Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

WWT Field CISOs

In today's complex environment, CISOs require the support of exceptional partners capable of providing expert knowledge and impartial advisory amidst the constant demand for enhanced security measures. Our Field CISOs serve as essential subject matter experts, combining a practitioner's depth of technical credentials with extensive real-world security leadership experience. 

The team comprises seasoned experts, providing our clients with the full spectrum of a qualified risk officer's expertise and a high-caliber support team. They are dedicated to aiding CISOs in maneuvering through the complex and challenging arena of cybersecurity, protecting and defending enterprises with strategic collaboration and expert guidance.

Our model ensures you have continuous access to expertise, technology and best practices ready to guide your strategic security decisions and protect your digital operations. 

Mario Balakgie

Mario Balakgie

Area Vice President
Robert Geis

Robert Geis

Field CISO
Bryan Liebert

Bryan Liebert

Field CISO
Michael Spotts

Michael Spotts

Chief Advisor
Chris Schwind

Chris Schwind

Field CISO
Ryan Devine

Ryan Devine

Field CISO

How we help

Proactive cyber risk management

Identify and mitigate cyber risks, developing robust strategies for risk reduction and proactive threat management.

Collaborative business integration

Integrate security insights with business strategies, ensuring a seamless alignment of cybersecurity excellence with corporate objectives.

Building trust and credibility

Establish trust and credibility with key stakeholders across the organization using in-depth knowledge of cybersecurity best practices and compliance.

Empowering organizational success

Leverage tailored security solutions informed by the latest industry trends to ensure a competitive edge in a dynamic digital environment. 

Connect with a Field CISO

Engaging a Field CISO from WWT is a straightforward process that promises a tailored approach to enhancing your organization's cybersecurity posture. Ask your WWT account representative to connect you or reach out to FieldCISOTeam@wwt.com for experienced cybersecurity experts ready to guide you through the intricate dynamics of modern cyber environments. 

Explore more from the team

Stop Treating Cloud Security Like a Post-Deployment Fire Drill

Cloud environments ship too fast for security reviews that happen after deployment. This post breaks down what DevSecOps and cloud workload security look like when they're actually integrated — security requirements defined before code is written, pipeline gates that enforce rather than just report, and runtime findings that feed back to the team that owns the workload. Security built in, not bolted on.
Blog
•Mar 23, 2026

Beyond the Big Stages: Why Grassroots Cybersecurity Events Matter

Cybersecurity isn't just built at RSA and Black Hat. It happens in local communities, regional events and grassroots conversations—and that's where organizations should be investing more of their time and energy.
Blog
•Mar 19, 2026

Is Your Branching Strategy a Security Control or Just a Workflow?

Shift-left security only works if the foundation underneath it is built to enforce it —and that foundation starts with your branching strategy. This post makes the case that branching isn't just a developer workflow decision; it's a security architecture decision. We cover what branch protection actually enforces, how to choose the right model for your team, the three controls to implement this week, and how WWT's Cloud Workload Security practice helps teams build this foundation through hands-on workshops and implementation guidance.
Blog
•Mar 9, 2026

Stop Stacking Boxes. Start Designing Security.

Back-to-back firewalls were effective 15-20 years ago, but in today's encrypted, identity-driven and rapidly evolving threat landscape, they add cost and complexity without meaningful protection. Modern security replaces duplicated perimeters with platform-integrated NGFW enforcement, segmentation and coordinated prevention—delivering stronger, measurable defense through intelligent design rather than stacked legacy controls.
Blog
•Feb 17, 2026

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1129 Followers

At a glance

215Total
86Blogs
51Articles
26Videos
16Events
13Case Studies
9Labs
8Learning Paths
3Workshops
2Communities
1Briefing
What's related
  • Security
  • Blog
  • AI Security
  • Security Operations
  • Network Security
  • Cyber Resilience
  • ATC
  • AI & Data
  • Cloud
  • WWT Presents
  • Cloud Security
  • Data Security
  • What we do
  • Zero Trust
  • Consulting Services
  • Fortinet
  • Public Sector
  • Cyber Range
  • Endpoint Security
  • Cisco

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies