IN-PERSON

Atlanta CISO Executive Summit

June 5, 2025 | Westin Atlanta Perimeter North

June 5, 2025
Westin Atlanta Perimeter North

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Atlanta's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Harnessing data to drive innovation, improve decision making, and enhance operational efficiency

Balancing security with innovative strategies to drive leadership while safeguarding digital assets

Delivering secure, seamless interactions built on trust and strong data governance

Atlanta CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Derek Benz

The Coca-Cola Company
CISO

Tim Callahan

Aflac
SVP & Global CISO

John Dickson

Colonial Pipeline
VP & CISO

Meredith Harper

Synchrony Financial
SVP & CISO

Stacy Hughes

ABM
SVP & CISO

Bob Varnadoe

Kaiser Permanente
VP, Technology Risk Management

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Atlanta CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 5, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Cyber Resiliency — A CISO's Superpower for Defeating Digital Adversaries

Jamil Farshchi headshot

Jamil Farshchi

EVP, CISO & Chief Technology Officer

Equifax

Meredith Harper headshot

Meredith Harper

SVP & CISO

Synchrony Financial

In today's dynamic digital landscape, CISOs must prioritize cyber resiliency, while distinguishing between disaster recovery and business continuity. By adopting a forward-thinking approach and focusing on people resiliency, CISOs can build resilient frameworks to navigate current and future cyber challenges, ultimately enhancing their organization's ability to deconstruct incidents, manage risks, and prepare for future disruptions.

Join this session to:

  • Establish a cyber resiliency strategy to ensure seamless business continuity amidst digital threats
  • Boost incident response through team mobilization, board engagement, and communication
  • Enhance people resiliency to better manage risks and prepare for future cyber challenges

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Real-time Insights - Leveraging Application Security Posture Management

CISOs need real-time visibility into vulnerabilities 24/7 so they can act quickly to any threat. With cyber resiliency top of mind, having solid application security posture management in place could help you get back

up and running quickly. This approach ensures applications meet security standards and support modern development practices.

Join this session to explore:

  • Approaches for CISOs to collaborate with DevSecOps teams to navigate challenges
  • Techniques for consolidating security insights into a unified dashboard
  • Methods to operationalize DevSecOps to align with organizational maturity

9:40am - 10:25am  Breakout Session

Crypto Agility — Critical Component & Complex Challenge

Greg Wetmore headshot

Greg Wetmore

Vice President Software Product Development

Entrust

Crypto-Agility is critical to digital security. The need to “encrypt everything” that we see in best practices, like Zero Trust, requires Crypto-Agility, as does preparing for the transition of tomorrow’s post-quantum reality. How can organizations achieve a mature crypto-agile security practice, and overcome the challenges to get there – from people and processes to technology?

Join this session to:

  • Understand Crypto-Agility fundamentals
  • Learn how to develop a Crypto-Agile practice
  • Set yourself up for success to overcome implementation challenges

9:40am - 10:25am  Executive Boardroom

Identity Security Amidst AI & Intelligent Automation

David McNeely headshot

David McNeely

CTO

Delinea

Ganjar Imansantosa headshot

Ganjar Imansantosa

Vice President, Chief Information Security Officer

Tropical Smoothie Cafe

As AI and intelligent automation transform business operations, they also reshape identity security. While automation enhances efficiency and streamlines access, it introduces new risks, including AI-driven cyber threats, and privilege abuse. Organizations must modernize their IAM strategies to mitigate evolving threats while ensuring secure, frictionless access.

Join this session to discuss:

  • Balancing automation and security for resilient IAM strategies
  • Emerging AI-driven threats and how to mitigate them
  • The future of AI in identity governance and compliance

9:40am - 10:25am  Executive Boardroom

Identity Security in the Agentic AI Era

Mike Towers headshot

Mike Towers

Chief Security & Trust Officer

Veza

The rise of Agentic AI is increasing risks and complexities for Non-Human Identities (NHIs) in cloud environments. AI agents need extensive NHI access, posing new challenges in identity governance and security.

Join this roundtable to discuss:

  • Exponential NHI growth impacting security
  • Management of AI access models and permissions
  • Complex AI interactions affecting identity management

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Streamlined Compliance— Boosting Security and Cutting Costs with Innovation

Sean Flynn headshot

Sean Flynn

Senior Director, Security Technology and Strategy

Akamai Technologies

 Managing compliance doesn’t have to be a drain on resources. By reducing the scope of compliance environments and leveraging scalable solutions, businesses can simplify audits and control costs. Discover how micro segmentation and cloud-based services can streamline compliance while improving security.

Join this session to explore:

  • Minimize the scope of compliance to reduce audit complexity and costs.
  • Scale security solutions with business growth for cost-effective protection.
  • Eliminate costly on-premises infrastructure by utilizing cloud-based platforms

11:10am - 11:55am  Breakout Session

Future-Proofing Compliance in the Age of Multi-Cloud and Agentic AI

Geoff Hauge headshot

Geoff Hauge

Financial Services Leader, Cybersecurity & Risk Advisory Services

Wipro

As organizations expand operations across hybrid and multi-cloud environments, they gain agility and cost efficiency but face increased security risks and compliance challenges. The advent of agentic AI introduces new capabilities, reshaping governance frameworks and accelerating decision-making processes. How can CISOs build resilient risk and continuous compliance management strategies in today’s cloud environments, especially with emerging technologies like agentic AI?

Join this session to discuss:

  • Enhancing security and streamlining compliance processes with agentic AI
  • Addressing emerging regulatory risks effectively, including implications of AI-driven decisions
  • Ensuring business resilience in the digital economy with advanced automation and AI capabilities

11:10am - 11:55am  Executive Boardroom

Executive Boardroom

 Details coming soon!

11:10am - 11:55am  Executive Boardroom

Taming Third Party Risk with Advanced Technologies

John Chisum headshot

John Chisum

VP, Solutions Consulting

Mastercard Cybersecurity

Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.

Join this session to discuss:

  • Practical strategies for leveraging threat intelligence in TPRM
  • Critical alignment of people and process elements with advanced technologies
  • Acting on useful insights and data to manage supply chain risk

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Securing Data Flow in the AI-Quantum Era

Steve Riley headshot

Steve Riley

VP & Field CTO

Netskope

Sensitive data movement can be risky but restricting it outright can create operational and security challenges. In an era of agentic AI, generative AI, and emerging quantum computing, organizations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases and prepare for the post-quantum encryption (PQE) shift.

Join this keynote to learn:

  • How to choose the right secure access method for each use case
  • Why security must be adaptive to risk, user behavior and AI-driven interactions
  • How to prepare for post-quantum encryption and its enterprise security impact

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Bridging the Gap to Cybersecurity Synergy — A C-Suite Dialogue on Strategic Alignment

Tim Callahan headshot

Tim Callahan

SVP & Global CISO

Aflac

Julie Elmore headshot

Julie Elmore

CTO

Global Payments

In today's rapidly evolving digital landscape, cybersecurity has become a paramount concern for organizations worldwide. The CISOs ability to enhance their connection with the C-suite, and foster a collaborative environment is necessary to support the shared responsibility of safeguarding organizational resilience.

Join the C-suite to discuss how to:

  • Integrate cybersecurity into corporate strategy and planning.
  • Enhance communication between CISOs and the C-suite for better risk management.
  • Foster a proactive security culture to address evolving threats.

1:30pm - 2:15pm  Executive Boardroom

Protecting Innovation — Rethinking Data Security Strategies

Chris Bates headshot

Chris Bates

Chief Security Officer

Cyberhaven

AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation. 

Join this session to discover: 

  • Effective practices for ongoing monitoring to identify risks
  • Rapid investigation and response techniques for insider threats
  • Strategies for evolving your data protection approach

1:30pm - 2:15pm  Executive Boardroom

True Defense Against API & Application Incidents

Larry Maccherone headshot

Larry Maccherone

Evangelist

Contrast Security

 Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.

Join us to explore:

  • Understanding the scale of the backlog and strategies to prevent exploitation
  • The intricacies of application and API protection within the security operations ecosystem
  • Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections

1:30pm - 2:15pm  Executive Boardroom

Be Ready! Preparing Your People for a Cyber Crisis

Jamie Knobles headshot

Jamie Knobles

Director of Cyber Resilience and Readiness

Immersive

Security leaders face unprecedented challenges as evolving threats, including those posed by GenAI, rapidly increase enterprise risk. While new technologies offer defenses, they also introduce vulnerabilities. A cyber-ready workforce is crucial for organizational resilience, but how do you equip your organization to face the future of threats with confidence?

Join this interactive boardroom to discuss:

  • Acting decisively under pressure to manage and mitigate threats
  • Maintaining stakeholder confidence and protecting reputation during disruptions
  • Sharing threat intelligence and preparing for long-term attack consequences

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Cybersecurity Speed Dating — Snappy Wins for CISOs

 In the fast-paced world of cybersecurity, CISOs benefit immensely from sharing quick-impact strategies and tools that enhance their organization's security posture. By learning from each other's experiences, exchanging insights and successes, CISOs can implement effective security enhancements with minimal time investment and enriches the collective expertise of the community.

Join you peers as they:

  • Introduce practical tools and techniques that can be quickly implemented to enhance cybersecurity, and discuss their effectiveness in different organizational settings.
  • Identify common challenges faced by CISOs, such as limited resources and evolving threats, and collaborate on strategies to overcome these obstacles.
  • Share experiences and successes, promoting knowledge exchange and continuous improvement in cybersecurity practices.

3:00pm - 3:45pm  Executive Boardroom

Employing Cyber Intelligence to Improve Resiliency

As cyber threats escalate, organizations must build resilience to effectively withstand and recover from attacks. Real-time threat intelligence provides CISOs with crucial insights to understand the company's risk landscape and respond swiftly. Cyber Threat Intelligence (CTI) is essential for fortifying resilience and enhancing communication with the C-suite and Board.

Join this session to discuss:

  • Leveraging CTI to align cybersecurity strategies with organizational goals
  • Using evidence-based threat intelligence to boost proactive defense and recovery
  • Improving communication with executive leadership on risk management strategies

3:00pm - 3:45pm  Executive Boardroom

Cyber Resilience in Times of Geopolitical Conflict

As global tensions rise, coordinated cyber-attacks are impacting organizations globally. Cyber-conflict isn’t just a security problem, it’s a business problem that requires a strategic partnership between CISOs and leaders across the enterprise.

Join this peer-led conversation to discuss:

  • Gauging the business’ appetite for risk amidst geopolitical unrest
  • Engaging leadership to make informed cybersecurity risk decisions
  • Identifying and responding to politically charged TTPs

3:00pm - 3:45pm  Executive Boardroom

Routing Your Generative AI Implementation Marathon

Early adopters confirm, AI-implementation isn't for the faint of heart (or the light of checkbook). Yet the expectation to welcome this booming tech advancement into your organization remains. Today, studying the efforts of those same early adopters proves the easiest first step in drawing up your own AI road map.

Gather with your CISO peers to:

  • Compare your varying stages of AI-adoption progress
  • Share what you've learned through that progress so far
  • Gather proactive tips on clearing hurdles to come

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Disruption Proof: High-Performing Teams that Conquer Change

Dr. Vijay Pendakur headshot

Dr. Vijay Pendakur

Leadership & Team Culture Strategy Advisor

Guest Speaker

In today’s fast-moving tech and security landscapes, disruption is inevitable—but it doesn’t have to derail your team’s performance. In this high-energy, 30-minute keynote, Dr. Vijay Pendakur will explore why disruption often leads teams to get stuck and how this stagnation threatens business success. Vijay will share his Alchemy of Talent model and explain how leaders can increase productivity and efficiency on their teams, even when it feels like we’re working in an endless earthquake!

Attendees will learn:

  • Why disruption can lead to stuck teams and how to avoid it
  • The critical impact of stuck teams on business performance and results
  • How to make your teams more resilient, adaptable, and willing to learn from failure

This keynote offers actionable strategies and real-world insights to help teams navigate change, unlock innovation, and perform at their best when it matters most.


4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

June 5, 2025

We look forward to seeing you at an upcoming in-person gathering


Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Westin Atlanta Perimeter North
MORE INFORMATION

A block of rooms has been reserved at the Westin Atlanta Perimeter North at a reduced conference rate. Reservations should be made online or by calling 888-627-8407. Please mention Gartner Atlanta Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $199 USD (plus tax) is May 12, 2025.

Your Community Sponsors


CISO Thought Leaders
Key Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Kimberly Lewis

Sr. Community Program Manager

9723450198

kimberly.lewis@gartner.com