Hi [[ session.user.profile.firstName ]]

Do you know where your next cyber security threat is likely to come from?

The biggest threat to an organizations cyber security isn't malware, phishing scams or even hackers - it is its employees. According to Gartner Inc, "people continue to be the weakest link in the security chain, as criminal social engineering ploys reach new levels of deviousness".

Join this compelling webcast that will address how to protect your employees against your next cyber security threat. This will also tackle key causes for major security attacks:

- Naive and disgruntled end-users
- The disappearance of the corporate perimeter
- Mobile devices becoming ideal entry points
- Lack of layered defenses
Recorded Jun 18 2015 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
Presentation preview: Do you know where your next cyber security threat is likely to come from?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • RANSOMWARE: Your Money or Your Data Protecting the Public Sector from Ransomware Apr 27 2017 5:00 pm UTC 60 mins
    Bil Harmer, Strategist, Office of the CISO, Zscaler
    Cyber extortion is on the rise, and the public sector is particularly vulnerable. A study conducted by a leading cybersecurity threat management firm reported that state and local government networks are twice as likely as their commercial counterparts to be infected with either ransomware or malware.
    Why are ransomware perpetrators increasingly setting their sights on the public sector? First, many agencies and public institutions rely on legacy systems that are challenged to meet all of today’s cybersecurity threats. Second, the proliferation of devices and technology platforms, including smartphones, tablets and mobile apps, are giving hackers more points of entry into public sector networks. Are you prepared for such an attack?

    Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your organization and steps you can take to secure your network and systems.

    Bil will also cover:

    - How ransomware has evolved
    - Lessons learned from recent attacks
    - Why cloud sandboxing is so important
    - Tips for mitigating ransomware

    For more information about Zscaler, go to www.zscaler.com

    Bil Harmer leads Zscaler’s Office of the CISO for the Americas, where he advises organizations on best practices for implementing cloud-based cybersecurity solutions. A veteran of the IT industry, he has helped startups, governments, and financial institutions design and implement security programs. Bil pioneered the use of the SAS70 coupled with ISO, to create a trusted security audit methodology used by the SaaS industry. A highly sought-after speaker, Bil frequently presents on security and privacy-related topics at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance.
  • Security Predictions for 2017 Recorded: Feb 27 2017 54 mins
    Michael Sutton, CISO, Zscaler
    The world is undergoing a fundamental change in 2017, much of it driven by fear and uncertainty. Alliances are being reassessed, borders are being redrawn and companies are rethinking their approach to security. What are the new looming threats out there? Who are the biggest perpetrators of cybercrime? And how best should we be protecting our companies? Join Michael Sutton, CISO at Zscaler as he discusses our top 10 security predictions for 2017.
  • Dissecting the latest security attacks Recorded: Feb 27 2017 42 mins
    Deepen Desai, Senior Director Security Research, Zscaler & Gerard Festa, Senior Director Product Marketing, Zscaler
    This webcast will cover recent attacks and a discussion on what you need to know to mitigate the risk and protect your users. It will highlight the innovative techniques hackers are using in today’s threat landscape along with the best practices and security recommendations to defend against multi-stage attacks.
  • Office 365 is all the rage - but is your network ready? Recorded: Jul 27 2016 62 mins
    Manoj Apte, Senior Vice President of Product Management, Zscaler, Inc.
    Microsoft Office 365 has taken the market by storm and has been Microsoft’s fastest selling product for a while now. However, amidst all this excitement, there are significant impacts to network and security architecture. Enterprises need to be prepared to manage 6 key issues:

    1. Increased network bandwidth usage
    2. Slow traffic & poor user experience
    3. Increased security headaches
    4. Mobile security
    5. Visibility & compliance
    6. Limitations of traditional on-premise security appliances

    Join Dr. Manoj Apte, Senior Vice President of Product Management, Zscaler Inc., for a thought provoking webcast discussing:

    Key considerations to be aware of before you deploy Office 365
    Why security appliances cannot address these challenges effectively
    Best practices for addressing these issues using a cloud based security solution
  • Insights from the 2016 Gartner Magic Quadrant for Secure Web Gateways Recorded: Jul 14 2016 55 mins
    Atri Chatterjee
    According to Gartner, cloud-based security is continuing to grow at a significant rate, spiking at a 35% CAGR compared to 6% for on-premise appliances. This webcast provides deep insights into Gartner's findings that are relevant for CISO's and CIO's.
  • The Next Generation CISO Recorded: Dec 16 2015 58 mins
    Michael Sutton, CISO, Zscaler, Inc.
    Recent high profile security breaches, coupled with the damage to company brand, reputation and high financial penalties, means that cyber-security is now on the boardroom agenda. This is no longer just an IT issue, it is a corporate risk issue, impacting the role of the CISO, who is now expected to provide meaningful and actionable security intelligence to board members.

    According to Forrester, CISO’s need to be able to be able to answer 4 key questions:
    1. What are the new and emerging trends?
    2. What is the plan and how to progress against it?
    3. What is the comparison against peers?
    4. What is the gap from the ideal and the consequences?

    Forrester also cites that 62% of global businesses decision makers are concerned about their organizations information and security risk.*

    Join Michael Sutton, CISO, Zscaler, Inc., for a compelling webcast that will address the evolving role of the CISO, including:

    · The emerging trends in cyber-security CISO’s need to be aware of
    · As a CISO, how best to address the 4 key questions
    · The latest methods cyber-criminals use to infiltrate organizations
    · Key qualities the next generation CISO needs to succeed at the board level and in today’s cyber-threat environment

    *Forrester Report 2015: Security Leaders, Earn Your Seat At The Table
  • Cyber Security is now a Boardroom Agenda Recorded: Oct 20 2015 45 mins
    Kevin Peterson, Director of Security & Network Transformation, Zscaler & Mark Stafford, Senior Cyber Consultant, BT Security
    Cyber security is now a topic of discussion at the majority of board meetings, according to a recent NYSE/Veracode survey*. It is no longer just an IT issue, a policy or compliance issue – it is a corporate risk issue. Forrester Inc., states that CEOs are now mainly held responsible for data breaches – a shift from it solely being the responsibility of the CISO. According to them, any lapses will cost executives their job**. The stakes are very high and getting it wrong has significant consequences, including:

    - Brand damage due to customer loss
    - Loss of competitive advantage due to corporate espionage
    - High cost of responding to a breach

    How prepared is your organization to handle a security breach and discuss this in the boardroom?

    This webcast will address cyber security priorities being discussed at the boardroom level, including:

    - Managing security risk in today’s digital world
    - Securely leveraging key technologies such as cloud, mobile and analytics
    - Addressing security gaps across the ecosystem of customers and suppliers
    - Effectively engaging at the boardroom level, reviewing key metrics and aligning strategy with business priorities

    *NYSE/Veracode 2015 Survey: Cybersecurity in the Boardroom
    **Forrester Inc., Report: Security Leaders, Earn Your Seat At The Table
  • Internet Security Best Practices From The Global 1000 Recorded: Jul 30 2015 51 mins
    Daniel Druker, Chief Marketing Officer at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

    So what can you do today to keep your security ahead of these trends?

    This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

    We will also talk about:

    - The latest strategies and techniques cyber-criminals are using today
    - Concrete steps you can take to keep your organization safe
    - What to do about Internet security in today's cloud and mobile first IT landscape
  • Lessons Learned From the Biggest Security Breaches Recorded: Jul 28 2015 58 mins
    Michael Sutton, VP of Security Research at Zscaler,John Kindervag, VP and Principal Analyst at Forrester Research
    The risk of experiencing a security breach is now higher than ever. Over the last 12 months, some of the highest profile companies have been compromised including Anthem, Sony, Home Depot, JPMorgan Chase, Target and more.

    2015 is turning out to be no different. Clearly no organization is immune to a breach and human error continues to play a primary role.

    This webcast will address:
    - Key trends and traits common to high profile security breaches
    - Critical takeaways and lessons learned for a comprehensive security strategy
    - Best practices to reduce the risk of a security breach
  • Stopping Zero-day Threats Recorded: Jul 23 2015 56 mins
    Dan Maier, Senior Director of Product Marketing, Zscaler Inc.
    If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

    Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

    • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
    • Derive intelligent insights and meaningful data for fast corrective action
    • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
    • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
  • Do you know where your next cyber security threat is likely to come from? Recorded: Jun 18 2015 60 mins
    Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
    The biggest threat to an organizations cyber security isn't malware, phishing scams or even hackers - it is its employees. According to Gartner Inc, "people continue to be the weakest link in the security chain, as criminal social engineering ploys reach new levels of deviousness".

    Join this compelling webcast that will address how to protect your employees against your next cyber security threat. This will also tackle key causes for major security attacks:

    - Naive and disgruntled end-users
    - The disappearance of the corporate perimeter
    - Mobile devices becoming ideal entry points
    - Lack of layered defenses
  • Cloud-Based Cyber Threat Protection Recorded: May 28 2015 5 mins
    Jay Chaudhry, CEO and founder, Zscaler, Inc.
    Jay Chaudhry, CEO and founder of Zscaler joins Francine Lacqua on “The Pulse” to discuss his startup that is revolutionizing the world of internet security. Zscaler is currently the only one that protects against cyber threats with a totally cloud-based solution.
  • Zscaler Customer Case Study: United Airlines Recorded: Feb 10 2015 10 mins
    Michael Kennaugh, VP of IT Business Management at United Airlines
    "With Zscaler, we have found a product that is that powerful" -United Airlines

    Learn why United Airlines relies on Zscaler to address some of their toughest security challenges.
  • Even The Big Guys Get Hacked Recorded: Feb 9 2015 39 mins
    Michael Sutton, VP of Security Research at Zscaler
    Visibility & Control Are The Keys To Combating Data Breaches

    If Target Corporation, Neiman Marcus, Google and Yahoo can fall victim to security breaches – no organization is immune to being hacked. And the stakes are high – often involving:

    - Consumer privacy issues
    - Company reputation
    - Financial loss
    - Intellectual property theft

    Today's cyber attacks are sophisticated, often combining social engineering and zero-day exploits for infection. The key to combating advanced persistent threats is having "real-time visibility" and "intelligent insight" into your corporate infrastructure. This also includes the ability to track employee traffic across your corporate infrastructure in real time and derive meaningful data for fast corrective action.

    This webinar will discuss the latest challenges, trends and critical requirements to combat advanced cyber threats. A specific focus will be on how timely visibility drives Detection, Remediation and Protection.
  • Real Clouds, Fake Clouds And Appliances Recorded: Jan 13 2015 51 mins
    Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler Inc.
    The Facts, Myths & FUD's for Enterprise Security

    Many incumbent security vendors offer old, appliance-based technology and fake clouds – all touting to deliver the true benefits of an authentic cloud based enterprise security solution. Facts have been distorted, myths created, and the truth "clouded" in fantasy.

    The reality is:

    - Appliance-based security was relevant a decade ago, when 90% of employees were centrally located and most applications and resources ran in the corporate datacenter.

    - "Fake" security clouds are an attempt to jump on the "cloud" bandwagon - in reality it's still old technology pretending to address a paradigm shift.

    This webinar will bust the myths, expose the facts and fiction, comparing authentic 100% cloud security solution, with "fake" security clouds and hardware appliances. This webinar will focus on 5 key pain-points to drive home the clear differentiators including:

    1. Security
    2. Cloud design
    3. Visibility and Reporting
    4. Total Cost of Ownership
    5. User Experience
Revolutionizing Internet Security through the magic of cloud computing
Zscaler ensures that more than 13 million employees at more than 5,000 enterprise and government organizations worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location.

Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Do you know where your next cyber security threat is likely to come from?
  • Live at: Jun 18 2015 3:00 pm
  • Presented by: Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
  • From:
Your email has been sent.
or close