. Now is the time to focus on how organizations can build and strengthen their talent pipeline through skills development, partnerships, and diversity initiatives. 

Join this session to uncover:

  • Effective strategies for developing and upskilling cybersecurity talent within organizations
  • How to partner with educational institutions and industry to create a pipeline of future cyber professionals
  • The importance of diversity and inclusion in building a resilient and innovative workforce

3:00pm - 3:45pm  Executive Boardroom

Security Operations — Navigating a Moving Target

Rob Ferrill headshot

Rob Ferrill

AVP, CISO

University of Alabama at Birmingham

Caroline Saxon headshot

Caroline Saxon

Head of Compliance

Stream Data Centers

Keith Weller headshot

Keith Weller

CISO

ANDMORE

Many security operations (SecOps) programs focus on tooling and existing processes to identify new, critical threat activity. However, many of the true unknowns are left missing. How can CISOs enable SecOps performance in today's sophisticated and ever-evolving threat landscape?

Join this session to discuss:

  • Enabling SecOps through change and disruption
  • Working within resource constraints without compromising security posture
  • Elevating threat detection to drive SecOps efficiency

3:00pm - 3:45pm  Executive Boardroom

Assessment to Action — Enhancing Third-Party Risk Management

Kevin Clark headshot

Kevin Clark

CISO

Rollins

Fran Cioffi headshot

Fran Cioffi

CISO

Georgia-Pacific

Matt Durant headshot

Matt Durant

Director of IT Security and Risk Management

BlueLinx

You won’t luck your way into safe and successful third-party relationships. But by thoughtfully developing a cadence of third-party risk identification, assessment and mitigation, CISOs can work to safeguard their own operations, protect key data, prevent reputational damage, avoid financial losses and bring peace to stakeholders.

Join your CISO peers to: 

  • Develop new risk-aware relationships, or perfect existing ones
  • Share and gather insights on a growing network of third parties
  • Confirm the importance of a well-developed third-party risk management plan

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

Repeatability and Scalability in the Age of Outcome Driven Metrics

Patrick Long headshot

Patrick Long

Sr Principal Analyst

Gartner

Outcome-driven metrics can be a useful tool for cybersecurity governance and advancing cybersecurity maturity. Security leaders need to evolve their approach to cybersecurity metrics to be more aligned with the business rather than doing cybersecurity for the sake of cybersecurity.

Join this keynote with Gartner analyst Patrick Long to learn how CISOs can:

  • Rationalize traditional, operational metrics with the outcome-driven metrics approach
  • Define a level of cybersecurity that's defensible with key stakeholders
  • Find synergy and a better way to show the business value of cybersecurity



5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

November 19, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Westin Atlanta Perimeter North
MORE INFORMATION

A block of rooms has been reserved at the Westin Atlanta Perimeter North at a reduced conference rate. Reservations should be made online or by calling 770.395.3900. Please mention Evanta CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $199 USD (plus tax) is October 28, 2024.

Your Community Partners


Global Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Kimberly Lewis

Community Program Manager

9723450198

kimberly.lewis@evanta.com