The CISO Chapter North America
Chateau Elan, Braselton, GA

A bit about our summit
What we're known for
Industry Analysis
Glean the knowledge of your peers to shape your organisation's future
Peer-Led
Workshops, Fireside Chats & Keynote Addresses
1 on 1 Meetings
Strategic BANT-qualified meetings based on project alignment
Custom Agenda
Be in control of your own agenda. Maximise your experience.
The Technology Chapter
Audience
We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

-
70+Senior Executives
-
12Solution Partners
-
6:1Executive to Solution Partner Ratio
-
54%C-Suite Executives
-
46%SVP, VP, Director, Heads of
Agenda
Day 1
Welcome Drinks Reception
Join your peers and speakers for a relaxed pre-dinner drinks reception — the perfect opportunity to connect before the Gala Dinner begins.
Gala Dinner & Signature Keynote with Q&A
Join us for a memorable evening at the CISO Chapter US Gala Dinner, where fine dining meets thought leadership in an exclusive setting.
Three-Course Fine Dining
Enjoy a seasonal, chef-curated three-course menu paired with wines sourced directly from the vineyard.
Platinum Keynote
Jim Richberg, CISO at Fortinet
Public–Private Sector Partnership in Cybersecurity
A strategic discussion on the evolving collaboration between public and private sectors and its critical role in strengthening national cyber defences.
Executive Keynote
Meredith Harper, CISO at Synchrony
After the Firewall: Leadership, Legacy and Life Beyond the CISO
An inspiring and deeply personal keynote exploring what comes next after a high-impact career in cybersecurity.
Post-Dinner Drinks
Cap off the evening with informal networking and drinks at the bar.



Drinks & Networking
Continue conversations and building relationships at the bar
Day 2
Breakfast
Fuel up for a full day of networking, experiences and content
Welcome Address
Welcome Address by our Master of Ceremonies
Signature Keynote - Elastic
Building a High-Performing Security Team: Leveraging GenAI, Automation, and Collaboration
Burnout in cybersecurity teams can severely compromise an organization's security posture. However, by solely focusing on burnout, CISOs miss the opportunity to create a team where talented professionals thrive.
This presentation shifts the focus from burnout to building high-performing security teams. It explores the challenges security professionals face and offers data-driven strategies to justify investments in GenAI, automation, and collaboration tools. These strategies will not only mitigate burnout but also foster a team where individuals are eager to join and contribute.
Key Points:
- The High Cost of Burnout: Explore the detrimental effects of burnout on individuals, team dynamics, and organizational security.
- Building High-Performing Teams: Discuss strategies to increase collaboration and build high-performing security teams.
- Data-Driven Insights: Utilize metrics and analytics to identify burnout risk factors and demonstrate the ROI of GenAI and automation tools for security.


Advanced Threat Detection: Harnessing AI-Driven Solutions for Sophisticated Cybersecurity
Explore the transformative power of AI in advanced threat detection. You will learn how to implement AI-driven security solutions to identify and mitigate sophisticated threats, enhancing your organisation's security posture. The session will cover practical strategies, real-world case studies, and the latest advancements in AI technologies tailored for cybersecurity applications.
Key Takeaways:
- Understand how AI can enhance threat detection capabilities and improve incident response times.
- Learn best practices for integrating AI-driven solutions into existing security frameworks for maximum effectiveness.

Enabling Digital Transformation…. A Personal Perspective
Drawing on his 30+ year career leading projects in the US Federal government and his experience as an executive at Fortinet—a leading global cybersecurity company—Jim Richberg will share principles and practices he found useful for driving transformation in the public sector. Jim will use examples from cybersecurity and AI to illustrate some rules of thumb and share lessons learned from his experience leading projects across teams in government at both the agency and national levels.
Key Takeaways:
- Discuss practical and applicable ways to manage technology transformation and innovation for both the public and private sectors
- Apply the 7 Guiding Cybersecurity Principals of transformation to your organization in order to stay one step ahead of threats, maximize efficiency and ensure success

Using Automation for Next-Level Security
Legacy SOAR (Security Orchestration, Automation, and Response) technology promised to revolutionize security operations. Unfortunately, the first generation of these platforms has gained a reputation for rigid playbooks that require extensive development resources, poor case management features, and limited use cases. That’s why Swimlane developed a more modern and extensible approach to security automation.
Key Takeaways:
- A clear understanding of automation’s role in security and why it is an imperative
- Best practices and real-world use cases for security automation

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Demos, Collaboration Sessions & Networking Break
See first-hand how latest products and services can influence your business. Alternatively, collaborate with peers in this structured networking session dissecting industry topics and challenges.
Demo 1: Delphix
Demo 2: Valence Security
Get hands-on with the latest technology from Delphix & Valence Security. Explore real-world applications, see their platform in action, and discover how they may support your cybersecurity strategy.


Secure Velocity: Enabling DevOps and AI Innovation Without Compromising Data
Innovation demands speed—but rapid DevOps and AI initiatives often collide with data security, privacy, and compliance risks. As non-production environments become a growing attack surface, IT and security leaders must rethink how data is delivered across development, testing, and analytics workflows.
This session explores how forward-thinking organizations are embracing secure data automation to eliminate friction, reduce exposure, and accelerate innovation. We’ll examine how policy-driven data delivery—integrated into DevOps and AI pipelines—can drive agility without sacrificing control.

Incident Response Planning: Building Robust Strategies for Effective Recovery
In today’s threat landscape, having a well-defined incident response plan is crucial for minimising damage and ensuring swift recovery from cyber incidents. This workshop will focus on the importance of developing and implementing robust incident response and recovery strategies. CISOs will learn how to identify potential threats, establish clear communication protocols, and create a response framework that enhances organisational resilience.
Key Takeaways:
- Learn the key components of an effective incident response plan to mitigate risks and enhance recovery.
- Explore best practices for testing and refining incident response strategies to ensure preparedness in the face of cyber threats.

Live Demo Hosted by Elastic
Get hands-on with the latest technology from Elastic. Explore real-world applications, see the platform in action, and discover how it may support your cybersecurity strategy.

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Panel Discussion
Humanising Security: Navigating Burnout and the Evolving Role of the CISO
Industry leading CISOs will discuss the importance of integrating the human element into cybersecurity strategies while addressing the growing issue of burnout among security teams. The panel will explore how to foster a supportive culture, prioritise mental health, and ensure that cybersecurity initiatives engage employees effectively, ultimately strengthening the organisation’s overall security posture.



Lunch
Executive Keynote
Four Minutes to Impact - Why Cyber Risk Preparedness Can’t Wait

Empowering Employees: The CISO’s Role in Cybersecurity Training
In a landscape where cyber threats are ever-evolving, fostering a culture of cybersecurity awareness is essential. This workshop will equip CISOs with the strategies to lead effective employee training programs that enhance awareness and prepare teams to recognise and respond to security threats. Participants will explore best practices for designing engaging training modules and fostering a proactive security mindset across the organisation.
Key Takeaways:
- Discover effective techniques for developing impactful cybersecurity awareness training programs.
- Learn how to measure training effectiveness and ensure continuous improvement in employee engagement with security practices.

Revolutionizing SOC with GenAI and No-Code Automation: Enhancing Analyst Performance and Collaboration
Explore how leveraging GenAI and no-code automation in SIEM can revolutionize the SOC. By simplifying alert triage, optimizing signal-to-noise ratio, and automating low-value tasks, analysts can focus on higher-level responsibilities. Additionally, these advancements foster improved communication and collaboration between security and IT teams, driving overall performance. The session will also delve into strategies for measuring performance and efficiency to boost engagement and job satisfaction.
Key Takeaways:
- Discover three GenAI use cases that can elevate SOC Analyst job satisfaction and performance.
- See how simple it is to build workflows using no-code automation across IT and security


Live Demo Hosted by Fortinet
Get hands-on with the latest technology from Fortinet. Explore real-world applications, see the platform in action, and discover how it may support your cybersecurity strategy.

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Demos, Collaboration Sessions & Networking Break
See first-hand how latest products and services can influence your business. Alternatively, collaborate with peers in this structured networking session dissecting industry topics and challenges.
Demo 5: Opentext
Demo 6: Breachlock
Get hands-on with the latest technology from Opentext or Breachlock. Explore real-world applications, see their platforms in action, and discover how they may support your cybersecurity strategy.


Penetration Testing Quality – Tips to get the most from your provider
Quality in pentesting can mean different things for different groups of people--from the prospective buyer to an existing customer, to the pentester delivering the test, to practitioners in our industry. There are several factors that make up a good pentest; in this workshop, we will uncover some of these factors and why they are important. Each topic has nuances, potential pitfalls and areas of focus, which we will discuss to prepare you for your next pentest engagement.
We will touch on the following topics:
- Preparation - This includes the sales cycle, scope agreement, and credential sharing; in short, everything that is needed to perform the test is gathered during this step.
- Kickoff/Onboarding - This is where stakeholders and the delivery team meet to align their expectations and approach.
- Testing - This is the main activity for the penetration testers; it includes discovery, threat modeling, exploitation, post-exploitation, etc.
- Reporting - How are reports shared, what options are available, does it work for your team?
- Re-testing - This is where the recommended remediation steps are implemented and can be double-checked to ensure the vulnerabilities are no longer present and the exploits are no longer viable.
- Feedback - Here, we gather information about how the test went, how pentesters performed, how engaged the customer was, etc.

Automation in Security Operations: Enhancing Efficiency and Responsiveness
In the fast-paced world of cybersecurity, automation has become essential for improving efficiency and responsiveness in security operations. This workshop will explore how organisations can leverage automation tools to streamline incident response, reduce manual workloads, and enhance overall security posture. Participants will gain insights into practical applications of automation in threat detection, monitoring, and remediation, enabling them to respond more effectively to emerging threats.
Key Takeaways:
- Discover key automation tools and techniques that can enhance security operations and reduce response times.
- Learn how to implement automation strategies that improve efficiency and bolster your organisation’s cybersecurity defences.

Live Demo Hosted by Netskope
Get hands-on with the latest technology from Netskope. Explore real-world applications, see the platform in action, and discover how it may support your cybersecurity strategy.

Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
Closing Remarks
o round off the day, our Master of Ceremonies will share a few final reflections and key takeaways from the summit. It’s a moment to pause, recap the insights, and recognise the contributions of our speakers, partners, and delegates.
Following the closing remarks, please join us for light drinks and nibbles — a final chance to connect before heading on your way.
Drink & Nibbles
Join Us
Register Interest
Meet with fellow industry leaders and solve today’s greatest business
challenges.
Join Our Partner Network
Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.
Join the Executive Community
Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.