Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

WWT Field CISOs

In today's complex environment, CISOs require the support of exceptional partners capable of providing expert knowledge and impartial advisory amidst the constant demand for enhanced security measures. Our Field CISOs serve as essential subject matter experts, combining a practitioner's depth of technical credentials with extensive real-world security leadership experience. 

The team comprises seasoned experts, providing our clients with the full spectrum of a qualified risk officer's expertise and a high-caliber support team. They are dedicated to aiding CISOs in maneuvering through the complex and challenging arena of cybersecurity, protecting and defending enterprises with strategic collaboration and expert guidance.

Our model ensures you have continuous access to expertise, technology and best practices ready to guide your strategic security decisions and protect your digital operations. 

Mario Balakgie

Mario Balakgie

AVP Global Field CISO
Robert Geis

Robert Geis

CISO in Residence - Global Cyber
Bryan Liebert

Bryan Liebert

CISO - East & Public Sector
Jason Cook

Jason Cook

VP, Global Chief Technology Officer for GSP
Chris Schwind

Chris Schwind

Field CISO
Ryan Devine

Ryan Devine

CISO Advisor

How we help

Proactive cyber risk management

Identify and mitigate cyber risks, developing robust strategies for risk reduction and proactive threat management.

Collaborative business integration

Integrate security insights with business strategies, ensuring a seamless alignment of cybersecurity excellence with corporate objectives.

Building trust and credibility

Establish trust and credibility with key stakeholders across the organization using in-depth knowledge of cybersecurity best practices and compliance.

Empowering organizational success

Leverage tailored security solutions informed by the latest industry trends to ensure a competitive edge in a dynamic digital environment. 

Connect with a Field CISO

Engaging a Field CISO from WWT is a straightforward process that promises a tailored approach to enhancing your organization's cybersecurity posture. Ask your WWT account representative to connect you or reach out to FieldCISOTeam@wwt.com for experienced cybersecurity experts ready to guide you through the intricate dynamics of modern cyber environments. 

Explore more from the team

From Alerts to Action: Quantifying Cloud Risk with Wiz & WWT

Integrating Wiz CSPM issues for financially quantified risk insights
Blog
•Jul 24, 2025

A study in flexible innovation, and forming a new partnership based on trust.

The Filigran partnership enables our teams to provide new ways to enable a more holistic advanced persistent threat (APT) search and remediation methodology based on the combination of breach and attack simulation functions, while taking advantage of native integrations coupled with industry-standard, widely deployed agent technologies.
Blog
•Jul 17, 2025

Wands at the Ready: Navigating Data Protection and Sovereignty

Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1112 Followers

At a glance

208Total
74Blogs
49Articles
23Videos
21Events
13Case Studies
7Briefings
7Learning Paths
6Labs
3Workshops
2Communities
2WWT Research
1Assessment
What's related
  • Security
  • Blog
  • Security Operations
  • AI Security
  • WWT Presents
  • Network Security
  • Cyber Resilience
  • AI & Data
  • What we do
  • Consulting Services
  • Cloud
  • Cloud Security
  • Applied AI
  • Cisco
  • Fortinet
  • ATC
  • Endpoint Security
  • Financial Services
  • Healthcare
  • Cisco Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies