
Atlanta CISO Community
Executive Summit
November 18, 2025 | Westin Atlanta Perimeter North
November 18, 2025
Westin Atlanta Perimeter North
Collaborate with your peers
Get together with Atlanta's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Strengthening Cybersecurity Influence as a Key Facilitator of Enterprise Risk Decisions
Enhancing User Access with Smart Solutions
Charting the Future of the CISO Role Amid Increasing Regulatory Scrutiny and Organizational Shifts
Atlanta CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Derek Benz
The Coca-Cola Company
SVP & CISO

Tim Callahan
Aflac
SVP & Global CISO

John Dickson
Insight Global
CISO

John Gift
PepsiCo
SVP & Global CISO

Stacy Hughes
ABM
SVP & CISO

Kemper Seay
Carter's
VP Infrastructure & Chief Information Security Officer
What to Expect
Agenda
8:00am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Brain-Driven Resilience — Neuro-Optimizing for Executive Edge

Megs Gelfgot
Two-time founder, TEDx, International and Fortune 500 speaker on neuroscience & resilience
Guest Speaker
In the high-stakes arena of billion-dollar enterprises, resilience isn't just an asset; it's a necessity. Learn how elite athletes, Navy SEALs, and top executives leverage cutting-edge neuroscience and cognitive training to elevate their relationship with adversity to yield more resilient outcomes. Cognitive training can help boost executive function and enhance decision making under pressure.
Join Megs Gelfgot, Tedx speaker and two-time founder, as she shares:
- Hacks for gaining a competitive edge
- Tactical resilience leadership strategies
- Ways to mitigate symptoms of cognitive decline
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Let’s Brainstorm! Influencing Stakeholders Across the C-Suite

Kemper Seay
VP Infrastructure & Chief Information Security Officer
Carter's
To lead resilient organizations, CISOs must drive cybersecurity transformation while effectively communicating with various stakeholders across the c-suite. According to Gartner, sixty-six percent of CISOs surveyed indicated they needed to enhance their ability to influence stakeholders.
Join this interactive session with CISOs to debate and collaborate on influence with various scenarios including:
- Building emotional connections with key stakeholders through compelling cybersecurity narratives
- Overcoming resistance by understanding and addressing security concerns
- Earning a strategic position within the c-suite by navigating internal politics and aligning security initiatives with business objectives
9:40am - 10:25am Breakout Session
Movers and Shakers — Mastering IAM in a Zero Trust World

Antonio Davis
Information Security Director/CISO
Northeast Georgia Health System
As organizations evolve their IAM strategies, CISOs are tasked with overseeing complex processes involving third-party vendors, lifecycle management, and role definition. The shift toward Zero Trust requires a holistic approach to identity governance—encompassing workplace, workforce, and workload segmentation—to ensure secure and efficient access controls. How can CISOs refine IAM processes to support Zero Trust principles, address challenges in role transitions, and manage entitlements across dynamic environments?
Join this session to:
- Examine strategies for implementing and governing IAM in support of Zero Trust architecture
- Explore best practices for defining roles, managing entitlements, and solidifying lifecycle processes
- Discuss challenges in workforce segmentation, especially in environments where professionals transition between multiple roles and require varying levels of access
9:40am - 10:25am Executive Boardroom
The Maturity Mandate — Closing Gaps in Privacy, Risk, and Security

Mike Frazee
CISO
Lendlease

Kenny Cunningham
Chief Security Officer
OneDigital Health & Benefits

Glen Helton
Director, Information Security
POOLCORP
CISOs must continually evaluate the maturity of privacy, risk, and security programs to ensure their organization is resilient against emerging threats. They should consider whether their controls and processes are robust enough to protect sensitive data, mitigate emerging risks, and if security posture is agile enough to keep pace with regulatory changes and evolving attack vectors. How can CISOs strengthen and mature their privacy, risk, and security programs to stay resilient against evolving threats?
Join your peers to discuss:
- How to conduct regular, comprehensive risk and privacy assessments to identify evolving threats and compliance gaps
- Strategies for aligning security program objectives with business goals to ensure effective resource allocation and executive buy-in
- Ways to implement a maturity model framework to benchmark progress and drive continuous improvement across privacy and security domains
9:40am - 10:25am Executive Boardroom
Escaping the Remediation Hamster Wheel — Proactive Security for Modern Development Pipelines
Hosted by Minimus

John Morello
CTO
Minimus
Advances in scanning techniques have made vulnerability detection in cloud-native environments and containerized applications easier than ever, yet most organizations still remediate only about 10% of detected issues, particularly in modern software stacks. This creates a frustrating cycle of scanning, prioritizing, and patching, often with minimal impact on the overall security posture. In today’s cloud-native landscape, breaking free from the remediation trap requires shifting to preventative security strategies that address vulnerabilities in containers and modern software upfront.Join your peers to discuss:
- How to embed preventative security practices into cloud-native development workflows from the start
- Ways to reduce the volume and urgency of remediation in containerized environments through secure-by-design principles
- Practical steps for aligning development and security teams to drive meaningful risk reduction in modern software deployments
10:25am - 11:10am Networking Break
10:35am - 11:00am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:10am - 11:55am Breakout Session
Over the Horizon — CISOs to Chief Cyber Resilience Officers
Hosted by Rubrik

John Murphy
CISO
Rubrik
The CISO remit increasingly includes GenAI governance, securing cyber-physical systems, and a range of value-driving services — yet its core charge remains safeguarding operations. As breaches become inevitable and board risk appetites shift, cyber resilience will demand even greater focus. CISOs must define recovery goals, guarantee reliable backups, and restore critical services with speed — focusing on measurable resilience to earn their future role as Chief Cyber Resilience Officers.
Join this session to learn about:
- Defining and measuring resilience for real business outcomes
- Orchestrating reliable backup and rapid recovery strategies
- Embedding resilience across teams as a cultural and leadership priority
11:10am - 11:55am Breakout Session
Securing the Network for the Agentic Era
Hosted by Cisco

Chad Skipper
Global Security Technologist
Cisco Secure
AI is enhancing the capabilities of adversaries, enabling large-scale social engineering and instant vulnerability exploitation. At the same time, organizations are integrating agentic AI—autonomous helpers operating within their networks. As CISOs, you must understand the expanding threat landscape of the agentic era. Implementing practical defenses allows you to embrace innovation, even when attackers—and your own applications—leverage AI.
This session will cover:
- As AI capabilities grow, so does AI risk: Practical defenses such as identity-first access, distributed enforcement, and AI-aware guardrails are critical for enterprise security
- Agentic AI requires specialized protection: Emerging approaches include managing agent identity and trust, as well as utilizing closed-loop detection and response
- Collaboration without compromise: Integrate security throughout the network to strengthen human+AI teamwork without slowing innovation
11:10am - 11:55am Executive Boardroom
Reducing Application Delivery Tech Debt from the Inside Out
Hosted by Island

Michael Leland
VP, Field CTO
Island

Chris Bullock
Director, Cyber Risk Management & Data Governance
Aveanna Healthcare

Warren Reid, CRISC, CEH
Director of Cybersecurity
Atlanticus
With high volumes of sensitive data now flowing through web browsers, three in five organizations say data leakage is likely given current IT and security infrastructures. Stop playing catch-up. Discover new approaches to enterprise operations to reduce risk while simplifying operations.
Join this session to discover:
- How disparate IT and security solutions create technical debt
- What challenges impact internal and end user stakeholders
- How simplifying IT can strengthen security, and boost productivity
11:10am - 11:55am Executive Boardroom
Ransomware Reality Check — From Panic to Preparedness

Sridhar Prabhakaran
CISO
WK Kellogg Co

Mat Mathews
CIO
Fortrex
Ransomware attacks remain a top concern for organizations, posing significant risks to business continuity, reputation, and regulatory compliance. As attackers use increasingly sophisticated tactics to exploit vulnerabilities across networks and supply chains, organizations must go beyond prevention and detection to ensure effective response and recovery. This includes comprehensive incident response planning, reliable data backup and restoration, clear communication protocols, and coordination with law enforcement and third-party partners. Building resilience against ransomware also requires strong executive leadership and ongoing business continuity planning to minimize operational and financial impact.
Join this session to:
- Understand the latest ransomware attack vectors and real-world incident case studies
- Learn actionable strategies for prevention, response, and recovery, including effective incident response planning and data restoration
- Gain insights into building organizational resilience, from business continuity planning to executive leadership and external collaboration
11:55am - 12:30pm Lunch Service
12:00pm - 12:25pm Networking
Empowerment Exchange – Building Inclusive Connections

Chamon Gayton
Head of Cybersecurity
PayPal

Stacy Hughes
SVP & CISO
ABM
Women, non-binary, and allied cyber leaders are invited to eat lunch in our reserved Networking space. Hosted by members of the Atlanta CISO community, this session will feature an interactive discussion on empowerment in the workplace and navigating different scenarios as women and allies. Attendees will have the opportunity to share best practices, explore key challenges, and collaboratively develop strategies for fostering inclusive and empowered environments before heading over to the midday keynote.
Apply to Participate
Apply to participate in the Atlanta CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Westin Atlanta Perimeter NorthParking Information
Hotel valet - $35/car
Self- Park in the Concourse lot directly across from The Westin at a discounted rate of $5/day
The Westin Atlanta Perimeter North - Room Block Cancellation Policy:
- Any cancellations made after the Cut Off (October 27, 2025) are subject to a cancellation fee of one (1) night room charge plus tax.
A block of rooms has been reserved at the Westin Atlanta Perimeter North at a reduced conference rate. Reservations should be made online or by calling 888-627-8407 . Please mention Gartner Atlanta Executive Summit to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $199 USD (plus tax) is October 27, 2025.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.