Live event

CXO Exchange

Leadership in the AI Era Built on Zero Trust

Barcelona, Spain
12 - 13, March 2026
Register now

Why attend

Sharpen Your
Executive Strategy
Candid Peer
Exchange
Influence Product
Roadmaps
Forge High-Value
Connections

Connect at the Heart of Barcelona

  • Hotel NH Collection Barcelona Constanza
    C/Deu i Mata, 69-99, Barcelona, Spain
  • 12-13 March, 2026
  • Valet parking will be provided.

Our exclusive community of featured speakers

Jay Chaudhry
CEO, Chairman & Founder
Michael Loechle
Chief Information Officer
Pierre-Antoine Falaux-Bachelot
Head of Group Architecture
Matthias Tauber
Group Head IT Security
Rui Cabeço
IT Service Group Manager
Adam Geller
Chief Product Officer
Dhawal Sharma
EVP & AI Security and Strategic Initiatives
Deepen Desai
EVP, Cybersecurity

Agenda

  • Wednesday,  11 March,  2026
    19:00
    Executive Welcome & Dinner

    Join us for a welcome reception and dinner focused on building relationships over exceptional food in a setting reserved exclusively for our group.

  • Thursday, 12 March, 2026
    8:00
    Breakfast
    9:10
    CEO Keynote
    Leading Secure Digital Transformation with AI and Zero Trust

    Join Jay Chaudhry to explore how AI and Zero Trust are revolutionizing security and digital transformations. We’ll unpack AI’s duality-accelerating predictive risk management and reducing attack exposure while introducing new risks—then show how to safely unlock productivity and automation. Learn pragmatic leadership insights for overcoming organizational resistance and executing transformation at scale across users, devices, workloads, and branches.

    ...
    Jay Chaudhry

    CEO, Chairman & Founder, Zscaler

    9:40
    CXO Fireside Chat
    Leadership and Governance for Secure Transformation

    Digital transformation tests leadership as executives juggle emerging threats, a complex digital landscape, and change management. Join Jay Chaudhry and an industry-leading CXO for a candid discussion on governance, board communication, and decision frameworks for Zero Trust and AI. Learn to overcome legacy and cultural barriers, align security to outcomes, and drive lasting change.

    ...
    Jay Chaudhry

    CEO, Chairman & Founder, Zscaler

    ...
    Michael Loechle

    Chief Information Officer, Hitachi

    10:00
    Networking Break
    10:30
    Platform and AI Keynote
    Platform Vision: AI Security, Built on Zero Trust

    Learn about Zscaler’s architectural vision and product strategy for the Zero Trust Exchange and how we’re leveraging AI to innovate across our platform—advancing protection for users, branches, cloud, data, and security operations. Discover how we’re addressing evolving security and networking challenges for our customers: reducing risk, eliminating cost and complexity, and enabling faster, more secure digital transformation.

    ...
    Dhawal Sharma

    EVP & AI Security and Strategic Initiatives, Zscaler

    11:00
    CXO Spotlight
    CXO Lessons to Unlock Secure Digital Transformation

    A leading cybersecurity executive shares their roadmap for securing the enterprise, managing internal resistance, and directly aligning security initiatives with key business outcomes. Attendees will gain practical insights into navigating the key challenges of digital transformation, from overcoming legacy system constraints to mastering the evolving threat landscape.

    ...
    Pierre-Antoine

    Head of Group Architecture, Engie

    11:20
    Keynote
    Modernizing Branches and Clouds with Zero Trust Architecture

    Legacy networks and fragmented controls enable lateral movement and inflate costs across branches and clouds. This keynote explores Zscaler's approach to replacing branch perimeters with direct‑to‑app, identity‑based access over any broadband, and mitigating lateral movem via agentless segmentation for IoT, OT, and servers. You'll also learn how to extend protection with east‑west microsegmentation and scalable gateways across your cloud environments.

    ...
    Brian Lazear

    VP, Product Management - Cloud Workloads, Zscaler

    ...
    Mahesh Bommareddy

    Senior Director, Product Management, Zscaler

    11:50
    Networking Lunch
    13:15
    Interactive Breakouts
    Securing OT Environments: A New Mandate for CISOs

    Securing OT environments is now firmly a CISO responsibility, but OT across manufacturing, energy, logistics, and transportation presents risks fundamentally different from IT. Thousands of heterogeneous devices, limited built-in controls, and diverse operational stakeholders make traditional security approaches ineffective at scale. Firewalls and NACs alone do not stop lateral movement, as penetration tests routinely show. This session outlines a Zero Trust architecture for OT and a practical, phased journey to reduce critical risk without disrupting operations.

    ...
    Sri Puthucode

    VP, Emerging Products GTM , Zscaler

    ...
    Mittal Patel

    Director, Product Management, Zscaler

    Keep Users Secure and Productive: End-to-End Visibility and Faster Remediation

    Ensuring security and productivity requires IT teams to address issues across devices, networks, and SaaS applications. Zscaler simplifies this with ZDX, delivering end-to-end visibility and remote fixes like Zscaler Copilot to reduce downtime. Teams can quickly remediate device issues and reroute around problematic ISPs, cutting resolution times and avoiding costly productivity losses.

    ...
    Javier Rodriguez Gonzalez

    VP, Product Management, Zscaler

    Multicloud Chaos: A Blueprint for Unified Workload Security

    Multicloud is a reality that fragments security. Divergent tools, policies, and paths create inconsistent controls and an untenable attack surface. This session provides a blueprint to move from chaos to control: unifying on a Zero Trust platform to replace IP-based controls with an identity-driven policy engine, gain consistent visibility, enforce microsegmentation to stop lateral movement, simplify architecture, and prove risk reduction.

    ...
    Brian Lazear

    VP, Product Management - Cloud Workloads, Zscaler

    13:55
    Transition Break
    14:05
    Interactive Breakouts
    Cutting Virtual Desktop Infrastructure Costs and Securing Unmanaged Devices

    Connecting 3rd party users to apps has often relied on traditional VPNs that expand attack surfaces or VDI, which inflates budgets. Discover how Zscaler’s Zero Trust Browser offers a new approach, with secure, clientless access to private and SaaS applications through any browser. Learn how it secures unmanaged devices, embeds threat and data protection, reduces costs, simplifies operations, accelerates onboarding, and enhances user experience.

    ...
    Joby Menon

    VP, Product Management, Zscaler

    Simplifying Branch and Factory Networks: Secure Communications without VPNs or Firewalls

    Traditional stacks create complexity and enable lateral movement. In this deep dive, learn how to secure internal and external communications while eliminating VPNs, MPLS, and perimeter firewalls, using agentless segmentation for users, servers, IoT, and OT with clientless privileged access. Shrink the attack surface, accelerate M&A integration, and cut cost and complexity to improve resilience.

    ...
    Mahesh Bommareddy

    Senior Director, Product Management, Zscaler

    ...
    Mittal Patel

    Director, Product Management, Zscaler

    Innovations in AI Security

    As organizations rapidly adopt AI, securing AI applications, infrastructure, and usage has become a critical priority. This session explores how enterprises can gain visibility and control across their AI environment, from applications and models to underlying infrastructure and AI agents. Attendees will learn how to establish a comprehensive inventory of AI assets, enforce secure and responsible access, and protect AI systems across the full lifecycle, from development through deployment and runtime. The discussion will focus on practical approaches to managing risk while enabling innovation at scale.

    ...
    Dhawal Sharma

    EVP & AI Security and Strategic Initiatives, Zscaler

    14:45
    Transition Break
    14:55
    Interactive Breakouts
    Securing B2B Partner Access without Extending Your Network

    Zero Trust transformation remains incomplete without transforming how business partners connect and access resources. Relying on site-to-site VPNs expands attack surface, enables lateral movement and creates significant overhead. Learn how Zscaler is extending ZPA  by adding new Innovations to enable secure collaboration between customers and their business partners. Explore new capabilities including ZPA B2B Extranet , ZPA B2B app federation and autonomous user‑to‑app segmentation that empower customers to accelerate partner onboarding and M&A integrations, and tighten Zero Trust access controls.

    ...
    Joby Menon

    VP, Product Management, Zscaler

    ...
    Rui Cabeço

    IT Service Group Manager, Siemens

    AI Red Teaming: Continuous Risk Discovery and Guardrails for AI Apps

    Learn how Zscaler is strengthening AI security through advanced red teaming capabilities gained with the SPLX acquisition—helping organizations uncover and remediate vulnerabilities in real time. Discover how continuous attack simulation can validate AI systems across the full lifecycle, from build to deploy to runtime, surfacing risks such as prompt abuse, data exposure, and unsafe outputs. See how AI-driven insights streamline prompt hardening and enable tailored guardrail policies that integrate into enforcement workflows to reduce risk and accelerate secure AI adoption.

    ...
    Jurica Nekic

    Director, Product Management, Zscaler

    Charting Your Zero Trust Journey-Tools, Roadmaps, and Enterprise Proof

    Momentum stalls without clear milestones. Learn from industry leaders on the various tools to track transformation progress, showcasing results from iconic brands. This session will explore tools like the CXO App and also delve into Zscaler's roadmap and QBR results.

    ...
    Manpreet Chadha

    Director Of Product Management, Zscaler

    15:35
    Transition Break
    15:50
    Closing Keynote
    Your Sovereign Cloud for Europe

    European organizations are facing increasing requirements to maintain control over where data resides, how it is governed, and which jurisdictions apply. This session will explore what it means to operate with a sovereign cloud in Europe and how an architecture designed for European data sovereignty supports regulatory compliance and operational control. Attendees will learn how Zscaler provides a sovereign cloud for Europe, enabling organizations to maintain data residency and operate securely across users, devices, workloads, and branches.

    ...
    Casper Klynge,

    VP, Government Partnerships, Zscaler

    ...
    Phanny Chan

    Sr. Director, Product Management - Managed Services, Zscaler

    19:00
    Dinner + Networking

    Join us for an evening designed for thoughtful conversation, valuable networking, and elevated dining in a truly unique venue.

  • Friday, 13 March, 2026
    8:00
    Breakfast
    9:05
    Keynote
    Harnessing Zero Trust and AI to Outpace Cyberthreats

    Security Operations are evolving to meet the demands of rapidly changing threat landscapes. Learn how Zscaler integrates Zero Trust principles with AI-powered tools to enable faster detection, reduced risk exposure, and streamlined response across environments. Explore how unified data fabric and advanced capabilities like Continuous Threat Exposure Management (CTEM) and Asset Exposure Management are transforming security workflows and empowering organizations to prioritize and act decisively.

    ...
    Matthias Tauber

    Group Head IT Security, DJ Bank

    ...
    Adam Geller

    Chief Product Officer, Zscaler

    ...
    Deepen Desai

    EVP, Cybersecurity, Zscaler

    9:35
    Keynote
    Data Security as the Foundation of a Secure Enterprise

    Artificial Intelligence relies on a foundation of trusted data, making security the first priority. Learn how to build an architecture that governs access, prevents data leakage, and enforces policies across users, devices, and clouds. Future-proof your data security while ensuring compliance and reducing operational risks across your enterprise.

    ...
    Venkat Krishnamoorthi

    VP, Product Management, Zscaler

    10:00
    Networking Break
    10:30
    Peer-to-Peer CXO Roundtables
    Peer Exchange: Leading Through Transformation in the Age of AI

    In this interactive session, CIOs, CISOs, and CTOs will join facilitated peer-to-peer discussions focused on the most pressing challenges shaping the enterprise today. From embedding AI into network and application design to navigating new regulatory landscapes and developing the next generation of technology leaders, these roundtables provide an opportunity to learn from peers facing similar inflection points. Each discussion is designed to surface real-world strategies, emerging best practices, and bold ideas for leading through massive technological and organizational change.

    ...
    Jay Chaudhry

    CEO, Chairman & Founder, Zscaler

    ...
    Dhawal Sharma

    EVP & AI Security and Strategic Initiatives,, Zscaler

    11:10
    Transition Break
    11:20
    Interactive Breakouts
    Blocking Threats and Securing Data Inline: Innovations from Zscaler

    As cyber threats evolve, fragmented controls leave gaps in your defense. See how unified inline threat blocking, TLS/SSL inspection, zero trust segmentation and data loss prevention work together to prevent compromise, minimize risk, and stop data loss. Learn the latest innovations to secure AI usage, achieve next-gen cyberthreat protection, and prepare for quantum-powered threats.

    ...
    Christian Shink

    Field Product Manager, Zscaler

    Outpace Threats with Active Defense, Advanced SOC Capabilities, and Agentic AI

    Attackers leverage AI to accelerate attacks. Learn how Zscaler uses exposure insights and zero trust telemetry—correlating alerts to surface threats, using Deception and Threat Hunting to find what other tools miss, and providing insights into human and non-human identities. Explore Zscaler's SOC-of-the-future capabilities, running them yourself or using Red Canary for staff augmentation. Tap expert‑supervised human/AI workflows that improve detections, automate triage, and respond faster to the risks that matter.

    ...
    Deepen Desai

    EVP, Cybersecurity, Zscaler

    Solving Data Risks with Modern Innovations

    Join this technical Q&A to explore the latest advancements in our unified DS Platform, spanning DSPM, Data Detection and Response (DDR), and automated workflows. We’ll discuss how to leverage Data Lineage for end-to-end visibility and how to incorporate User Risk Intent to stop threats before they escalate. This session covers extending protection to on-premises environments, securing browser extensions, and governing GenAI usage. Bring your questions on how to eliminate shadow data and unify fragmented security policies. Learn how to consolidate your stack while gaining deep visibility and control across all data channels.

    ...
    Venkat Krishnamoorthi

    VP, Product Management, Zscaler

    12:00
    Transition Break
    12:10
    CEO Insights: Q&A with Jay Chaudhry

    Join Zscaler CEO Jay Chaudhry for an exclusive Q&A session where he’ll share the company’s strategic vision, groundbreaking product innovations, and key partnerships. Gain insights into how Zscaler is tackling critical industry challenges and supporting customers in achieving secure digital transformation. Don’t miss this unique opportunity to hear directly from the leadership driving success in the evolving cybersecurity landscape.

    ...
    Jay Chaudhry

    CEO, Chairman & Founder, Zscaler

    12:45
    Farewell Lunch & Final Networking

Frequently Asked Questions

Event details are included in a calendar invitation along with other update emails for the event. Attendees will receive a “Know Before You Go” email with all the necessary information one week before the event.
You can email us at [email protected]
Zscaler provides enterprises with the technology and expertise to guide them on their digital transformation journeys. With cloud security services that replace the traditional inbound and outbound gateways, we help organizations transform their network and security infrastructures from an appliance-based model to a modern, cloud approach, which allows them to securely take advantage of cloud agility, intelligence, and scalability.

Register now for the CXO Exchange