Trouble viewing this email? View in web browser
24-12-masthead-e43-TB-JE-KM@2x.jpg
 
 
Nurturing the next generation of cyber talent
Kavitha Mariappan, EVP, Customer Experience & Transformation, Zscaler
I recently had the pleasure of sitting down with two pioneering women leaders and tech industry titans: Girls Who Code CEO Dr. Tarika Barrett and CISA Director Jen Easterly. Our focus was diversity in cybersecurity and how we can foster the next generation of cybersecurity leaders.
Some of my key takeaways:
  • We face a significant cyber talent gap - Addressing the talent gap is critical to avoid negative impact on the nation's national security and economic prosperity.
  • Up and coming leaders need future-proof skills - Education programs must equip our cyber talent pipeline with the skills they need to be successful against tomorrow's threats and risks.
  • Public, private and non-profit collaboration is key - No one group can solve this on their own. The whole community must contribute to bring about change.

I hope you’ll read my complete recap or watch a recording of this can’t-miss conversation, where we cover topics affecting the entire industry. And if you were inspired by what you heard, Dr. Barrett will join us at the upcoming Women in IT & Security CXO Summit next month in Boca Raton, FL.
Which brings me to my next point…I am thrilled to announce the keynote speaker for our upcoming summit. Arianna Huffington, the renowned & CEO of Thrive Global and the Huffington Post will join me following a keynote address for an in-depth discussion and audience Q&A. Women CXOs won’t want to miss this opportunity to join one of the industry’s most impactful communities.
I hope to see you there. And, if you’re celebrating, I hope you have a relaxing and enjoyable Holiday Season. We’ll see you again in the New Year.
 
Customer Journeys:
How Repsol’s DLP strategy enables a fearless embrace of GenAI
Javier García Quintela, CISO, Repsol
Madrid-based global energy provider Repsol is fully committed to meeting the ambitious goal of net-zero carbon emissions by 2050, as outlined in the Paris Agreement. Technology is considered a core pillar in helping the company transition away from fossil fuels to its growing portfolio of low carbon and renewable energy sources.
When generative AI (GenAI) emerged as a potential game-changer for business productivity a few years ago, Repsol began exploring how it could be adopted to foster productivity, optimize business processes, and help the company develop its portfolio of green energy offerings. Whether it takes the form of equipping staff with AI co-pilots, designing new products, or integrating value chains, AI will play a crucial role in Repsol’s continued success.
Of course, as any cyber leader knows, GenAI is not without its risks: these tools enable sensitive information to leave the organization, leading to the loss of intellectual property, privacy violations, and other forms of regulatory non-compliance.
How Repsol embraces GenAI while mitigating its risks
 
Editor's Picks & Events
Domain generation algorithms (DGAs) are an at least semi-sophisticated technique used by malware authors and distributors to ensure the resilience and adaptability of their malicious infrastructure. DGAs dynamically generate multiple domain names that act as rendezvous points between malware and their command and control (C2) servers. Here we’ll define DGAs, some of their legitimate and nefarious or malicious uses, detection and prevention techniques, and strategies for protecting organizations from DGA-based attacks.
Learn to spot – and stop – DGAs
Enterprise CXOs increasingly regard the internet as the backbone of the corporate network. Decentralized, pluralistic, and built on open standards, the internet is a reliable means for delivering a great experience for most business applications. But this global tapestry of networks and nodes does not always ensure speedy, flawless access. Suboptimal digital experiences and the potential for widespread cloud outages can cause lengthy downtime with far-reaching impacts.
How internet issues impact operations and user experience
While flooding in Valencia and its aftermath kept us from meeting in person, we once again charged on with a virtual CXO Exchange that was nevertheless packed with valuable insights into zero trust innovations and advancements helping to transform businesses. Here are a few of my biggest takeaways from another exciting Exchange.
Read the key takeaways
"No one ever got fired for buying IBM." The familiar adage has long been the bedrock of decision-making for many chief information officers and chief information security officers, who often favor traditional, ‘tried-and-tested’ solutions over newer, potentially transformative technologies. Sticking with established solutions and known providers gives a sense of security and familiarity, but it can also open organizations up to attack.
How sticking with the status quo can backfire
Zscaler is hosting a number of opportunities for leading IT and security executives to meet for in-person experiences that facilitate relationship-building, best practice sharing, and the chance to interact directly with company leaders. Whether it's at an upcoming CXO Exchange or a bespoke gathering for women CXOs, we hope to see you soon.
Browse upcoming CXO Experiences
 
ad-communityforum-04@2x.png
 
 
Contact
Contact the Customer Experience &
Transformation Team: [email protected]





LP-Asset-Aid-v1_twitter.pngSubscribe on YouTube: youtube.com/@CXOrevolutionaries
Follow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
logo-zscaler-white 139x30.png