The Future of Cybersecurity

CISO Think Tank

April 20, 2022 - Atlanta, GA

Attend this event

Company is Required

By clicking the “Register" button, you are agreeing to the Privacy Policy and Terms of Use


David Levine Ricoh Americas Corporation
David Levine

VP Corporate & CSO

Ricoh Americas Corporation

Think Tank Speaker

David Levine is Vice President of Corporate and Information Security & CSO for Ricoh USA. In this role, he has responsibility for corporate security, investigations, operational security (cyber and physical), security policy, access management, eDiscovery and litigation support and HIPAA Compliance. Levine chairs Ricoh’s Security Advisory Councils and HIPPA Board of Directors, leads Ricoh’s Global Virtual Security team and is routinely engaged in customer opportunities to discuss risk and security. Levine has held a wide and diverse variety of positions during his 23-year tenure with the company, including IT engineering, project management, vendor management, Six Sigma and Technology Infrastructure and End User Services leadership, giving him a great perspective on technology, the business and security. Levine is an Atlanta Co-chair for Evanta's CISO Governing Body, a member of Argyle's CISO Advisory Board, a member of Forrester Research’s Security & Risk Leadership Board, Gartner's CISO Coalition and the FBI’s InfraGard Program. He is a quarterly contributor to CSO online. He holds a Bachelor of Arts degree in Information Systems with minors in Computer Science and Business from Eckerd College.

Robert Smith Noname Security
Robert Smith

Field CISO

Noname Security

Think Tank Speaker

Information Technology Leader with a focus on Security, Architecture and Operations. Experienced in regulatory compliances & security frameworks: HIPAA, PCI, SOX, COBIT, ISO, NIST, SANS20. Consistently leading strategic planning, policy development and day-to-day operations of information security function in close coordination with all corporate departments aligned with corporate vision. Proficient in target enumeration, vulnerability assessments, risk analysis and management, open source intelligence gathering, social engineering, IDS/IPS and SIEM tools.

Adolph Barclift Five Star Bank
Adolph Barclift


Five Star Bank

Think Tank Speaker

Adolph Barclift serves as the Chief Information Security Officer for Five Star Bank based in Rochester New York. He leads their information security and compliance functions. His responsibility includes data security operations, vulnerability management, fraud detection and regulatory compliance across heterogeneous operational environments. He has more than 20 years experience in information systems solution delivery, information security and data visualization.

Ken Foster (1) FLEETCOR
Ken Foster

VP of IT Governance, Risk and Compliance


Think Tank Speaker

Accomplished CISO with proven track record of implementing Cyber Security programs and strategy, a US Navy Veteran with expertise in Information Risk, Governance, and IT enterprise operations and enterprise architecture in the public and private sectors. Transformational leader that excels at developing and implementing strategic, technical, and operational security/infrastructure architectures that are aligned with business goals and objectives using a risk based methodology. Established history of innovation, utilizing technology and processes effectively to minimize operational risk, cost, and increase operational efficiency to meet business goals by building a strategy that becomes a business differentiator.

John Wheeler Cognizant
John Wheeler



Think Tank Speaker

John Wheeler has over 23 years of experience in the cybersecurity industry, starting as a pioneer in the emerging managed security services market in the late 90s. He has spent the last two decades building high-growth market-leading cybersecurity businesses that have helped enterprises, governments and institutions around the world defend themselves against an evolving and dynamic range of cyber risks. John is currently the VP and Chief Business Information Security Officer for Cognizant. John was previously the CISO and Vice President of Integrated Solutions for IBM Security. As CISO, John was responsible for IBM Security’s cyber risk program. As the VP of Integrated Solutions, John was responsible for bringing together IBM Security’s products, services and partners to design, build and manage solutions for its most demanding clients. Prior to this role, John held multiple executive leadership positions with a broad range of responsibilities including strategy, offering management, alliances, development, engineering sales, operations and services delivery. John has a passion for building diverse teams that can transform business with breakthrough ideas and innovation. He is a dedicated advocate and frequent speaker on the value of diversity and inclusion and cyber security talent programs.

Michael Owens Equifax
Michael Owens



Think Tank Speaker

Dr. Michael Owens is an innovative, collaborative, and distinguished leader with over 25 years of experience in startup, corporate, government, and military organizations. A transformation leader and sought-after speaker, Michael frequently keynotes on topics related to cybersecurity, cyberwarfare, and national security matters. As a cybersecurity executive, he has been at the vanguard of some of the most complex issues dealing with breach mitigation/recovery, threat intelligence sharing, and diversity within the tech and cyber industry. Michael is the president and CEO of the U.S. Global Center of Cyber Policy, where he leads the organization in providing federal, state, and local governments with non-partisan thought leadership and expert information and analysis on cybersecurity, cybercrime, and cyberwarfare trends, strategies, and policies from a domestic and international perspective. Prior to this, Michael led the Global Cybersecurity, Cybercrime, and Critical Infrastructure Program for EY within the Forensics, Investigations & Dispute division. In that role, he was responsible for the global strategic direction and standardization of threat intelligence, cybersecurity assessments, audits, and incident response services. Before this, Michael worked at Cisco Systems leading the Advanced Services, Public Sector service delivery team. During this time, he led cybersecurity, wired and wireless networks, and IT strategy engagements for government agencies in the U.S. southeast across and New York. Michael has extensive international and geopolitical experience with projects completed in over 100 countries. As an entrepreneur, Michael pioneered the practice of SMB MSP and fractional CIO/CISO services. Michael is an eight-year veteran of the United States Marine Corps and a current member of the US Marine Corps Cyber Auxiliary. He is a member of the World Affairs Council of Atlanta, a Political Partner with the Truman National Security Project, and serves on the State Advisory Committee for the US Global Leadership Coalition, the Evanta/Gartner Atlanta CISO Governing Body, and the Leadership Board of the Cybersecurity Collaboration Forum. Michael's educational background includes a bachelor’s from North Carolina A&T State University, a master’s degree from Georgia Institute of Technology, a doctorate from California Intercontinental University, and advanced certificates and executive programs from the U.S. Army War College and Harvard University. He resides in Mableton, Georgia with his two children.

Tony Hadfield Venafi
Tony Hadfield

Sr Director of Solution Architects


Think Tank Speaker

Tony has spent the last 24 years of his career focused on computer security after leaving HP where he was in software QA. Since 1998 when he joined McAfee as a software developer, his experience includes Antivirus, Network Security, White Listing, Data at Rest and Data and in Motion Encryption. After 7 years with Vormetric/Thales Tony joined Venafi and works with strategic accounts in many verticals including manufacturing, retail, finance and healthcare.

Ben Halpert Groupon
Ben Halpert



Think Tank Speaker

Ben Halpert is a man on a mission: to educate and empower today’s digital citizens in the workplace, at schools, and at home. By day, he is the CISO at Groupon bringing his global experience in Risk Management, Cyber Security, Physical Security, Audit, Privacy, Compliance, and IT to benefit their merchants and customers. By night, he champions cyber ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded in 2007. Ben is honored to speak and keynote at conferences and events worldwide. He has presented at the World Economic Forum, multiple times at the RSA Security Conference, InfoSec World Conference & SecureWorld events. Ben was invited to present at TEDxKids@Vilnius (Raising Savvy Cyber Kids) and TEDxSaintThomas (Technology addiction and what you can do about it). In addition, Ben has presented at IEEE, ACM, CSO50, CISO Summits, the Worth Safety & Security Summit and many other events over his career. Based on his early research and experience in the then emerging field of Cloud Computing, Ben was invited to publish Auditing Cloud Computing: A Security and Privacy Guide through John Wiley & Sons. Ben was a contributing author to Readings and Cases in the Management of Information Security and the Encyclopedia of Information Ethics & Security, wrote the security column for Mobile Enterprise Magazine and has contributed to seven NIST special publications. Through Savvy Cyber Kids, Ben provides cyber ethics educational and awareness sessions for parents, teachers, and students – from preschool through high school. Ben is the award-winning author of The Savvy Cyber Kids at Home children’s book series (The Family Gets a Computer, The Defeat of the Cyber Bully, and Adventures Beyond the Screen). As a trusted voice on a variety of cyber security issues, Ben has made numerous TV and radio appearances and has been featured in newspapers and magazines such as The New York Times, Wired, BBC, Kilinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, RTVI, 11 Alive, WSB-TV, among others.

Elizabeth Mavetz ISACA - Atlanta
Elizabeth Mavetz


ISACA - Atlanta

Think Tank Speaker

Elizabeth Mavetz is the current President of ISACA Atlanta and a seasoned GRC leader with over 20 years of experience in Information Technology. She has spent the last 7 years working as a GRC leader in the property & casualty insurance and healthcare industries. In her day job, Elizabeth is the Manager of Information Security at Piedmont Healthcare. She is responsible for leading GRC strategy, 3rd party risk management, policy governance and information security training for 20 hospitals and hundreds of physician practices across Georgia. Elizabeth has an MBA with emphasis in management of information systems and currently holds the following certifications: CRISC, CDPSE, PCIP.

Bill Besinger Cynet
Bill Besinger

Director of Sales, North America


Think Tank Speaker

Bill Besinger manages the North American Direct Sales Teams at Cynet. In his role, Bill has built Cynet’s GTM strategy from the ground up. Prior to Cynet, Bill spent the past seven years managing teams in start-ups in North America and the UK. His previous experience ranges from Network Performance Solutions to SaaS Backup Products.

Bill graduated from Babson College in 2011 and has been in sales ever since.

Cynet is an Israeli-based cybersecurity company that developed the world’s first end-to-end, natively automated cybersecurity platform that is backed by a 24/7 managed detection and response (MDR) service. In 2020, Cynet broke into the North American market and has seen explosive growth in the Commercial and SME segments.

Steve Zalewski (1) Levi Strauss & Co.
Steve Zalewski

Former CISO

Levi Strauss & Co.

Think Tank Speaker

Mr. Zalewski currently provides CISO, security consulting and security advisory services. These include: • International cybersecurity advisor and trainer. • Executive advisory board member for security startups, providing guidance on security market direction and product requirements. • CISO advisory board member for venture capital firms internationally. • vCISO for companies requiring temporary or part-time CISO expertise. Services also include guidance and solutions to address incident response, security program design, security assessment, security due-diligence, vendor/supplier due-diligence, security architecture review, board reporting and other key security leadership requirements. Operational experience in Healthcare, Utilities and International Retail verticals. Key Strengths: •Organizational Management •Strategic Planning & Execution •Enterprise Security Architecture/Strategy •Executive and BOD Security Governance/Reporting •Cybersecurity Incident Response •Security Risk & Compliance Management Additionally, I co-hosts the CISOSeries Defense-in-Depth Podcasts and am a frequent speaker and panel moderator at industry events.

Tamar Bar Ilan
Tamar Bar Ilan

Co-founder & CTO

Think Tank Speaker

Tamar Bar-Ilan is the Co-Founder and CTO of Cyera. Upon graduating from the IDF's prestigious Talpiot Leadership Academy, Tamar entered into its elite cyber Unit 8200 where he built and ran the unit's cloud security division. As Israel’s National Security Agency, Unit 8200 was tasked with addressing advanced cyber threats by developing new processes and technologies. This experience allowed Tamar to hone his technical and practical expertise, and experience firsthand the unique challenges of securing data in the cloud. This experience inspired Tamar - and long-time friend Yotam Segev - to found Cyera in 2021. As CTO, Tamar guides Cyera’s deep commitment to understand and protect data by developing advanced technology and tools through customer-inspired innovation.

Kelvin Arcelay EVO Payments International
Kelvin Arcelay

SVP, Information Security & IT Risk Management

EVO Payments International

Think Tank Speaker

Published industry expert with solid technical background, domestic and international successes delivering strategic solutions, global and culturally diverse teams, Cyber-security and process optimization. Specialties: - Customer-focused, revenue-optimization opportunities - Repeated successes optimizing service delivery strategies in multiple industries - Information Governance, Risk Management and Internal Controls - M&A Due Diligence and Integrations - Cyber-security and Internal Controls Risk ManagementPublished industry expert with solid technical background, domestic and international successes delivering strategic solutions, global and culturally diverse teams, Cyber-security and process optimization. Specialties: - Customer-focused, revenue-optimization opportunities - Repeated successes optimizing service delivery strategies in multiple industries - Information Governance, Risk Management and Internal Controls - M&A Due Diligence and Integrations - Cyber-security and Internal Controls Risk Management

Deena Swatzie Truist
Deena Swatzie

SVP, Corporate Cyber Strategy Leader


Think Tank Speaker

Providing industry-leading practices in cyber-risk management and compliance while implementing an effective cybersecurity program that protects against threats, advances transformation, and drives growth.


All times Eastern Time

12:00 PM-12:50 PM

Welcome & Registration

12:50 PM-1:35 PM

Application Security in a DevOps, Cloud and API World

Security teams are challenged to modernize application security practices in light of accelerating shifts to DevOps delivery models and rapid adoption of cloud-native application designs. Applications built on microservices (e.g. serverless, containers, APIs) and delivered continuously are outpacing application security teams ability to secure them. CISOs need to consider new skills, new touch points and new platforms to maintain a strong security posture in light of these trends and the speed at which they are re-shaping IT.
In partnership with:
Noname Security

1:40 PM-2:35 PM

Zero Trust Network

A zero-trust approach to security has been steadily gaining steam for the last several years. The importance of this approach reached a new level with the May 2021 White House executive order requiring federal agencies to shift to this architecture by fall 2024.

Ransomware continues to grow and clearly as remote work became the new norm, and e-commerce increased. Leaders need to establish a mature level of cyber resilience to better handle ransomware and other potential data breaches. Luckily, zero trust can play a critical part in that strategy as more and more businesses are realizing that to build customer trust they must establish zero tolerance for trust in their security strategy. Will Zero Tolerance for Trust redefine the state of security as government and private industry scrutinize their trusted relationships more, and re-evaluate the ‘who, what, why’ in 2022 more than any other year?

As organizations race toward digital transformation, the reliance on secure machine-to-machine communications has caused an exponential increase in the number of SSL/TLS certificates organizations need to manage and protect. With InfoSec teams struggling to extend necessary certificate management and security, certificate-related outages are on the rise. When sites, services and applications fail due to expired or misconfigured certificates, these failures cause time-consuming, expensive and even job threatening challenges.

In partnership with:

2:35 PM-2:50 PM

Networking Break

2:50 PM-3:35 PM

Supply Chain Technology

Many large enterprises in today’s fiercely competitive climate look toward optimizing its supply chain to increase business scale and agility. By harnessing a combination of technologies like artificial intelligence, machine learning, and predictive analytics, companies can automate and create new customer experiences that increase satisfaction and boost sales. Gaps remain in supply chain cyber security even as digitalization accelerates. By doing so, companies are left vulnerable to the growing risk of a cyber-attack. There is no shortage of stories illustrating the dangers of lax cyber security, with the biggest attacks able to utterly paralyze an operation and cause millions in losses. Despite this obvious danger, efforts to improve cyber security are progressing slowly. Future risks to the supply chain will involve software, cloud-based infrastructures, and hyper-converged products, rather than simply hardware. Even after many years of experience, capable CISOs find they may not be equipped to overcome the cybersecurity concerns that arise from building control contractors.

3:40 PM-3:55 PM

Native Vs. Open: Choosing the right XDR for your organization

Extended Detection and Response (XDR) continues to be one of the most discussed technologies in cybersecurity. XDR promises far better security outcomes at a lower cost than the current security stack approaches most that most larger enterprises currently have in place. One sticky point that keeps arising in the XDR discussion has to do with the different technology approaches XDR providers rely upon to deliver platform capabilities. Most of us have heard the two primary approaches mentioned – Native XDR and Open XDR – but may be confused by all the vendor and analyst messaging. Join our discussion for an overview of these XDR approaches to better understand the benefits and shortcomings of each to help determine which option is better for your organization.

3:55 PM-4:10 PM

Networking Break

4:10 PM-5:05 PM

Cloud Data Security

According to Gartner, 79% of companies have experienced at least one cloud data breach during the pandemic. But the migration of critical business data to the cloud shows no sign of slowing. In fact, it’s accelerating. Yet, despite powerful trends and mounting threats, traditional data security has simply not kept pace with the cloud. Security teams still struggle to even understand the reality of what sensitive data they have in the cloud and its associated risks. This is not a sustainable status quo. Data is increasingly business’ most valuable asset. And until organizations can align around a shared Data Reality, cloud security will remain several steps behind intensifying security threatens and tightening data regulations.

In partnership with:

5:05 PM-5:15 PM

Closing Remarks

5:15 PM-6:30 PM

Cocktail Hour

In Partnership With