The role of zero trust in improving corporate governance and compliance

Presented by

Sean Cordero, CISO – Americas and Pam Kubiatowski, Field CTO – Americas, Zscaler

About this talk

Cybersecurity is not just about securing a network, monitoring threats, or identifying vulnerabilities. Consider exactly what you are protecting: intellectual property, trade secrets, and employee and customer data. The loss, damage, or disclosure of this information can also have consequences at a regulatory level. What has changed in recent years is the realization that risk management and zero trust go hand in hand. Security and technology leaders must protect sensitive data and assets in order to meet their governance objectives and be in compliance with regulations. Through the adoption of zero trust principles, organizations advance their cyber architectures and better protect their users, data, and reputations. Sounds great in theory, but what steps do organizations need to take to align zero trust solutions with their own governance structures and compliance mandates? Sean Cordero, Zscaler CISO - Americas, and Pam Kubiatowski, Zscaler Field CTO - Americas, will walk you through the practical methods that leading enterprises have used to successfully implement a zero trust architecture solution, with risk management and mitigation initiatives at the forefront. The Zero Trust Advancement Center is hosting free monthly webinars about one of the most widely talked about cybersecurity trends today. Zero Trust experts will guide you through the ins and outs of this increasingly popular approach to cybersecurity, helping you come to an understanding of why Zero Trust is needed today, what the key principles are, and how to implement it into your business planning, enterprise architectures, and technology deployments. Learn more at

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (108)
Subscribers (8679)
Go in depth into CSA's latest research on everything from IoT to containers to blockchain. Webcasts will break down the research, provide use cases, instructions for implementation, and further insights.