In-Person

Atlanta CISO Community

Executive Summit

November 18, 2025 | Westin Atlanta Perimeter North

November 18, 2025
Westin Atlanta Perimeter North

Collaborate with your peers

Get together with Atlanta's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening Cybersecurity Influence as a Key Facilitator of Enterprise Risk Decisions

Enhancing User Access with Smart Solutions

Charting the Future of the CISO Role Amid Increasing Regulatory Scrutiny and Organizational Shifts

Atlanta CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Derek Benz

The Coca-Cola Company
SVP & CISO

Tim Callahan

Aflac
SVP & Global CISO

John Dickson

Insight Global
CISO

John Gift

PepsiCo
SVP & Global CISO

Stacy Hughes

ABM
SVP & CISO

Kemper Seay

Carter's
VP Infrastructure & Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Atlanta CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

November 18, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Brain-Driven Resilience — Neuro-Optimizing for Executive Edge

Megs Gelfgot headshot

Megs Gelfgot

Two-time founder, TEDx, International and Fortune 500 speaker on neuroscience & resilience

Guest Speaker

In the high-stakes arena of billion-dollar enterprises, resilience isn't just an asset; it's a necessity. Learn how elite athletes, Navy SEALs, and top executives leverage cutting-edge neuroscience and cognitive training to elevate their relationship with adversity to yield more resilient outcomes. Cognitive training can help boost executive function and enhance decision making under pressure.

Join Megs Gelfgot, Tedx speaker and two-time founder, as she shares:

  • Hacks for gaining a competitive edge
  • Tactical resilience leadership strategies
  • Ways to mitigate symptoms of cognitive decline


9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Let’s Brainstorm! Influencing Stakeholders Across the C-Suite

Kemper Seay headshot

Kemper Seay

VP Infrastructure & Chief Information Security Officer

Carter's

To lead resilient organizations, CISOs must drive cybersecurity transformation while effectively communicating with various stakeholders across the c-suite. According to Gartner, sixty-six percent of CISOs surveyed indicated they needed to enhance their ability to influence stakeholders.

Join this interactive session with CISOs to debate and collaborate on influence with various scenarios including:

  • Building emotional connections with key stakeholders through compelling cybersecurity narratives
  • Overcoming resistance by understanding and addressing security concerns
  • Earning a strategic position within the c-suite by navigating internal politics and aligning security initiatives with business objectives

9:40am - 10:25am  Breakout Session

Movers and Shakers — Mastering IAM in a Zero Trust World

Antonio Davis headshot

Antonio Davis

Information Security Director/CISO

Northeast Georgia Health System

As organizations evolve their IAM strategies, CISOs are tasked with overseeing complex processes involving third-party vendors, lifecycle management, and role definition. The shift toward Zero Trust requires a holistic approach to identity governance—encompassing workplace, workforce, and workload segmentation—to ensure secure and efficient access controls. How can CISOs refine IAM processes to support Zero Trust principles, address challenges in role transitions, and manage entitlements across dynamic environments?

Join this session to:

  • Examine strategies for implementing and governing IAM in support of Zero Trust architecture
  • Explore best practices for defining roles, managing entitlements, and solidifying lifecycle processes
  • Discuss challenges in workforce segmentation, especially in environments where professionals transition between multiple roles and require varying levels of access


9:40am - 10:25am  Executive Boardroom

The Maturity Mandate — Closing Gaps in Privacy, Risk, and Security

Mike Frazee headshot

Mike Frazee

CISO

Lendlease

Kenny Cunningham headshot

Kenny Cunningham

Chief Security Officer

OneDigital Health & Benefits

Glen Helton headshot

Glen Helton

Director, Information Security

POOLCORP

CISOs must continually evaluate the maturity of privacy, risk, and security programs to ensure their organization is resilient against emerging threats. They should consider whether their controls and processes are robust enough to protect sensitive data, mitigate emerging risks, and if security posture is agile enough to keep pace with regulatory changes and evolving attack vectors. How can CISOs strengthen and mature their privacy, risk, and security programs to stay resilient against evolving threats?

Join your peers to discuss:

  • How to conduct regular, comprehensive risk and privacy assessments to identify evolving threats and compliance gaps
  • Strategies for aligning security program objectives with business goals to ensure effective resource allocation and executive buy-in
  • Ways to implement a maturity model framework to benchmark progress and drive continuous improvement across privacy and security domains

9:40am - 10:25am  Executive Boardroom

Escaping the Remediation Hamster Wheel — Proactive Security for Modern Development Pipelines

John Morello headshot

John Morello

CTO

Minimus

Advances in scanning techniques have made vulnerability detection in cloud-native environments and containerized applications easier than ever, yet most organizations still remediate only about 10% of detected issues, particularly in modern software stacks. This creates a frustrating cycle of scanning, prioritizing, and patching, often with minimal impact on the overall security posture. In today’s cloud-native landscape, breaking free from the remediation trap requires shifting to preventative security strategies that address vulnerabilities in containers and modern software upfront.Join your peers to discuss:

  • How to embed preventative security practices into cloud-native development workflows from the start
  • Ways to reduce the volume and urgency of remediation in containerized environments through secure-by-design principles
  • Practical steps for aligning development and security teams to drive meaningful risk reduction in modern software deployments

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Over the Horizon — CISOs to Chief Cyber Resilience Officers

John Murphy headshot

John Murphy

CISO

Rubrik

The CISO remit increasingly includes GenAI governance, securing cyber-physical systems, and a range of value-driving services — yet its core charge remains safeguarding operations. As breaches become inevitable and board risk appetites shift, cyber resilience will demand even greater focus. CISOs must define recovery goals, guarantee reliable backups, and restore critical services with speed — focusing on measurable resilience to earn their future role as Chief Cyber Resilience Officers.

Join this session to learn about:

  • Defining and measuring resilience for real business outcomes
  • Orchestrating reliable backup and rapid recovery strategies
  • Embedding resilience across teams as a cultural and leadership priority

11:10am - 11:55am  Breakout Session

Securing the Network for the Agentic Era

Chad Skipper headshot

Chad Skipper

Global Security Technologist

Cisco Secure

AI is enhancing the capabilities of adversaries, enabling large-scale social engineering and instant vulnerability exploitation. At the same time, organizations are integrating agentic AI—autonomous helpers operating within their networks. As CISOs, you must understand the expanding threat landscape of the agentic era. Implementing practical defenses allows you to embrace innovation, even when attackers—and your own applications—leverage AI.

This session will cover:

  • As AI capabilities grow, so does AI risk: Practical defenses such as identity-first access, distributed enforcement, and AI-aware guardrails are critical for enterprise security
  • Agentic AI requires specialized protection: Emerging approaches include managing agent identity and trust, as well as utilizing closed-loop detection and response
  • Collaboration without compromise: Integrate security throughout the network to strengthen human+AI teamwork without slowing innovation

11:10am - 11:55am  Executive Boardroom

Reducing Application Delivery Tech Debt from the Inside Out

Michael Leland headshot

Michael Leland

VP, Field CTO

Island

Chris Bullock headshot

Chris Bullock

Director, Cyber Risk Management & Data Governance

Aveanna Healthcare

Warren Reid, CRISC, CEH headshot

Warren Reid, CRISC, CEH

Director of Cybersecurity

Atlanticus

With high volumes of sensitive data now flowing through web browsers, three in five organizations say data leakage is likely given current IT and security infrastructures. Stop playing catch-up. Discover new approaches to enterprise operations to reduce risk while simplifying operations.

Join this session to discover:

  • How disparate IT and security solutions create technical debt
  • What challenges impact internal and end user stakeholders
  • How simplifying IT can strengthen security, and boost productivity

11:10am - 11:55am  Executive Boardroom

Ransomware Reality Check — From Panic to Preparedness

Sridhar Prabhakaran headshot

Sridhar Prabhakaran

CISO

WK Kellogg Co

Mat Mathews headshot

Mat Mathews

CIO

Fortrex

Ransomware attacks remain a top concern for organizations, posing significant risks to business continuity, reputation, and regulatory compliance. As attackers use increasingly sophisticated tactics to exploit vulnerabilities across networks and supply chains, organizations must go beyond prevention and detection to ensure effective response and recovery. This includes comprehensive incident response planning, reliable data backup and restoration, clear communication protocols, and coordination with law enforcement and third-party partners. Building resilience against ransomware also requires strong executive leadership and ongoing business continuity planning to minimize operational and financial impact.

Join this session to:

  • Understand the latest ransomware attack vectors and real-world incident case studies
  • Learn actionable strategies for prevention, response, and recovery, including effective incident response planning and data restoration
  • Gain insights into building organizational resilience, from business continuity planning to executive leadership and external collaboration

11:55am - 12:30pm  Lunch Service

12:00pm - 12:25pm  Networking

Empowerment Exchange – Building Inclusive Connections

Chamon Gayton headshot

Chamon Gayton

Head of Cybersecurity

PayPal

Stacy Hughes headshot

Stacy Hughes

SVP & CISO

ABM

Women, non-binary, and allied cyber leaders are invited to eat lunch in our reserved Networking space. Hosted by members of the Atlanta CISO community, this session will feature an interactive discussion on empowerment in the workplace and navigating different scenarios as women and allies. Attendees will have the opportunity to share best practices, explore key challenges, and collaboratively develop strategies for fostering inclusive and empowered environments before heading over to the midday keynote.

12:30pm - 1:05pm  Keynote

Zero Trust & AI — Strengthening Security, Reducing Complexity, and Driving Innovation

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Businesses stand to benefit from AI in unprecedented ways, but only if security leaders overcome transformation challenges. This includes implementing a modern zero trust architecture to protect data and users, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based approach to security ensures CISOs deliver a secure, phased transformation.

Join this session to:

  • Understand how zero trust and AI together, unlike firewalls, provide the strongest cyber defense by stopping threat actors from lateral movement within networks
  • Learn strategies for protecting AI applications developed in data centers and the cloud, while preventing data leaks from public AI applications
  • Discover how eliminating costly legacy hardware simplifies environments while cutting network and security costs

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Operation Cyber Shield — Navigating the Modern Security Landscape

Joseph Zadik headshot

Joseph Zadik

FBI Atlanta Cyber Supervisory Special Agent

Federal Bureau of Investigation

As a CISO, understanding the current state of cybersecurity is critical to protecting your organization from increasingly sophisticated threats. Drawing on frontline experience and intelligence, reflect on whether your defenses are keeping pace with adversaries, how you’re adapting to new attack vectors, and what steps you can take to strengthen resilience across your enterprise.

Join your peers to discuss:

  • The latest trends and tactics in cybercrime, and how they impact organizational risk
  • Strategies for proactively identifying and mitigating emerging threats
  • Approaches to fostering a security-first culture and enhancing incident response capabilities

1:30pm - 2:15pm  Executive Boardroom

From Legacy to Leadership — Unlocking Growth Through CIO–CISO Alignment in Modernization

Jason Richmond headshot

Jason Richmond

CIO

AmeriBen

Jason Maddox headshot

Jason Maddox

Director of Information Technology & Chief Information Security Officer

Roark Capital Group

Modernizing legacy platforms is no longer optional — it’s the foundation for innovation, revenue growth, and resilience. Yet the path forward is fraught with tension: CIOs are pressed to accelerate cloud adoption, digital platforms, and customer-facing innovations, while CISOs often advocate for caution to avoid exposing the enterprise to new risks. How can CIOs and CISOs can turn this tension into a strength by co-creating modernization strategies that deliver speed, growth, and security?

Participants will gain insights on:

  • How to balance the CIO’s drive for agility and revenue with the CISO’s mandate to protect and ensure compliance
  • Strategies for modernizing legacy systems (cloud, automation, AI/ML) without creating unacceptable risk exposure
  • Best practices for aligning modernization roadmaps with business goals while strengthening enterprise resilience

1:30pm - 2:15pm  Executive Boardroom

Beyond the Firewall — Navigating Overextension and Embracing the Unexpected

Whitfield Samuel headshot

Whitfield Samuel

CISO

Georgia State University

Tamika Bass headshot

Tamika Bass

Cybersecurity Director

Gannett Fleming

Alicia Clarke headshot

Alicia Clarke

Director, Cyber Security, Risk, Privacy & Compliance

PGA TOUR Superstore

Faced with constant high-stress situations, CISOs are at the forefront of managing complex threats and safeguarding organizational assets. The relentless pressures and demands of the role can lead to overextending oneself, causing many to question their future beyond the CISO position. However, by focusing on well-being and exploring new opportunities, CISOs can sustain their resilience, envision fulfilling career paths, and continue making meaningful contributions. How can CISOs begin to gain insights into maintaining well-being and charting a rewarding path after their tenure?

oin this session to:

  • Identify the symptoms and causes of depletion specific to CISOs and learn strategies for resilience and self-care
  • Explore proactive measures for anticipating and managing unexpected cybersecurity crises

  • Discuss potential career pathways and opportunities for leveraging CISO experience in diverse roles beyond cybersecurity leadership

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

From Risk to Resilience — Communicating Security Value Without Fear

Adam Keown headshot

Adam Keown

CISO

Eastman Chemical

CISOs today must engage stakeholders with clarity and confidence, moving beyond fear-based messaging to highlight how security drives business continuity and innovation. Security leaders are called to engage their teams and stakeholders with confidence, focusing on resilience, innovation, and strategic alignment.

Join your peers to:

  • Discover industry-specific strategies for positioning cybersecurity as a business enabler, not just a risk mitigator
  • Learn effective methods for translating technical priorities into boardroom-ready conversations that support organizational goals
  • Share practical approaches for fostering team engagement and stakeholder buy-in without relying on fear, uncertainty, or doubt

3:00pm - 3:45pm  Executive Boardroom

Wired & Inspired — Securing IT/OT in a Connected World

Ray Strubinger headshot

Ray Strubinger

AMS CISO

TK Elevator

Scott Kelly headshot

Scott Kelly

VP, Infrastructure & Security

RPC

As IT and OT systems converge, CISOs must address new security risks and complexities. This session explores the unique challenges of IT/OT integration and offers practical strategies to protect critical infrastructure in an interconnected world.

Join this session to:

  • Review key IT/OT cyber threats and real-world incidents
  • Learn governance and collaboration best practices
  • Get actionable steps to improve visibility and response

3:00pm - 3:45pm  Executive Boardroom

The AI Tightrope — Security Leadership When the Rules Keep Changing

Bob Jett headshot

Bob Jett

Global Data Privacy Officer

Bunge

As artificial intelligence becomes deeply embedded in business operations, the White House’s AI Action Plan is testing traditional governance and risk management processes like never before. How will CISOs recognize and respond to subtle warning signs and governance gaps in AI adoption? What strategies can help navigate the evolving landscape of regulatory expectations and cross-functional oversight? How can organizations ensure their security frameworks keep pace with the speed and complexity of AI-driven threats? How can CISOs detect, disrupt, and prevent emerging AI-driven threats while aligning their organizations with evolving regulatory expectations.

Join this session to learn:

  • Proven methods to identify governance, ethical, and technical warning signs in AI adoption and deployment
  • Effective cross-functional controls and incident response strategies for rapid mitigation of AI-related risks
  • Best practices for strengthening organizational resilience through board engagement, AI risk training, and robust oversight frameworks

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

The Shortest Hour — Turning CISO Minutes into Boardroom Momentum

Lee Parrish headshot

Lee Parrish

CISO

Newell Brands

CISOs face a unique challenge when presenting cybersecurity information to the board. With only a brief window each quarter to communicate complex risks and strategies, it’s essential to deliver clear, actionable insights that enable effective oversight. How can CISOs move beyond technical jargon and speculative metrics to ensure board members understand the real issues and make informed decisions?

Join this discussion to discover:

  • Practical approaches for translating cybersecurity data into board-friendly language
  • Methods for prioritizing tangible, relevant information over abstract risk estimates
  • Best practices for maximizing limited presentation time and fostering meaningful board engagement


4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

November 18, 2025

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Westin Atlanta Perimeter North
More Information

A block of rooms has been reserved at the Westin Atlanta Perimeter North at a reduced conference rate. Reservations should be made online or by calling 888-627-8407 . Please mention Gartner Atlanta Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $199 USD (plus tax) is October 27, 2025.

Your Community Sponsors

Global Thought Leader

CISO Thought Leader

Key Sponsors

Program Sponsor

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Kimberly Lewis

Sr. Community Program Manager

9723450198

kimberly.lewis@gartner.com