Go Back
United States Summit

The CISO Chapter North America

Chateau Elan, Braselton, GA

2 Days
-
Chataeu Elan

A bit about our summit

What we're known for

File

Industry Analysis

Glean the knowledge of your peers to shape your organisation's future

File

Peer-Led

Workshops, Fireside Chats & Keynote Addresses

File

1 on 1 Meetings

Strategic BANT-qualified meetings based on project alignment

File

Custom Agenda

Be in control of your own agenda. Maximise your experience.

The Technology Chapter

Audience

We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

Audience illustration
  • 70+
    Senior Executives
  • 12
    Solution Partners
  • 6:1
    Executive to Solution Partner Ratio
  • 54%
    C-Suite Executives
  • 46%
    SVP, VP, Director, Heads of

Agenda

Day 1

18:30 - 19:00
Welcome Drinks Reception

Join your peers and speakers for a relaxed pre-dinner drinks reception — the perfect opportunity to connect before the Gala Dinner begins.

19:00 - 21:30
Gala Dinner & Signature Keynote with Q&A

Join us for a memorable evening at the CISO Chapter US Gala Dinner, where fine dining meets thought leadership in an exclusive setting.

 

Three-Course Fine Dining

Enjoy a seasonal, chef-curated three-course menu paired with wines sourced directly from the vineyard.

 

Platinum Keynote

Jim Richberg, CISO at Fortinet

Public–Private Sector Partnership in Cybersecurity

A strategic discussion on the evolving collaboration between public and private sectors and its critical role in strengthening national cyber defences.

 

Executive Keynote

Meredith Harper, CISO at Synchrony

After the Firewall: Leadership, Legacy and Life Beyond the CISO

An inspiring and deeply personal keynote exploring what comes next after a high-impact career in cybersecurity.

 

Post-Dinner Drinks

Cap off the evening with informal networking and drinks at the bar.

Jim
Name
Jim Richberg
Position
Head of Cyber Policy & Global Field CISO
Company
Fortinet
Meredith
Name
Meredith Harper
Position
CISO
Company
Synchrony
Fortinet
21:30
Drinks & Networking

Continue conversations and building relationships at the bar

Day 2

07:30 - 08:30
Breakfast

Fuel up for a full day of networking, experiences and content

08:30 - 09:15
Welcome Address

Welcome Address by our Master of Ceremonies

Signature Keynote - Elastic

Building a High-Performing Security Team: Leveraging GenAI, Automation, and Collaboration

Burnout in cybersecurity teams can severely compromise an organization's security posture. However, by solely focusing on burnout, CISOs miss the opportunity to create a team where talented professionals thrive.

This presentation shifts the focus from burnout to building high-performing security teams. It explores the challenges security professionals face and offers data-driven strategies to justify investments in GenAI, automation, and collaboration tools. These strategies will not only mitigate burnout but also foster a team where individuals are eager to join and contribute.

Key Points:

  • The High Cost of Burnout: Explore the detrimental effects of burnout on individuals, team dynamics, and organizational security.
  • Building High-Performing Teams: Discuss strategies to increase collaboration and build high-performing security teams.
  • Data-Driven Insights: Utilize metrics and analytics to identify burnout risk factors and demonstrate the ROI of GenAI and automation tools for security.
Corey - Elastic
Name
Corey Pincock
Position
Vice President - Security Sales
Company
Elastic
Elastic
09:20 - 10:00
Advanced Threat Detection: Harnessing AI-Driven Solutions for Sophisticated Cybersecurity

Explore the transformative power of AI in advanced threat detection. You will learn how to implement AI-driven security solutions to identify and mitigate sophisticated threats, enhancing your organisation's security posture. The session will cover practical strategies, real-world case studies, and the latest advancements in AI technologies tailored for cybersecurity applications.

Key Takeaways:

  • Understand how AI can enhance threat detection capabilities and improve incident response times.
  • Learn best practices for integrating AI-driven solutions into existing security frameworks for maximum effectiveness.
Tom Scott, Chief Application Security Architect at ADP
Name
Tom Scott
Position
Chief Application Architect
Company
ADP
09:20 - 10:00
Enabling Digital Transformation…. A Personal Perspective

Drawing on his 30+ year career leading projects in the US Federal government and his experience as an executive at Fortinet—a leading global cybersecurity company—Jim Richberg will share principles and practices he found useful for driving transformation in the public sector. Jim will use examples from cybersecurity and AI to illustrate some rules of thumb and share lessons learned from his experience leading projects across teams in government at both the agency and national levels.

Key Takeaways:

  • Discuss practical and applicable ways to manage technology transformation and innovation for both the public and private sectors
  • Apply the 7 Guiding Cybersecurity Principals of transformation to your organization in order to stay one step ahead of threats, maximize efficiency and ensure success
Jim
Name
Jim Richberg
Position
Head of Cyber Policy and Global Field CISO
Company
Fortinet
09:20 - 10:00
Using Automation for Next-Level Security

Legacy SOAR (Security Orchestration, Automation, and Response) technology promised to revolutionize security operations. Unfortunately, the first generation of these platforms has gained a reputation for rigid playbooks that require extensive development resources, poor case management features, and limited use cases. That’s why Swimlane developed a more modern and extensible approach to security automation.

Key Takeaways:

  • A clear understanding of automation’s role in security and why it is an imperative
  • Best practices and real-world use cases for security automation
Chris
Name
Chris Phillips
Position
Senior Consulting Engineer
Company
Swimlane
09:20 - 10:00
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
10:05 - 11:00
Demos, Collaboration Sessions & Networking Break

See first-hand how latest products and services can influence your business. Alternatively, collaborate with peers in this structured networking session dissecting industry topics and challenges.

 

Demo 1: Delphix

Demo 2: Valence Security

Get hands-on with the latest technology from Delphix & Valence Security. Explore real-world applications, see their platform in action, and discover how they may support your cybersecurity strategy.

Delphix
Valence
11:00 - 11:40
Secure Velocity: Enabling DevOps and AI Innovation Without Compromising Data

Innovation demands speed—but rapid DevOps and AI initiatives often collide with data security, privacy, and compliance risks. As non-production environments become a growing attack surface, IT and security leaders must rethink how data is delivered across development, testing, and analytics workflows.

This session explores how forward-thinking organizations are embracing secure data automation to eliminate friction, reduce exposure, and accelerate innovation. We’ll examine how policy-driven data delivery—integrated into DevOps and AI pipelines—can drive agility without sacrificing control.

Dante
Name
Dante DeMichaelis
Position
Principal Solution Engineer, Enterprise Architect
Company
Delphix
11:00 - 11:40
Incident Response Planning: Building Robust Strategies for Effective Recovery

In today’s threat landscape, having a well-defined incident response plan is crucial for minimising damage and ensuring swift recovery from cyber incidents. This workshop will focus on the importance of developing and implementing robust incident response and recovery strategies. CISOs will learn how to identify potential threats, establish clear communication protocols, and create a response framework that enhances organisational resilience.

Key Takeaways:

  • Learn the key components of an effective incident response plan to mitigate risks and enhance recovery.
  • Explore best practices for testing and refining incident response strategies to ensure preparedness in the face of cyber threats.
Trey Tunnell, CISO at Floor & Decor
Name
Trey Tunnell
Position
CISO
Company
Floor & Decor
11:00 - 11:40
Live Demo Hosted by Elastic

Get hands-on with the latest technology from Elastic. Explore real-world applications, see the platform in action, and discover how it may support your cybersecurity strategy.

Elastic
11:00 - 11:40
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
11:45 - 12:30
Panel Discussion

Humanising Security: Navigating Burnout and the Evolving Role of the CISO

Industry leading CISOs will discuss the importance of integrating the human element into cybersecurity strategies while addressing the growing issue of burnout among security teams. The panel will explore how to foster a supportive culture, prioritise mental health, and ensure that cybersecurity initiatives engage employees effectively, ultimately strengthening the organisation’s overall security posture.

Tamika Bass, Director Cybersecurity at Gannett Fleming
Name
Tamika Bass
Position
Director Cybersecurity
Company
Gannett Fleming
Wallace
Name
Wallace Dalrymple Jr
Position
CISO
Company
ETS
Antonio
Name
Antonio Davis
Position
Director Head of Information Security
Company
Northeast Georgia Health System
12:30 - 13:30
Lunch
13:30 - 14:00
Executive Keynote

Four Minutes to Impact - Why Cyber Risk Preparedness Can’t Wait

Carmine
Name
Carmine Valente
Position
Deputy CISO
Company
Con Edison
14:05 - 14:45
Empowering Employees: The CISO’s Role in Cybersecurity Training

In a landscape where cyber threats are ever-evolving, fostering a culture of cybersecurity awareness is essential. This workshop will equip CISOs with the strategies to lead effective employee training programs that enhance awareness and prepare teams to recognise and respond to security threats. Participants will explore best practices for designing engaging training modules and fostering a proactive security mindset across the organisation.

Key Takeaways:

  • Discover effective techniques for developing impactful cybersecurity awareness training programs.
  • Learn how to measure training effectiveness and ensure continuous improvement in employee engagement with security practices.
Director, Global Security Governance & Compliance
Name
Courtney Buchanan
Position
Director, Global Security Governance & Compliance
Company
Aflac
14:05 - 14:45
Revolutionizing SOC with GenAI and No-Code Automation: Enhancing Analyst Performance and Collaboration

Explore how leveraging GenAI and no-code automation in SIEM can revolutionize the SOC. By simplifying alert triage, optimizing signal-to-noise ratio, and automating low-value tasks, analysts can focus on higher-level responsibilities. Additionally, these advancements foster improved communication and collaboration between security and IT teams, driving overall performance. The session will also delve into strategies for measuring performance and efficiency to boost engagement and job satisfaction.

Key Takeaways: 

  • Discover three GenAI use cases that can elevate SOC Analyst job satisfaction and performance.
  • See how simple it is to build workflows using no-code automation across IT and security
Daryl
Name
Daryl Diebold
Position
Sr. Security Sales Director
Company
Elastic
Stif
Name
Sif Baksh
Position
Solution Architect
Company
Tines
14:05 - 14:45
Live Demo Hosted by Fortinet

Get hands-on with the latest technology from Fortinet. Explore real-world applications, see the platform in action, and discover how it may support your cybersecurity strategy.

Fortinet
14:05 - 14:45
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
14:50 - 15:45
Demos, Collaboration Sessions & Networking Break

See first-hand how latest products and services can influence your business. Alternatively, collaborate with peers in this structured networking session dissecting industry topics and challenges.

 

Demo 5: Opentext

Demo 6: Breachlock

Get hands-on with the latest technology from Opentext or Breachlock. Explore real-world applications, see their platforms in action, and discover how they may support your cybersecurity strategy.

Opentext
Breach
15:45 - 16:25
Penetration Testing Quality – Tips to get the most from your provider

Quality in pentesting can mean different things for different groups of people--from the prospective buyer to an existing customer, to the pentester delivering the test, to practitioners in our industry. There are several factors that make up a good pentest; in this workshop, we will uncover some of these factors and why they are important. Each topic has nuances, potential pitfalls and areas of focus, which we will discuss to prepare you for your next pentest engagement.

We will touch on the following topics: 

  • Preparation - This includes the sales cycle, scope agreement, and credential sharing; in short, everything that is needed to perform the test is gathered during this step.
  • Kickoff/Onboarding - This is where stakeholders and the delivery team meet to align their expectations and approach. 
  • Testing - This is the main activity for the penetration testers; it includes discovery, threat modeling, exploitation, post-exploitation, etc. 
  • Reporting - How are reports shared, what options are available, does it work for your team? 
  • Re-testing - This is where the recommended remediation steps are implemented and can be double-checked to ensure the vulnerabilities are no longer present and the exploits are no longer viable. 
  • Feedback - Here, we gather information about how the test went, how pentesters performed, how engaged the customer was, etc. 
Jay
Name
Jay Paz
Position
VP Pentesting Solutions
Company
Breachlock
15:45 - 16:25
Automation in Security Operations: Enhancing Efficiency and Responsiveness

In the fast-paced world of cybersecurity, automation has become essential for improving efficiency and responsiveness in security operations. This workshop will explore how organisations can leverage automation tools to streamline incident response, reduce manual workloads, and enhance overall security posture. Participants will gain insights into practical applications of automation in threat detection, monitoring, and remediation, enabling them to respond more effectively to emerging threats.

Key Takeaways:

  • Discover key automation tools and techniques that can enhance security operations and reduce response times.
  • Learn how to implement automation strategies that improve efficiency and bolster your organisation’s cybersecurity defences.
Richard Rushing - CISO
Name
Richard Rushing
Position
CISO
Company
Motorola Mobility
15:45 - 16:25
Live Demo Hosted by Netskope

Get hands-on with the latest technology from Netskope. Explore real-world applications, see the platform in action, and discover how it may support your cybersecurity strategy.

Netskope
15:45 - 16:25
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
16:30 - 16:45
Closing Remarks

o round off the day, our Master of Ceremonies will share a few final reflections and key takeaways from the summit. It’s a moment to pause, recap the insights, and recognise the contributions of our speakers, partners, and delegates.

Following the closing remarks, please join us for light drinks and nibbles — a final chance to connect before heading on your way.

16:45 - 17:30
Drink & Nibbles

Join Us

Register Interest

Meet with fellow industry leaders and solve today’s greatest business
challenges.

File

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

File

Join the Executive Community

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.