Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Services
Experts
Events

Select a tab

WWT Field CISOs

In today's complex environment, CISOs require the support of exceptional partners capable of providing expert knowledge and impartial advisory amidst the constant demand for enhanced security measures. Our Field CISOs serve as essential subject matter experts, combining a practitioner's depth of technical credentials with extensive real-world security leadership experience. 

The team comprises seasoned experts, providing our clients with the full spectrum of a qualified risk officer's expertise and a high-caliber support team. They are dedicated to aiding CISOs in maneuvering through the complex and challenging arena of cybersecurity, protecting and defending enterprises with strategic collaboration and expert guidance.

Our model ensures you have continuous access to expertise, technology and best practices ready to guide your strategic security decisions and protect your digital operations. 

Mario Balakgie

Mario Balakgie

AVP Global Field CISO
Robert Geis

Robert Geis

Field CISO - Global Cyber
Bryan Liebert

Bryan Liebert

CISO - East & Public Sector
Michael Spotts

Michael Spotts

Chief Security Advisor
Chris Schwind

Chris Schwind

Field CISO
Ryan Devine

Ryan Devine

CISO Advisor

How we help

Proactive cyber risk management

Identify and mitigate cyber risks, developing robust strategies for risk reduction and proactive threat management.

Collaborative business integration

Integrate security insights with business strategies, ensuring a seamless alignment of cybersecurity excellence with corporate objectives.

Building trust and credibility

Establish trust and credibility with key stakeholders across the organization using in-depth knowledge of cybersecurity best practices and compliance.

Empowering organizational success

Leverage tailored security solutions informed by the latest industry trends to ensure a competitive edge in a dynamic digital environment. 

Connect with a Field CISO

Engaging a Field CISO from WWT is a straightforward process that promises a tailored approach to enhancing your organization's cybersecurity posture. Ask your WWT account representative to connect you or reach out to FieldCISOTeam@wwt.com for experienced cybersecurity experts ready to guide you through the intricate dynamics of modern cyber environments. 

Explore more from the team

Check Point and the Post-Quantum Transition

Quantum computing's rise threatens classical cryptography, prompting urgent shifts to post-quantum cryptography (PQC). Check Point leads this transition with quantum-ready solutions, ensuring secure communications through hybrid key exchanges and cryptographic agility. As PQC standards evolve, Check Point's architecture promises seamless adaptation, safeguarding digital infrastructures against future quantum threats.
Blog
•Oct 29, 2025

The Life of a Security Girl

In honor of Cybersecurity Awareness Month, we're calling out all the masterminds to show that understanding your digital defense shouldn't feel like you just need to tolerate it. Instead, we'll map essential concepts to Taylor Swift's newest hits so you can shake it off and finally realize that having a security strategy is your ultimate getaway car to safety, ensuring your data is always safe and sound.
Blog
•Oct 23, 2025

Practical Magic: Let's Build Zero Trust

How do you implement a security concept that feels like magic? The answer isn't an illusion; it's a practical craft. We're moving beyond theory to provide the blueprint: 5 concrete steps that build this powerful idea into a tangible, resilient defense for your organization.
Blog
•Oct 10, 2025

Scattered Spider and the Insurance Industry

Scattered Spider exploits the insurance industry's vulnerabilities through advanced social engineering, targeting legacy systems and human weaknesses. As cyber threats evolve, insurers must transition from prevention to resilience, focusing on rapid detection and response. The industry's future hinges on integrating technology, processes and human awareness to thwart these sophisticated attacks.
Blog
•Aug 31, 2025

Cybersecurity Risk & Strategy

A comprehensive cybersecurity strategy embodies IT governance, security, and privacy based on IT risk management.

1119 Followers

At a glance

227Total
77Blogs
57Articles
26Videos
23Events
13Case Studies
8Learning Paths
7Briefings
7Labs
4Workshops
2Communities
2WWT Research
1Assessment
What's related
  • Security
  • Blog
  • Security Operations
  • AI Security
  • WWT Presents
  • Network Security
  • Cyber Resilience
  • AI & Data
  • Cloud
  • What we do
  • Consulting Services
  • Cloud Security
  • Fortinet
  • Applied AI
  • ATC
  • Endpoint Security
  • Cisco
  • Data Security
  • Financial Services
  • Cyber Range

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies