Hi [[ session.user.profile.firstName ]]

The CIO Mandate for Secure Cloud Transformation

The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

They will discuss how enterprise IT leaders can:

• Improve customer digital experience while safeguarding sensitive information

• Increase user performance while minimising risk

• Drive revenue and scalability while controlling costs

Are you ready for a secure cloud transformation? Sign up for this webinar today!
Recorded Oct 29 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
Presentation preview: The CIO Mandate for Secure Cloud Transformation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Microsegmentation Made Easy with Identity and Automation. Jun 9 2021 4:00 pm UTC 28 mins
    Peter Smith, Vice President of Secure Workload Communications at Zscaler
    Attackers exploit flat networks to move laterally inside cloud and data center environments. While microsegmentation can stop attackers, it has been impossibly complex for operations to deploy and manage until now. Learn how identity-based segmentation enables:

    1. 90% reduction in policies

    2. Requires no change to the network or the application

    3. Automated policy lifecycle using machine learning

    4. Zero trust security - see a firewall vs identity-based segmentation demo
  • Clientless access to Private Applications for BYOD and third party users May 27 2021 4:00 pm UTC 60 mins
    Lisa Lorenzin , Director, Transformation Strategy at Zscaler, and Kanishka K Pandit, Zscaler Product Marketing Manager
    In today’s work-from-anywhere world, employees and third-party users are connecting to corporate data and private applications using managed and unmanaged devices. Therefore, it’s more important than ever to add a layer of security without compromising user productivity.

    Join Lisa Lorenzin , Director, Transformation Strategy at Zscaler, and Kanishka K Pandit, Zscaler Product Marketing Manager, as they discuss best practices for securing BYOD and third-party application access with Zero Trust.

    Join the conversation to learn:
    1. Zscaler’s Clientless access to private applications
    2. Best practices for securing BYOD
    3. How to provide fast, secure, local access to internal applications while simplifying the IT infrastructure

    You won’t want to miss this one. Register today.
  • Six Keys to Reducing Your Public Cloud Attack Surface May 19 2021 4:00 pm UTC 49 mins
    Rich Campagna,SVP, Cloud Protection and Nagraj Seshadri,Sr. Director, Product Marketing Zscaler
    Public clouds have ushered in a new era of agility, scale, and performance for enterprise applications. But the DevOps culture driving these changes can also introduce risks. This webinar will focus on the six keys to reducing your public cloud attack surface while allowing your organization to innovate at the speed of cloud. The session will feature actionable advice that you can put into practice immediately, covering issues such as:

    1.Understanding the risk
    2.Securely configuring services
    3.Enforcing least-privileged access
    4.Applying identity-based micro segmentation
  • Lightboard Session: Enabling Digital Transformation May 18 2021 6:00 pm UTC 45 mins
    Brian Deitch, Solutions Architect, Zscaler
    What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.

    Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
  • The CIO Mandate for Secure Cloud Transformation Recorded: Oct 29 2020 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • 3 Common Mistakes to Avoid in Your Multi-Cloud Strategy Recorded: Oct 28 2020 36 mins
    Wolfgang Hustaedt, Solutions Architect, Zscaler
    Using more than one cloud provider is becoming the norm for enterprise architectures.

    But how will you provide unified access to them in a secure and reliable way?

    Learn how you can avoid the 3 common pitfalls of setting up a multi-cloud architecture. Furthermore, we will discuss ways you can provide access to multiple cloud environments, as well as the services in your own data center.
  • Three Ways ZTNA Protects Against Ransomware in 2020 Recorded: Oct 27 2020 28 mins
    Tony Fergusson, IT Infrastructure Architect, MAN Energy Solutions | Deepen Desai, VP of Security Research, Zscaler
    Ransomware is now using popular remote access VPNs as a Trojan horse to gain access to enterprise networks. This is frustrating for IT teams that are being asked to enable mobility for their users. Unfortunately, the technology they invested in to protect their business has been rendered obsolete.

    We understand. We’ve helped hundreds of companies embrace a new approach to remote access. In this session join our customer Tony Fergusson, IT Infrastructure Architect at MAN Energy Solutions, and the Zscaler team to learn:

    - How cyber criminals are exploiting remote access VPNs with ransomware
    - Why Gartner is recommending ZTNA (zero trust network access) to protect sensitive data
    - About best practices and hear real-world stories
  • Lightboard Session: Enabling Digital Transformation Recorded: Oct 22 2020 44 mins
    Brian Deitch, Solutions Architect, Zscaler
    What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.

    Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
  • How Gartner’s SASE will transform security in 2020 Recorded: Oct 6 2020 62 mins
    Manoj Apte, Chief Strategy Officer, Zscaler & Dan Shelton, Director Transformation Strategy, Zscaler
    Doing business has significantly changed during the past decade. New digital business models empower companies to engage with customers and employees in ways that consistently deliver access to applications and services no matter where they are or what device they are using to access it.

    The traditional approaches of perimeter-based security no longer align with today’s business models. Instead, they increase cost and complexity while delivering a poor user experience. To address this ongoing challenge, Gartner has developed a new model of networking and security that matches these new requirements, called Secure Access Service Edge (SASE).

    In this webinar, we’ll discuss why Gartner has defined this new SASE architecture and how it will change IT.

    Learn about:

    How SASE evolved to its current definition and the challenges it addresses
    The benefits of SASE deployments and how to get the most out of it
    The key benefits and pitfalls to be aware of when deploying a SASE solution
  • 3 Key Initiatives to Secure Your Remote Users in the Modern World Recorded: Oct 1 2020 35 mins
    Thomas Quinlan, Director of Solution Architecture, EMEA, Zscaler
    As users leave offices, and applications leave the data centre, the internet is becoming the new corporate network. Learn how you can utilise Gartner's SASE architecture to protect your users' access to the Internet and SaaS applications, wherever they may be - even when they're roaming.
    Learn how to take advantage of traffic forwarding (directly or with SDWAN) from fixed locations, how to enable roaming users to be secure and how to apply a consistent policy across the enterprise that follows each user.

    Zscaler provides Security as a Service to thousands of organisations worldwide, enabling them to leverage the latest in security technology, protecting users when accessing both the internet and their private applications.
  • The CIO Mandate for Secure Cloud Transformation Recorded: Sep 29 2020 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • Leveraging moving to the cloud to gain control of your apps and data Recorded: Aug 20 2020 41 mins
    Stan Lowe, Global Chief Information Security Officer, Zscaler
    For some organizations cloud moves can be a complex undertaking, we will discuss how to simplify this effort and leverage it to gain control and visibility into your applications and data.
  • COVID-19-themed Cyberattacks: What You Need to Know Recorded: Aug 18 2020 37 mins
    Deepen Desai, VP of Security Research, Zscaler
    Threat actors are leveraging fears and concerns around the COVID-19 outbreak to launch new attacks. With VPNs breaking from increased workloads forcing at-home workers to bypass traditional security controls, knowing what’s targeting your users during this critical time is more important than ever.

    Join this special Zscaler ThreatLabZ webinar to hear all about the latest COVID-19-related threats, and what you need to know to keep your at-home users safe.

    In this session, you’ll learn:
    - How threat actors are leveraging the COVID-19 pandemic
    - What top COVID-19 threats are targeting your users
    - New COVID-19 phishing and malware campaigns
    - What you can do to keep your at-home users safe
  • Secure SD-WAN without compromise Recorded: Aug 13 2020 44 mins
    Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak
    As applications migrate to the cloud and the world becomes increasingly mobile, organisations are embracing SD-WAN and cloud-based security as an alternative to cumbersome router-centric WANs and costly security appliances. Discover how secure SD-WAN can help enterprises achieve the full transformational promise of the cloud. 

    Join Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak on the 12th May at 2pm BST to discover:

    - The challenges of legacy approaches to networking and security
    - Why shifts in traffic patterns and the fundamental nature of apps are forcing organisations to embrace new wide area network and security models
    - How the Silver Peak and Zscaler Secure SD-WAN solution delivers lower costs, simplified operations, and the highest quality experience for your IT organisation and end users
  • How Gartner’s SASE will transform security in 2020 Recorded: Aug 11 2020 62 mins
    Manoj Apte, Chief Strategy Officer, Zscaler & Dan Shelton, Director Transformation Strategy, Zscaler
    Doing business has significantly changed during the past decade. New digital business models empower companies to engage with customers and employees in ways that consistently deliver access to applications and services no matter where they are or what device they are using to access it.

    The traditional approaches of perimeter-based security no longer align with today’s business models. Instead, they increase cost and complexity while delivering a poor user experience. To address this ongoing challenge, Gartner has developed a new model of networking and security that matches these new requirements, called Secure Access Service Edge (SASE).

    In this webinar, we’ll discuss why Gartner has defined this new SASE architecture and how it will change IT.

    Learn about:

    - How SASE evolved to its current definition and the challenges it addresses
    - The benefits of SASE deployments and how to get the most out of it
    - The key benefits and pitfalls to be aware of when deploying a SASE solution
  • Enable Your Employees to Work from Home Quickly and Securely Recorded: Aug 5 2020 56 mins
    Jay Chaudhry, CEO Zscaler, Mike Towers,CISO Takeda Pharmaceuticals and Alex Philips, CIO National Oilwell Varco
    Join Jay Chaudhry, CEO and founder of Zscaler and customers Mike Towers, CISO Takeda Pharmaceuticals and Alex Philips, CIO National Oilwell Varco as they share details on how to provide a productive and secure work-from-home experience for their employees:

    - How Takeda Pharmaceuticals International and National Oilwell Varco quickly enabled all its employees to work from home while keeping the organization secure.
    - How you can be up-and-running in a matter of days.
    - Requirements for enabling your team work from home.
    - How to apply some of the lessons learned as well as best practices.
  • The CIO Mandate for Secure Cloud Transformation Recorded: Jul 21 2020 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • How to Fight What You Can't See: Advanced Threats in Internet Browsing Recorded: Jul 16 2020 52 mins
    Yogi Chandiramani - Zscaler | Lidor Pergament - Zscaler | Yohann Royer - Schneider Electric
    Threat actors are sneaking malicious content into encrypted traffic, making it difficult for enterprises to detect and prevent against threats.

    During this session, our experts will demonstrate on how to inspect encrypted traffic at scale and ensure best practice from a business and legal standpoint.

    We'll be featuring a case study from Schneider Electric.
  • Lightboard Session: Enabling Digital Transformation Recorded: Jul 16 2020 45 mins
    Brian Deitch, Solutions Architect, Zscaler
    What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.

    Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
  • A Cloud-first World Requires a New Data Protection Model Recorded: Jul 1 2020 60 mins
    Moinul Khan, Zscaler; Chris Morosco, Zscaler; and Brad Moldenhauer, Steptoe & Johnson
    The move from applications residing in the data center to a digital business model in the cloud has led to the widespread adoption of SaaS and public cloud applications. Data is now completely distributed and extremely easy to inadvertently expose, as the access to this data becomes distributed as well with more users working outside of the office. These visibility and control factors make ensuring data compliance that much more difficult.

    Hear from Moinul Khan, Zscaler Senior Director of Product Management, Chris Morosco, Zscaler Senior Director of Product Marketing, and Brad Moldenhauer, Steptoe & Johnson’s Director of Info Security, as they discuss best practices to secure data in a cloud-first world.

    In this webinar, you’ll learn best practices for:

    - Preventing employees from accidentally sharing sensitive data, and internal threats from stealing it
    - Providing compliance visibility and violation mitigation across SaaS applications and cloud service providers
    - Ensuring SaaS and cloud provider deployed application configurations follow industry and organization defined best practices
Enabling the Secure Transformation to the Cloud
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.

Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.

By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The CIO Mandate for Secure Cloud Transformation
  • Live at: Oct 29 2020 4:00 pm
  • Presented by: Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
  • From:
Your email has been sent.
or close