Trouble viewing this email? View in web browser
25-02-masthead-e45-AlisaCLChoong@2x.jpg
 
 
How CTEM enables proactive risk management
Kyle Fiehler, Sr. Manager, CXO Thought Leadership, Zscaler
"How many assets do I have? What vulnerabilities are they subject to? How can I best remediate the risk they present?"

These are questions every CXO must ask (and be able to answer), but siloed monitoring tools and incomplete asset discovery make the process tricky, if not impossible.

These challenges have exposed organizations' assets and over-extended their SOC teams for too long. With complete, inline visibility over more than 500 billion daily resource requests and its data fabric for security, Zscaler is well positioned to deliver the visibility and control security teams need to manage risk without spending undue amounts of time chasing down false positives and noise.

As Zscaler CXO Advisor Alisa Choong knows, solutions are meaningless if not deployable. That’s why, in accordance with Gartner guidance on continuous threat exposure management (CTEM), Zscaler is prioritizing visibility, triage, and remediation capabilities needed to maximize the efficiency and effectiveness of security teams' resources.

The Zscaler CTEM offering includes two, essential capabilities for threat management:

  • Asset Exposure Management – Allows security operators to create a complete roster of assets in use by referencing dozens of source systems, identify and close coverage gaps like misconfigurations and compliance violations, and mitigate risk by suggesting policies, workflows, and critical updates.
  • Unified Vulnerability Management  (UVM) – Helps security teams prioritize risk exposure, easily report on remediation efforts, and even automate the workflows that lead to quicker resolution of issues based on the team's organizational structure and grouping logic.

If you’re interested in learning more about how Zscaler offerings align with the Gartner CTEM framework, watch the announcement and read Zscaler EVP, Customer Experience & Transformation Kavitha Mariappan’s thoughts on the strategy underlying CTEM.
 
From the Office of the CTO:
Prioritizing continuity of care in the face of cyber risks in healthcare
Tamer Baker, Public Sector CTO - Healthcare, Zscaler
Technological progress continues to reshape patient care, improve operational efficiencies, and redefine the overall healthcare experience. Economic justification for the digital transformation is driving electronic health records (EHRs), telemedicine, mobile health applications, and wearable health technology forward.

Like in all spheres of business, SaaS adoption continues and more applications are now in the cloud. New medical devices are more connected than ever, moving the edge of care into the home and even anywhere where 5G connectivity is available. More innovation is always on the horizon, especially with artificial intelligence.

In turn, the industry is seeing huge troves of sensitive and valuable data ‌being created, processed, sent, and stored online every day. This makes healthcare organizations more attractive targets for cybercriminals, with data breaches becoming more common. They are causing not only financial losses, but also wreaking havoc in patient care, including death.
Improving patient outcomes with zero trust
 
Editor's Picks & Events
Ben Corll
In an era dominated by data-driven decision-making, digital primacy, and evolving threats, cybersecurity and privacy have both become foundational concerns for most organizations. While these concepts are often discussed together, they are distinct yet interconnected disciplines with unique objectives. Can one exist without the other? If so, which? Let’s explore their relationship.
Parsing privacy versus security
There is a reason that a compromise of one smartphone doesn’t lead to a breach of every smartphone’s security: microsegmentation. Telecom companies use this ‘network of one’ strategy to isolate devices and protect against threats spreading among them. This was the inspiration that led to me co-founding Airgap in 2019. Securing critical infrastructure, as well as the wider public and private sectors, is crucial for countries looking to protect themselves from hostile threat actors.
The subtle elegance of a 'network of one'
The media industry is diverse, encompassing global and local newspapers, television networks, radio stations, online video and music streaming platforms, and publishing houses. Seismic shifts in how people consume media over the last decade have disrupted major players. In response to changing consumer demands, many have adopted digital workflows, expanded their online presence, and moved to cloud-based operations. This has introduced new security challenges, which many companies are struggling to meet.
How to increase security, not friction, for media outlets
Even ‌mergers and acquisitions that initially go well are still judged by demonstrated value on a reasonable timeline. Many times, ‌technology integration becomes the leading cause for those timelines and budgets getting drawn out. In the worst cases, deals are jeopardized. It doesn’t have to be that way. Learn to calculate the potential hard-dollar savings when zero trust network access (ZTNA) is shared between a Buyer and Target company rather than merging legacy architecture.
How to recoup IT cost savings in M&A deals
When I was hired nine years ago, Zscaler was essentially a cloud secure web gateway. My role was to figure out what we could do at TCP layer seven — the application layer. We set out a vision to build a comprehensive, world-class data protection solution encompassing all data channels that now has high relevance in a world where generative AI (GenAI) applications are rapidly gaining adoption.
Why it helps to think like a cybercriminal
 
ad-communityforum-04@2x.png
 
 
Contact
Contact the Customer Experience &
Transformation Team: [email protected]





LP-Asset-Aid-v1_twitter.pngSubscribe on YouTube: youtube.com/@CXOrevolutionaries
Follow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
logo-zscaler-white 139x30.png