Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

WWT Field CISOs

In today's complex environment, CISOs require the support of exceptional partners capable of providing expert knowledge and impartial advisory amidst the constant demand for enhanced security measures. Our Field CISOs serve as essential subject matter experts, combining a practitioner's depth of technical credentials with extensive real-world security leadership experience. 

The team comprises seasoned experts, providing our clients with the full spectrum of a qualified risk officer's expertise and a high-caliber support team. They are dedicated to aiding CISOs in maneuvering through the complex and challenging arena of cybersecurity, protecting and defending enterprises with strategic collaboration and expert guidance.

Our model ensures you have continuous access to expertise, technology and best practices ready to guide your strategic security decisions and protect your digital operations. 

Mario Balakgie

Mario Balakgie

AVP Global Field CISO
Robert Geis

Robert Geis

Field CISO - US Central
Bryan Liebert

Bryan Liebert

CISO - East & Public Sector
Jason Cook

Jason Cook

Chief Information Security Officer In Residence
Chris Schwind

Chris Schwind

Field CISO
Ryan Devine

Ryan Devine

CISO Advisor

How we help

Proactive cyber risk management

Identify and mitigate cyber risks, developing robust strategies for risk reduction and proactive threat management.

Collaborative business integration

Integrate security insights with business strategies, ensuring a seamless alignment of cybersecurity excellence with corporate objectives.

Building trust and credibility

Establish trust and credibility with key stakeholders across the organization using in-depth knowledge of cybersecurity best practices and compliance.

Empowering organizational success

Leverage tailored security solutions informed by the latest industry trends to ensure a competitive edge in a dynamic digital environment. 

Connect with a Field CISO

Engaging a Field CISO from WWT is a straightforward process that promises a tailored approach to enhancing your organization's cybersecurity posture. Ask your WWT account representative to connect you or reach out to FieldCISOTeam@wwt.com for experienced cybersecurity experts ready to guide you through the intricate dynamics of modern cyber environments. 

Explore more from the team

For Better or For Breach: RSA 2025's Commitment to Cyber Unity

The month of May marks the kickoff of both wedding and conference season, a time when people come together to share journeys and celebrate new beginnings. The RSA Conference 2025 exemplified this spirit, bringing together a diverse array of cybersecurity professionals, innovators and thought leaders to tackle ever-evolving threats. Drawing inspiration from the wedding adage "Something Old, Something New, Something Borrowed, Something Blue," we will explore the key themes and insights from this year's event.
Blog
•May 6, 2025

Key Takeaways from DISTRIBUTECH 2025

The flagship transmission and distribution event provided insight into how electric utilities can stay ahead of growing energy complexities.
Blog
•Apr 10, 2025

The Grizzled CyberVet's Tactical Plan: Mapping Palo Alto Networks to MITRE ATT&CK

Next up in the Grizzled CyberVet series: A global enterprise faces a full-scale cyberattack spanning every stage of the MITRE ATT&CK framework. Armed with Palo Alto Networks' full security platform, they stop the threat at every turn. Learn how a unified security strategy can outmatch attackers before they succeed. Read on to see it in action!
Blog
•Mar 19, 2025

The Grizzled CyberVet: How Palo Alto Networks Powers End-to-End Cyber Defense

Fragmented security solutions create inefficiencies and vulnerabilities. This article explores how Palo Alto Networks' integrated platform addresses these gaps, breaking the cybersecurity kill chain at every stage. By consolidating security functions, organizations enhance threat prevention, streamline operations and reduce costs. Learn how a unified approach strengthens defenses and why proactive security is essential for business resilience.
Blog
•Mar 14, 2025

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1104 Followers

At a glance

203Total
71Blogs
48Articles
24Videos
21Events
12Case Studies
7Briefings
7Learning Paths
6Labs
2Communities
2Workshops
2WWT Research
1Assessment
What's related
  • Security
  • Blog
  • Security Operations
  • AI Security
  • WWT Presents
  • Network Security
  • Cyber Resilience
  • AI & Data
  • What we do
  • Cloud
  • Consulting Services
  • Fortinet
  • Cloud Security
  • Cisco
  • Endpoint Security
  • AI Solutions
  • ATC
  • Financial Services
  • Healthcare
  • Cisco Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies