Hi [[ session.user.profile.firstName ]]

How to Fight What You Can't See: Advanced Threats in Internet Browsing

Threat actors are sneaking malicious content into encrypted traffic, making it difficult for enterprises to detect and prevent against threats.

During this session, our experts will demonstrate on how to inspect encrypted traffic at scale and ensure best practice from a business and legal standpoint.

We'll be featuring a case study from Schneider Electric.
Recorded Jul 16 2020 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Yogi Chandiramani - Zscaler | Lidor Pergament - Zscaler | Yohann Royer - Schneider Electric
Presentation preview: How to Fight What You Can't See: Advanced Threats in Internet Browsing

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The CIO Mandate for Secure Cloud Transformation Oct 29 2020 4:00 pm UTC 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • 3 Common Mistakes to Avoid in Your Multi-Cloud Strategy Oct 28 2020 3:00 pm UTC 36 mins
    Wolfgang Hustaedt, Solutions Architect, Zscaler
    Using more than one cloud provider is becoming the norm for enterprise architectures.

    But how will you provide unified access to them in a secure and reliable way?

    Learn how you can avoid the 3 common pitfalls of setting up a multi-cloud architecture. Furthermore, we will discuss ways you can provide access to multiple cloud environments, as well as the services in your own data center.
  • Three Ways ZTNA Protects Against Ransomware in 2020 Oct 27 2020 4:30 pm UTC 28 mins
    Tony Fergusson, IT Infrastructure Architect, MAN Energy Solutions | Deepen Desai, VP of Security Research, Zscaler
    Ransomware is now using popular remote access VPNs as a Trojan horse to gain access to enterprise networks. This is frustrating for IT teams that are being asked to enable mobility for their users. Unfortunately, the technology they invested in to protect their business has been rendered obsolete.

    We understand. We’ve helped hundreds of companies embrace a new approach to remote access. In this session join our customer Tony Fergusson, IT Infrastructure Architect at MAN Energy Solutions, and the Zscaler team to learn:

    - How cyber criminals are exploiting remote access VPNs with ransomware
    - Why Gartner is recommending ZTNA (zero trust network access) to protect sensitive data
    - About best practices and hear real-world stories
  • Lightboard Session: Enabling Digital Transformation Oct 22 2020 4:00 pm UTC 44 mins
    Brian Deitch, Solutions Architect, Zscaler
    What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.

    Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
  • How Gartner’s SASE will transform security in 2020 Recorded: Oct 6 2020 62 mins
    Manoj Apte, Chief Strategy Officer, Zscaler & Dan Shelton, Director Transformation Strategy, Zscaler
    Doing business has significantly changed during the past decade. New digital business models empower companies to engage with customers and employees in ways that consistently deliver access to applications and services no matter where they are or what device they are using to access it.

    The traditional approaches of perimeter-based security no longer align with today’s business models. Instead, they increase cost and complexity while delivering a poor user experience. To address this ongoing challenge, Gartner has developed a new model of networking and security that matches these new requirements, called Secure Access Service Edge (SASE).

    In this webinar, we’ll discuss why Gartner has defined this new SASE architecture and how it will change IT.

    Learn about:

    How SASE evolved to its current definition and the challenges it addresses
    The benefits of SASE deployments and how to get the most out of it
    The key benefits and pitfalls to be aware of when deploying a SASE solution
  • 3 Key Initiatives to Secure Your Remote Users in the Modern World Recorded: Oct 1 2020 35 mins
    Thomas Quinlan, Director of Solution Architecture, EMEA, Zscaler
    As users leave offices, and applications leave the data centre, the internet is becoming the new corporate network. Learn how you can utilise Gartner's SASE architecture to protect your users' access to the Internet and SaaS applications, wherever they may be - even when they're roaming.
    Learn how to take advantage of traffic forwarding (directly or with SDWAN) from fixed locations, how to enable roaming users to be secure and how to apply a consistent policy across the enterprise that follows each user.

    Zscaler provides Security as a Service to thousands of organisations worldwide, enabling them to leverage the latest in security technology, protecting users when accessing both the internet and their private applications.
  • The CIO Mandate for Secure Cloud Transformation Recorded: Sep 29 2020 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • Leveraging moving to the cloud to gain control of your apps and data Recorded: Aug 20 2020 41 mins
    Stan Lowe, Global Chief Information Security Officer, Zscaler
    For some organizations cloud moves can be a complex undertaking, we will discuss how to simplify this effort and leverage it to gain control and visibility into your applications and data.
  • COVID-19-themed Cyberattacks: What You Need to Know Recorded: Aug 18 2020 37 mins
    Deepen Desai, VP of Security Research, Zscaler
    Threat actors are leveraging fears and concerns around the COVID-19 outbreak to launch new attacks. With VPNs breaking from increased workloads forcing at-home workers to bypass traditional security controls, knowing what’s targeting your users during this critical time is more important than ever.

    Join this special Zscaler ThreatLabZ webinar to hear all about the latest COVID-19-related threats, and what you need to know to keep your at-home users safe.

    In this session, you’ll learn:
    - How threat actors are leveraging the COVID-19 pandemic
    - What top COVID-19 threats are targeting your users
    - New COVID-19 phishing and malware campaigns
    - What you can do to keep your at-home users safe
  • Secure SD-WAN without compromise Recorded: Aug 13 2020 44 mins
    Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak
    As applications migrate to the cloud and the world becomes increasingly mobile, organisations are embracing SD-WAN and cloud-based security as an alternative to cumbersome router-centric WANs and costly security appliances. Discover how secure SD-WAN can help enterprises achieve the full transformational promise of the cloud. 

    Join Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak on the 12th May at 2pm BST to discover:

    - The challenges of legacy approaches to networking and security
    - Why shifts in traffic patterns and the fundamental nature of apps are forcing organisations to embrace new wide area network and security models
    - How the Silver Peak and Zscaler Secure SD-WAN solution delivers lower costs, simplified operations, and the highest quality experience for your IT organisation and end users
  • How Gartner’s SASE will transform security in 2020 Recorded: Aug 11 2020 62 mins
    Manoj Apte, Chief Strategy Officer, Zscaler & Dan Shelton, Director Transformation Strategy, Zscaler
    Doing business has significantly changed during the past decade. New digital business models empower companies to engage with customers and employees in ways that consistently deliver access to applications and services no matter where they are or what device they are using to access it.

    The traditional approaches of perimeter-based security no longer align with today’s business models. Instead, they increase cost and complexity while delivering a poor user experience. To address this ongoing challenge, Gartner has developed a new model of networking and security that matches these new requirements, called Secure Access Service Edge (SASE).

    In this webinar, we’ll discuss why Gartner has defined this new SASE architecture and how it will change IT.

    Learn about:

    - How SASE evolved to its current definition and the challenges it addresses
    - The benefits of SASE deployments and how to get the most out of it
    - The key benefits and pitfalls to be aware of when deploying a SASE solution
  • Enable Your Employees to Work from Home Quickly and Securely Recorded: Aug 5 2020 56 mins
    Jay Chaudhry, CEO Zscaler, Mike Towers,CISO Takeda Pharmaceuticals and Alex Philips, CIO National Oilwell Varco
    Join Jay Chaudhry, CEO and founder of Zscaler and customers Mike Towers, CISO Takeda Pharmaceuticals and Alex Philips, CIO National Oilwell Varco as they share details on how to provide a productive and secure work-from-home experience for their employees:

    - How Takeda Pharmaceuticals International and National Oilwell Varco quickly enabled all its employees to work from home while keeping the organization secure.
    - How you can be up-and-running in a matter of days.
    - Requirements for enabling your team work from home.
    - How to apply some of the lessons learned as well as best practices.
  • The CIO Mandate for Secure Cloud Transformation Recorded: Jul 21 2020 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • How to Fight What You Can't See: Advanced Threats in Internet Browsing Recorded: Jul 16 2020 52 mins
    Yogi Chandiramani - Zscaler | Lidor Pergament - Zscaler | Yohann Royer - Schneider Electric
    Threat actors are sneaking malicious content into encrypted traffic, making it difficult for enterprises to detect and prevent against threats.

    During this session, our experts will demonstrate on how to inspect encrypted traffic at scale and ensure best practice from a business and legal standpoint.

    We'll be featuring a case study from Schneider Electric.
  • Lightboard Session: Enabling Digital Transformation Recorded: Jul 16 2020 45 mins
    Brian Deitch, Solutions Architect, Zscaler
    What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.

    Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
  • A Cloud-first World Requires a New Data Protection Model Recorded: Jul 1 2020 60 mins
    Moinul Khan, Zscaler; Chris Morosco, Zscaler; and Brad Moldenhauer, Steptoe & Johnson
    The move from applications residing in the data center to a digital business model in the cloud has led to the widespread adoption of SaaS and public cloud applications. Data is now completely distributed and extremely easy to inadvertently expose, as the access to this data becomes distributed as well with more users working outside of the office. These visibility and control factors make ensuring data compliance that much more difficult.

    Hear from Moinul Khan, Zscaler Senior Director of Product Management, Chris Morosco, Zscaler Senior Director of Product Marketing, and Brad Moldenhauer, Steptoe & Johnson’s Director of Info Security, as they discuss best practices to secure data in a cloud-first world.

    In this webinar, you’ll learn best practices for:

    - Preventing employees from accidentally sharing sensitive data, and internal threats from stealing it
    - Providing compliance visibility and violation mitigation across SaaS applications and cloud service providers
    - Ensuring SaaS and cloud provider deployed application configurations follow industry and organization defined best practices
  • Securing the Remote Workforce Recorded: Jun 30 2020 59 mins
    Diana Kelley | David Sherry | Lee Imrey | Nathan Howe
    Remote working has been a growing trend for the last few years, especially in the tech sector. However, the COVID19 outbreak has really pushed businesses to adopt or accelerate their remote integration plans. How has this affected security? What are the steps companies need to take to better protect their remote workforce?

    Join this episode as we explore the security challenges in the time of COVID, why a strong security culture is important, and what steps to take today.
    - What are the security challenges associated with remote working
    - Examples of changes in cyber-attacks during COVID
    - Managing patching, VPNs, and backups for large and small remote workforces
    - How to maintain auditability and visibility
    - How to enable and keep your remote team secure
    - ​Tips for training end users to help themselves
    - Why a strong security culture matters now more than ever

    Panelists:
    - David Sherry, CISO, Princeton University
    - Lee Imrey, Cybersecurity Advisor, Splunk
    - Nathan Howe, Head of Transformation Strategy, EMEA, Zscaler

    This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
  • Modelo SASE: una arquitectura IT moderna para acelerar su transformación digital Recorded: Jun 25 2020 55 mins
    Alberto Cita - Sales Engineering Manager Iberia & Italy - Zscaler
    La forma de hacer negocios ha cambiado significativamente durante la última década. Los nuevos modelos de negocios digitales permiten a las empresas comprometerse con los clientes y los empleados de manera que ofrezcan sistemáticamente acceso a las aplicaciones y los servicios sin importar dónde estén o qué dispositivo utilicen para acceder a ellos.

    Los enfoques tradicionales de la seguridad basada en el perímetro corporativo ya no se alinean con los modelos comerciales actuales. En su lugar, aumentan el costo y la complejidad, al tiempo que ofrecen una experiencia de usuario deficiente.

    Para hacer frente a este desafío continuo, Gartner ha desarrollado un nuevo modelo de red y seguridad que se ajusta a estos nuevos requisitos, llamado Secure Access Service Edge (SASE).

    En este webinar, discutiremos por qué Gartner ha definido esta nueva arquitectura SASE y cómo cambiará la TI.

    Descubra durante la sesión:

    - Cómo evolucionó el SASE hasta su definición actual y los desafíos que permite resolver

    - Los beneficios de los despliegues de SASE y cómo sacarle el máximo provecho

    - Los principales beneficios y dificultades que hay que tener en cuenta al desplegar una solución SASE

    Acompáñenos el 25 de junio a las 11:00 para este webinar de 45 minutos presentado por Alberto Cita, Sales Engineering Manager Iberia & Italy
  • SASE: une architecture IT moderne pour accélérer votre transformation digitale Recorded: Jun 24 2020 59 mins
    Ivan Rogissart - Sales Engineering Manager Southern Europe - Zscaler
    La façon de faire des affaires a considérablement changé au cours de la dernière décennie. Les nouveaux modèles commerciaux numériques permettent aux entreprises de s'engager auprès de leurs clients et de leurs employés de manière à leur fournir un accès constant aux applications et aux services, quel que soit l'endroit où ils se trouvent ou le dispositif qu'ils utilisent pour y accéder.

    Les approches traditionnelles de la sécurité basée sur le périmètre du réseau d’entreprise ne sont plus adaptées aux modèles commerciaux actuels. Au contraire, elles augmentent les coûts et la complexité tout en offrant une mauvaise expérience à l'utilisateur.

    Pour relever ce défi permanent, Gartner a développé un nouveau modèle de réseau et de sécurité qui répond à ces nouvelles exigences, appelé Secure Access Service Edge (SASE).

    Dans ce webinaire, nous verrons pourquoi Gartner a défini cette nouvelle architecture SASE et comment elle va changer l'informatique.

    Découvrez :

    - Comment le concept SASE a évolué vers sa définition actuelle et les défis auxquels il permet de répondre

    - Les avantages des déploiements SASE et comment en tirer le meilleur parti

    - Les principaux avantages et pièges à identifier lors du déploiement d'une solution SASE

    Retrouvez-nous le 24 juin à 11h00 pour ce webinaire de 45 minutes animé par Ivan Rogissart, Sales Engineering Manager Europe du Sud.
  • SASE: l’architettura IT moderna per accelerare la vostra trasformazione digitale Recorded: Jun 23 2020 51 mins
    Marco Catino - Sales Engineer - Zscaler
    L'attività commerciale è cambiata in modo significativo nell'ultimo decennio. I nuovi modelli di business digitale consentono alle aziende di interagire con i propri clienti e i dipendenti in modo da fornire costantemente l'accesso alle applicazioni e ai servizi, indipendentemente da dove si trovino o da quale dispositivo stiano utilizzando per accedervi.

    Gli approcci tradizionali alla sicurezza basata sul perimetro non sono più in linea con i modelli di business odierni. Al contrario, aumentano i costi e la complessità, offrendo al contempo una scarsa esperienza utente.

    Per affrontare questa sfida, Gartner ha sviluppato un nuovo modello che soddisfa questi nuovi requisiti, chiamato Secure Access Service Edge (SASE).

    In questo webinar discuteremo il motivo per cui Gartner ha definito questa nuova architettura SASE e come cambierà l'IT.

    Per saperne di più:

    - Come SASE si è evoluto fino alla sua attuale definizione e le sfide che consente di affrontare

    - Come riconoscere una soluzione veramente SASE

    - I vantaggi delle soluzioni SASE e come trarne il massimo beneficio

    -Le insidie principali di cui essere consapevoli quando si implementa una soluzione SASE

    Unitevi a noi il 23 Giugno alle 11:00 per questo webinar di 45 minuti condotto da Marco Catino, Sales Engineer Italia
Revolutionising cloud security
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.

Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.

By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Fight What You Can't See: Advanced Threats in Internet Browsing
  • Live at: Jul 16 2020 5:00 pm
  • Presented by: Yogi Chandiramani - Zscaler | Lidor Pergament - Zscaler | Yohann Royer - Schneider Electric
  • From:
Your email has been sent.
or close