IN-PERSON

Atlanta CISO Executive Summit

November 7, 2023 | The Westin Atlanta Perimeter North

November 7, 2023
The Westin Atlanta Perimeter North

Collaborate with your peers

Get together with Atlanta's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Quantifying the business's cyber-risk appetite and leveraging it to frame security investments

Enabling and protecting the business as technology and AI continue to evolve

Excelling amidst the increasing expectations of cybersecurity leaders

Atlanta CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Derek Benz

Coca-Cola Company
Chief Information Security Officer

Tim Callahan

Aflac
SVP, Global CISO

John Dickson

Colonial Pipeline
CISO

Meredith Harper

Synchrony Financial
Senior Vice President, Chief Information Security Officer

Bob Varnadoe

NCR
Global CISO

Stacy Hughes

Voya Financial
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Atlanta CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


November 6, 2023

November 7, 2023

6:00pm - 8:30pm  Governing Body Welcome Reception

Casino Night! — Governing Body Welcome Reception

Let's get ready to gamble! The Governing Body of Atlanta CISOs and invited guests are welcome to join us for a fun, interactive spin on the bi-annual Governing Body Welcome Reception. Casino Night will feature table games, food, and drinks on the eve of the Atlanta CISO Executive Summit. 

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

The Path to Inner Peace and Increased Productivity

Dr. Sheri Riley headshot

Dr. Sheri Riley

Empowerment Speaker, High Performance Life Coach

Award-Winning Author

Achieving optimal health and wellness requires more than drinking enough water and taking a certain number of steps each day. As a leader, your emotional and mental well-being is vital for success. Join guest speaker Dr. Sheri Riley, as she discusses the importance of personal development in achieving professional growth.

During this keynote, you'll discover powerful strategies to:

  • Boost your productivity by sharpening your focus
  • Overcome obstacles that are impeding progress
  • Fine-tune your vision for the future, so you can achieve even greater success

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Cybersecurity in the SEC’s Spotlight

Nabeel Cheema headshot

Nabeel Cheema

Special Counsel, Office of Rulemaking, Division of Corporation Finance

Securities and Exchange Commission

Kemper Seay headshot

Kemper Seay

VP Infrastructure & Chief Information Security Officer

Carter's

CISOs are facing an important task as they navigate the U.S. Securities and Exchange Commission's (SEC) recently adopted rule amendments designed to improve the disclosure of cybersecurity risk management, strategy, governance, and incidents by public companies. Questions are surfacing with the date of enforcement on the horizon.

Join representatives from the SEC Office to discuss:

  • Defining and assessing materiality of an incident and the timeline for incident disclosure
  • Disclosing processes for assessing, identifying and managing material risks from cybersecurity threats
  • Describing the board and management’s roles in overseeing cybersecurity risks

9:40am - 10:25am  Executive Boardroom

Break the Attack Chain — The Importance of Integrated Threat Protection

Brian Reed headshot

Brian Reed

Senior Director, Cybersecurity Strategy

Proofpoint

Fran Cioffi headshot

Fran Cioffi

CISO

Georgia-Pacific

Mike Frazee headshot

Mike Frazee

Chief Information Security Officer (CISO)

Lendlease

Organizations worldwide are being faced with multistage attacks such as BEC, ransomware, and supply chain, that happen with the same basic steps in the same sequence. It’s been a decade since defenders began referring to this as the attack chain, but the attacks continue to be successful with the same tactics; from phishing to Active Directory abuse to data exfiltration. So, how do we finally turn the tables on adversaries, and take away what they depend on across the attack chain?

Join this interactive round table as CISOs discuss:

  • Understanding the evolving nature of initial compromises
  • The art and science of preventing small compromises from becoming big incidents
  • Reducing your team's workload by using the attack chain to prioritize controls

9:40am - 10:25am  Executive Boardroom

Generative AI – The Key to Fast-Tracking Third-Party Risk Decisions

Gary Phipps headshot

Gary Phipps

VP, Strategy and Business Transformation

CyberGRX

Monique Hart headshot

Monique Hart

CISO, VP of Information Security

Piedmont Healthcare

Jason Maddox headshot

Jason Maddox

Director of IT and CISO

Roark Capital Group

Time is critical in third-party risk decisions and security teams face a balancing act in conducting proper vendor due diligence without being perceived as the impediment to the speed of business. Data is critical to these risk conversations and the time has come to combine generative AI and third-party risk to enhance insights from third-party risk assessments and intelligence to accelerate vendor decisions.

Join this session to discuss the potential of generative AI to:

  • Revolutionize the speed at which teams extract insights
  • Improve efficiency, decision-making and reducing resources required for assessments and discuss a real-world use case
  • Address challenges in the third-party risk lifecycle

10:25am - 11:00am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:00am - 11:45am  Breakout Session

Cut Through the Noise - Protect Against Emerging Threat Vectors That Matter

Anthony (Tony) Lauro headshot

Anthony (Tony) Lauro

Director, Security Technology and Strategy

Akamai Technologies

Organizations face an infinite number of potential threats as they pursue digital transformations and criminals evolve their attack techniques. While there are certain threats – malware, phishing, credential abuse, etc - that remain top trends year after year, there are always new threat vectors emerging. Since even the most well-funded organizations cannot address all threats, how can CISOs differentiate between what is emerging and dangerous and what is overhyped and a distraction?

Join this session to discuss:

  • Analyzing today’s emerging threat vectors to determine relevance and urgency
  • Contextualizing new threats within your detection and response protocols
  • Adapting API, applications, and workload security strategies in evolving digital environments

11:00am - 11:45am  Executive Boardroom

The CISO as a Savvy Board Communicator

Kevin Gowen headshot

Kevin Gowen

CISO

Synovus Financial

Brian Phillips headshot

Brian Phillips

VP, Information Security

Macy's

Matt Durant headshot

Matt Durant

Director of IT Security and Risk Management

BlueLinx

Translating the organization's cybersecurity posture to the board can be a catalyst in improving organizational resilience and building strong rapport. How do you communicate security initiatives clearly when the stakes are high?

Join this session to discuss:

  • Leveraging your expertise to build trust
  • Demystifying cybersecurity spending
  • Translating cybersecurity into actionable language

11:00am - 11:45am  Executive Boardroom

The Power of Security Operations

Irene Thong headshot

Irene Thong

Senior Director, IT and Project Management - CIO/CISO

Printpack

Chayan Chakravarti headshot

Chayan Chakravarti

Business Information Security Officer

Equifax

Ed Harris headshot

Ed Harris

Global Director of Information Security

Mauser Packaging Solutions

Sure, your SOC’s strength is the make-or-break factor when it comes to threat detection, but that’s simply the beginning. With the right security operations culture, you can increase efficiencies and drive the business forward.

Join this boardroom discussion for:

  • An interactive conversation on winning security operations strategies
  • A chance to measure your security operations program against those of your peers
  • A proactive approach to keeping your business ahead of the curve and risk free

11:45am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Accelerate Secure Digital Transformation with AI/ML and Zero Trust Architecture

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Bob Varnadoe headshot

Bob Varnadoe

Global CISO

NCR

DJ Goldsworthy headshot

DJ Goldsworthy

VP, Security Operations and Threat Management

Aflac

New, special demands constantly arise for decision-makers who steer the fortunes of companies. Recently, business success has become linked to IT infrastructure. Seamless and secure connectivity is the key to unlocking innovation and accelerating business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture augmented by AI/ML capabilities, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • How AI/ML adds defensive and business analytics capabilities that have the power to turn IT into the engine propelling business success forward

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Buzzers Over Buzzwords

Michael Brainard headshot

Michael Brainard

Head of Information Security

S.P. Richards Company

What's the Atlanta CISO community's top priority? What do your C-Level peers consider the largest hurdle when it comes to accomplishing their goals? In this fun, highly-interactive, game-show-style session, we'll put your knowledge to the test. 

Come on down to:

  • Compete in a data-driven, community-specific quiz game
  • Learn more about the struggles and opportunities reported by members of your governing body
  • Share and expand on these reported goals and challenges


1:30pm - 2:15pm  Executive Boardroom

Achieving More With Less – A CISO Balancing Act

Carl Scaffidi headshot

Carl Scaffidi

CISO

Vystar Credit Union

Whitfield Samuel headshot

Whitfield Samuel

CISO

Georgia State University

Jim Montgomery headshot

Jim Montgomery

VP & CISO

BrandSafway

Security functions are being tasked with achieving greater outcomes with the same or fewer resources — from budgets to headcount. How can CISOs ensure security posture isn’t impacted by a lack of resources?

Join this session to discuss:

  • Challenges in scaling at the pace of the business
  • Strategies to allocate tools and resources effectively
  • Methods to communicate the business value of security investment

1:30pm - 2:15pm  Executive Boardroom

Gaining Confidence in Data Security Compliance

Stacy Hughes headshot

Stacy Hughes

CISO

Voya Financial

James Baird headshot

James Baird

VP Information Security & CISO

FOCUS Brands

As digital transformation unfolds, the volume of data generated by businesses and the need for data security grows exponentially. However, complex environments make securing data (and proving it) a challenge for CISOs navigating a myriad of compliance regulations and industry standards.

Join this session to discuss:

  • Gaining data visibility as a foundation for data governance
  • Managing the evolving landscape of laws, regulations, and industry standards around data security
  • Working with the right tools and teams across a shared responsibility model to ensure compliance

2:15pm - 2:50pm  Networking Break

2:20pm - 2:45pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:35pm  Breakout Session

Third-Party Risk – From Back Seat to Drivers Seat

Phani Dasari headshot

Phani Dasari

CISO

Hinduja Global Solutions

Third party partners are instrumental in maintaining the speed of business operations. How can CISOs continue to protect the business’ overall security posture without hitting the brakes when it comes to third-party risk?

Join this session to discuss:

  • Keeping up with the pace of the business
  • Taking a business-first approach to third-party risk decisions 
  • Collaborating with cross-functional leaders on shared objectives


2:50pm - 3:35pm  Executive Boardroom

Up Your Cloud Game

Robbie Hudec headshot

Robbie Hudec

CISO & SR VP Technology Operations

CIOX Health

Jim Miles headshot

Jim Miles

VP of Security Operations

Amerisave

As the cloud landscape continues to evolve, so too should the strategies CISOs develop in order to remain secure. The seismic changes of cloud migration, and ultimately cloud maturity, can be difficult to manage, but the CISOs who transition effectively will find their organizations more agile and secure.

During this peer-discussion you will explore:

  • Strategies to guide your organization's cloud priorities
  • Connecting a “cloud right” strategy to business value
  • Setting realistic goals to achieve cloud maturity

2:50pm - 3:35pm  Executive Boardroom

From “No” to “Know-How” – Enabling a Collaborative and Secure Environment

Tamika Bass headshot

Tamika Bass

Cybersecurity Technology Director

Gannett Fleming

Michael Owens headshot

Michael Owens

BISO

Equifax

The security function and the word ‘no’ have become synonymous over time. Although security leaders are being called on to be stronger business enablers, there are still instances where ‘no’ or ‘not yet’ are the safest approach. How do you effectively communicate in these situations without compromising a collective and innovative culture?

Join this session to discuss:

  • Communicating an unpopular, yet informed, decision clearly
  • Managing stakeholder expectations of cybersecurity concerns
  • Gaining buy-in through education and fostering a “team sport” mindset  

3:35pm - 4:00pm  Break

4:00pm - 4:35pm  Keynote

What Mission-Driven Security Looks Like

Ngozi Eze headshot

Ngozi Eze

Chief Information Security Officer

Levi Strauss & Co.

Roland Cloutier headshot

Roland Cloutier

Business Security Thought Leader, Board Member, Author

Guest Speaker

In order to move security at the pace of the business, CISOs must endorse what the business drives to market: the mission and strategy. Adopting shared values can enable them to be stronger partners, communicators, and defenders of the business.

Join this fireside chat with Ngozi Eze, CISO at Levi Strauss, and Roland Cloutier, Security Thought Leader, Board Member and Author, to explore:

  • Aligning security objectives with enterprise objectives to be impactful in the mission space
  • Leaning on company values through growth and change and leveraging shared goals to communicate security as a team sport
  • Leading the business of security; embracing the responsibility, accountability and opportunity

4:35pm - 5:00pm  Closing Reception & Prize Drawing

November 6, 2023

November 7, 2023

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

The Westin Atlanta Perimeter North
MORE INFORMATION

A block of rooms has been reserved at the The Westin Atlanta Perimeter North at a reduced conference rate. Reservations should be made online or by calling 770-395-3902.

Deadline to book using the discounted room rate of $189 USD (plus tax) is October 16, 2023.

Your Community Partners


Global Thought Leader
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Kimberly Lewis

Community Program Manager

9723450198

kimberly.lewis@evanta.com