Live event




Join us for a welcome reception and dinner focused on building relationships over exceptional food in a setting reserved exclusively for our group.
Join Jay Chaudhry to explore how AI and Zero Trust are revolutionizing security and digital transformations. We’ll unpack AI’s duality-accelerating predictive risk management and reducing attack exposure while introducing new risks—then show how to safely unlock productivity and automation. Learn pragmatic leadership insights for overcoming organizational resistance and executing transformation at scale across users, devices, workloads, and branches.

CEO, Chairman & Founder, Zscaler
Digital transformation tests leadership as executives juggle emerging threats, a complex digital landscape, and change management. Join Jay Chaudhry and an industry-leading CXO for a candid discussion on governance, board communication, and decision frameworks for Zero Trust and AI. Learn to overcome legacy and cultural barriers, align security to outcomes, and drive lasting change.

CEO, Chairman & Founder, Zscaler

Chief Information Officer, Hitachi
Learn about Zscaler’s architectural vision and product strategy for the Zero Trust Exchange and how we’re leveraging AI to innovate across our platform—advancing protection for users, branches, cloud, data, and security operations. Discover how we’re addressing evolving security and networking challenges for our customers: reducing risk, eliminating cost and complexity, and enabling faster, more secure digital transformation.

EVP & AI Security and Strategic Initiatives, Zscaler
A leading cybersecurity executive shares their roadmap for securing the enterprise, managing internal resistance, and directly aligning security initiatives with key business outcomes. Attendees will gain practical insights into navigating the key challenges of digital transformation, from overcoming legacy system constraints to mastering the evolving threat landscape.

Head of Group Architecture, Engie
Legacy networks and fragmented controls enable lateral movement and inflate costs across branches and clouds. This keynote explores Zscaler's approach to replacing branch perimeters with direct‑to‑app, identity‑based access over any broadband, and mitigating lateral movem via agentless segmentation for IoT, OT, and servers. You'll also learn how to extend protection with east‑west microsegmentation and scalable gateways across your cloud environments.

VP, Product Management - Cloud Workloads, Zscaler

Senior Director, Product Management, Zscaler
Securing OT environments is now firmly a CISO responsibility, but OT across manufacturing, energy, logistics, and transportation presents risks fundamentally different from IT. Thousands of heterogeneous devices, limited built-in controls, and diverse operational stakeholders make traditional security approaches ineffective at scale. Firewalls and NACs alone do not stop lateral movement, as penetration tests routinely show. This session outlines a Zero Trust architecture for OT and a practical, phased journey to reduce critical risk without disrupting operations.

VP, Emerging Products GTM , Zscaler

Director, Product Management, Zscaler
Ensuring security and productivity requires IT teams to address issues across devices, networks, and SaaS applications. Zscaler simplifies this with ZDX, delivering end-to-end visibility and remote fixes like Zscaler Copilot to reduce downtime. Teams can quickly remediate device issues and reroute around problematic ISPs, cutting resolution times and avoiding costly productivity losses.

VP, Product Management, Zscaler
Multicloud is a reality that fragments security. Divergent tools, policies, and paths create inconsistent controls and an untenable attack surface. This session provides a blueprint to move from chaos to control: unifying on a Zero Trust platform to replace IP-based controls with an identity-driven policy engine, gain consistent visibility, enforce microsegmentation to stop lateral movement, simplify architecture, and prove risk reduction.

VP, Product Management - Cloud Workloads, Zscaler
Connecting 3rd party users to apps has often relied on traditional VPNs that expand attack surfaces or VDI, which inflates budgets. Discover how Zscaler’s Zero Trust Browser offers a new approach, with secure, clientless access to private and SaaS applications through any browser. Learn how it secures unmanaged devices, embeds threat and data protection, reduces costs, simplifies operations, accelerates onboarding, and enhances user experience.

VP, Product Management, Zscaler
Traditional stacks create complexity and enable lateral movement. In this deep dive, learn how to secure internal and external communications while eliminating VPNs, MPLS, and perimeter firewalls, using agentless segmentation for users, servers, IoT, and OT with clientless privileged access. Shrink the attack surface, accelerate M&A integration, and cut cost and complexity to improve resilience.

Senior Director, Product Management, Zscaler

Director, Product Management, Zscaler
As organizations rapidly adopt AI, securing AI applications, infrastructure, and usage has become a critical priority. This session explores how enterprises can gain visibility and control across their AI environment, from applications and models to underlying infrastructure and AI agents. Attendees will learn how to establish a comprehensive inventory of AI assets, enforce secure and responsible access, and protect AI systems across the full lifecycle, from development through deployment and runtime. The discussion will focus on practical approaches to managing risk while enabling innovation at scale.

EVP & AI Security and Strategic Initiatives, Zscaler
Zero Trust transformation remains incomplete without transforming how business partners connect and access resources. Relying on site-to-site VPNs expands attack surface, enables lateral movement and creates significant overhead. Learn how Zscaler is extending ZPA by adding new Innovations to enable secure collaboration between customers and their business partners. Explore new capabilities including ZPA B2B Extranet , ZPA B2B app federation and autonomous user‑to‑app segmentation that empower customers to accelerate partner onboarding and M&A integrations, and tighten Zero Trust access controls.

VP, Product Management, Zscaler

IT Service Group Manager, Siemens
Learn how Zscaler is strengthening AI security through advanced red teaming capabilities gained with the SPLX acquisition—helping organizations uncover and remediate vulnerabilities in real time. Discover how continuous attack simulation can validate AI systems across the full lifecycle, from build to deploy to runtime, surfacing risks such as prompt abuse, data exposure, and unsafe outputs. See how AI-driven insights streamline prompt hardening and enable tailored guardrail policies that integrate into enforcement workflows to reduce risk and accelerate secure AI adoption.

Director, Product Management, Zscaler
Momentum stalls without clear milestones. Learn from industry leaders on the various tools to track transformation progress, showcasing results from iconic brands. This session will explore tools like the CXO App and also delve into Zscaler's roadmap and QBR results.

Director Of Product Management, Zscaler
European organizations are facing increasing requirements to maintain control over where data resides, how it is governed, and which jurisdictions apply. This session will explore what it means to operate with a sovereign cloud in Europe and how an architecture designed for European data sovereignty supports regulatory compliance and operational control. Attendees will learn how Zscaler provides a sovereign cloud for Europe, enabling organizations to maintain data residency and operate securely across users, devices, workloads, and branches.

VP, Government Partnerships, Zscaler

Sr. Director, Product Management - Managed Services, Zscaler
Join us for an evening designed for thoughtful conversation, valuable networking, and elevated dining in a truly unique venue.
Security Operations are evolving to meet the demands of rapidly changing threat landscapes. Learn how Zscaler integrates Zero Trust principles with AI-powered tools to enable faster detection, reduced risk exposure, and streamlined response across environments. Explore how unified data fabric and advanced capabilities like Continuous Threat Exposure Management (CTEM) and Asset Exposure Management are transforming security workflows and empowering organizations to prioritize and act decisively.
Group Head IT Security, DJ Bank

Chief Product Officer, Zscaler

EVP, Cybersecurity, Zscaler
Artificial Intelligence relies on a foundation of trusted data, making security the first priority. Learn how to build an architecture that governs access, prevents data leakage, and enforces policies across users, devices, and clouds. Future-proof your data security while ensuring compliance and reducing operational risks across your enterprise.

VP, Product Management, Zscaler
In this interactive session, CIOs, CISOs, and CTOs will join facilitated peer-to-peer discussions focused on the most pressing challenges shaping the enterprise today. From embedding AI into network and application design to navigating new regulatory landscapes and developing the next generation of technology leaders, these roundtables provide an opportunity to learn from peers facing similar inflection points. Each discussion is designed to surface real-world strategies, emerging best practices, and bold ideas for leading through massive technological and organizational change.

CEO, Chairman & Founder, Zscaler

EVP & AI Security and Strategic Initiatives,, Zscaler
As cyber threats evolve, fragmented controls leave gaps in your defense. See how unified inline threat blocking, TLS/SSL inspection, zero trust segmentation and data loss prevention work together to prevent compromise, minimize risk, and stop data loss. Learn the latest innovations to secure AI usage, achieve next-gen cyberthreat protection, and prepare for quantum-powered threats.

Field Product Manager, Zscaler
Attackers leverage AI to accelerate attacks. Learn how Zscaler uses exposure insights and zero trust telemetry—correlating alerts to surface threats, using Deception and Threat Hunting to find what other tools miss, and providing insights into human and non-human identities. Explore Zscaler's SOC-of-the-future capabilities, running them yourself or using Red Canary for staff augmentation. Tap expert‑supervised human/AI workflows that improve detections, automate triage, and respond faster to the risks that matter.

EVP, Cybersecurity, Zscaler
Join this technical Q&A to explore the latest advancements in our unified DS Platform, spanning DSPM, Data Detection and Response (DDR), and automated workflows. We’ll discuss how to leverage Data Lineage for end-to-end visibility and how to incorporate User Risk Intent to stop threats before they escalate. This session covers extending protection to on-premises environments, securing browser extensions, and governing GenAI usage. Bring your questions on how to eliminate shadow data and unify fragmented security policies. Learn how to consolidate your stack while gaining deep visibility and control across all data channels.

VP, Product Management, Zscaler
Join Zscaler CEO Jay Chaudhry for an exclusive Q&A session where he’ll share the company’s strategic vision, groundbreaking product innovations, and key partnerships. Gain insights into how Zscaler is tackling critical industry challenges and supporting customers in achieving secure digital transformation. Don’t miss this unique opportunity to hear directly from the leadership driving success in the evolving cybersecurity landscape.

CEO, Chairman & Founder, Zscaler









