24-02-masthead-e33@2x.jpg
 
 
When it comes to GenAI, proceed (with caution) say CXOs
Kyle Fiehler, Senior Transformation Analyst, Zscaler
Time and again guarded optimism is the message from leaders in IT and security when advising on generative AI adoption for the enterprise. Like the cloud before it, from the boardroom on down, GenAI is seen as the next technology that cannot be ignored. It is described as an inescapable technological advance replete with potential pitfalls. Whether it be ethical concerns, the skills gap in deploying and managing the tools, or data privacy issues, CXOs have no shortage of worries over their AI adoption strategies.

That’s why we were happy to host an Executive Connect Live on the topic including this month’s featured CXO, Shamim Mohammad, EVP & Chief Information and Technology Officer at CarMax. To assist in unpacking this complex topic, he was joined by Greg Simpson, former CTO at Synchrony Financial and avid technologist.

“Every role will be impacted," Mohammad told moderator and Zscaler EVP, Customer Experience & Transformation Kavitha Mariappan. So too, it seems, will every sector of society. The dust is beginning to settle on the U.S. and, crucially, the EU approach to regulating AI use. Undoubtedly these rules will affect how organizations consider integrating AI into their operations.

There’s little time to waste.The tools are out there,” Simpson told listeners. “They work right now, and, if you’re not using them in your business, you’re already falling behind.”

Catch up on the conversation by reading a short recap, or watch the discussion in its entirety. And don’t forget, our next stops on the CXO Exchange tour are Amsterdam and Nashville, where attendees will explore how AI is changing roles and responsibilities for CXOs around the globe. Learn more and register here.
 
From the Office of the CTO:
Understanding and preventing business email compromise
Gary Parker, CTO in Residence, Zscaler
Businesses of all sizes face a growing cybersecurity and financial threat known as business email compromise (BEC) simply because they use email. BEC attacks have become increasingly sophisticated, posing significant risks to all organizations.

These cyberattacks entail unauthorized access to and manipulation of business email accounts. Often, attackers skilled in social engineering tactics impersonate executives, employees, or business partners to deceive recipients into taking actions that benefit the criminals. These actions include wire transfers, releasing sensitive information, or making unauthorized financial transactions.

For example, an attacker can contact someone in the finance department via email or phone to impersonate a senior executive. The attacker would tell the finance employee they do not have access to their computer but need an emergency wire sent to a specific bank account. Without the correct controls, the finance person could send the wire to the attacker's bank account.

Get tips for preventing business email compromise.
 
Editor's Picks & Events
Join peers in vibrant Nashville, a city known for its originality and hospitality to share learnings, exchange insights, and write your own chapter on cyber leadership. A curated agenda features inspiring speakers at one of the city's newest and finest hotels. Learn to lead through transformation at this exciting event for IT and security leaders.
Learn more and save your seat
A group of inspiring, powerful group of women IT and security leaders recently joined us from some of the world’s most recognizable companies to share their expertise, stories, and smiles. The wisdom and collective decision-making power were staggering.
Read more praise for the protectors
With the realization that old IT infrastructures are not designed to support the diverse hybrid working arrangements we see today, Zscaler customers challenged us to enable the work-from-anywhere paradigm. With our lead in zero trust, we knew we could offer our legendary security and performance benefits without compromise across a wider area of corporate infrastructure.
Learn to recognize the signs
CISOs and sewer engineers face similar challenges, and it goes beyond keeping the contents of their systems moving fast and smooth. There is a mathematical exercise that has many names, but I learned it as the New York City Sewer Problem. In short, it states that finding the optimal configuration of the NYC sewer system is a problem modern computing cannot solve in a human lifetime.
How SASE helps solve the unsolvable
2023 continued to see effects of the geopolitical conflicts, rising levels of inflation, volatility and instability in the financial markets, supply chain issues, and companies not fully recovering to pre-pandemic levels. However, despite a slow start, deals picked up in the latter half of 2023 as CEOs began adapting to the new realities of dealmaking.
M&A the zero trust way
 
Podcast Center
Tune in and zone out to stories of digital business and cybersecurity excellence from across our CXO community.
The CIO Evolution | Ep. 28
As CIO of a 95,000-employee global powerhouse in healthcare technology, Medtronic's Rashmi Kumar is committed to success, innovation, inclusion, and securing patient, customer, and company information. Discover a compelling career origin story and journey with incredible advice that can help you set forth a vision and build influential teams and partnerships to succeed.
Listen now

Cloudy with a Chance of Trust | Ep. 49
Voya Financial CISO Stacy Hughes speaks as an industry advocate and mentor about the importance of going deeper than standard cyber awareness training, mentorship as "servant leadership," practical advice for dealing with the time constraints imposed on executives, and a few of the Atlanta-area organizations she supports.
Listen now

 
 
ad-communityforum-04@2x.png
 
 
Contact
Contact the Customer Experience &
Transformation Team: [email protected]





LP-Asset-Aid-v1_twitter.pngView us on YouTube: youtube.com/@CXOrevolutionaries
Follow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
logo-zscaler-white 139x30.png