Trouble viewing this email? View in web browser
People, process, and technology are the three legs of any mature cybersecurity program. If any one of the three are weak, there will be problems.

Alex Philips, Chief Information Officer, NOV
CXO Program to wow at Zenith Live 2022
Christopher Jablonski, Editor in Chief
June features Zscaler’s largest event of the year, Zenith Live 2022, and we’re looking forward to playing our part with the invitation-only Zenith Live CXO Program taking place on Wednesday, June 22.
Along with a host of panel discussions, featured speakers include Zscaler CEO and Founder Jay Chaudhry, Zscaler President Amit Sinha, Ph.D., Sunbelt Rentals Chief Digital & Technology Officer JP Saini, NetJets CISO John Graham, and Royal Caribbean Group VP, Operational Excellence John Maya.
NOV CIO Alex Philips will also deliver a main stage keynote explaining how he led the digital transformation of an organization with more than 27,000 employees across 66 countries. Hear how he was able to modernize complex infrastructure, expanded through 300 mergers, to a cloud-first zero trust architecture for added security and efficiency.
In addition to an all-day networking lounge, the program is packed with more talks sure to pique the interest of CXOs, including:
CXO Discussions with Zscaler Leadership
  • CISO | The Threat Landscape Today: Where we are and Where we’re Headed
  • CIO | The Evolving CIO Mandate: New Responsibilities and Strategies
  • CTO | Transforming for the Future with Zero Trust Branch and Cloud Connectivity
To join us virtually or in person at Resorts World, Las Vegas, on Wednesday, June 22, register today. Events in the EMEA region are as listed:
Please register using the code CXOCOMP for a complimentary pass to both Zenith Live 2022 and the exclusive CXO Program.

From the Office of the CISO:
WannaCry five years on: Revisiting my revelation
By Tony Fergusson, CISO - EMEA
Five years ago, on Friday, May 12th, 2017, I had an epiphany.

Back then, I was an IT architect in Copenhagen for a large multinational energy company. I was working from home when the WannaCry ransomware variant, which weaponized a stolen NSA exploit known as EternalBlue, began its vicious rampage through hundreds of thousands of devices in more than 150 countries.

It closed hospitals in Great Britain, banks in Russia, a German railway, and a Spanish telecom before a researcher discovered its kill switch. It shook the world’s understanding of its cybersecurity in only a few hours.

It also changed the way I thought about network security forever.

Continue reading on CXO REvolutionaries
CXO REvolutionaries:
Podcast Center
Tune in to the latest voices from across our community of CIOs, CTOs, and CISOs for actionable advice and get inspired by some of the most passionate personalities in the industry.
When it comes to firewalls, things are...complicated. In this episode, Pam interviews Lisa to get at the heart of the dangers and drawbacks of using these legacy network protection tools. Traditional firewalls can't do zero trust, but they can coexist with your modernized infrastructure as you begin your journey.
Listen now
Zscaler VP & CISO Brad Moldenhauer joins host Sean Cordero for a deep dive into new phishing data and tactical analysis provided by the Zscaler ThreatLabz team. They cover why political turmoil tends to correlate with rising phishing rates, phishing attack vectors like browser-in-the-browser (BitB) that are gaining steam among adversaries, supply chain risk, and why spear phishing is still a whale of a problem.
Listen now
Editor's Picks & Events
As companies embrace cloud and mobility, we are discovering that the decades-old approaches to networking and security simply don’t meet today’s business demands. A new approach is needed: one based upon zero trust. To fully understand the value that zero trust can provide, IT leaders need to clearly understand the weaknesses of perimeter-based network security infrastructures in our modern world, and how the zero trust architecture is a fundamentally different approach to enterprise security.
Learn more about the history of zero trust
FIDO, short for "fast identity online," is a standard intended to make user authentication simpler and stronger without relying on passwords. FIDO requires a simple user gesture, like a biometric verification or tapping on a device to enroll, in order to unlock cryptographic keys on a device. Recently, Apple, Google, and Microsoft recently announced plans to expand support for multi-device FIDO credentials.
Learn what it means for FIDO adoption
Resilience was the theme at this year’s Women of Silicon Valley event held in San Francisco on May 10–11. As a woman leader in tech, Kavitha Mariappan took to the stage to speak to the elite group of women who make up part of the melting pot of technology and innovation that is Silicon Valley.
Read Kavitha’s thoughts on customer-centricity and innovation
The Cloud Security Alliance (CSA) is the leading authority dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Zscaler is proud to be a founding partner of its recently announced Zero Trust Advancement Center To learn more about its progress, we recently caught up with CSA Co-founder and Chief Executive Officer Jim Reavis.
Read the full interview with the CSA’s Jim Reavis
Although cloud-driven attacks like ransomware-as-a-service (RaaS) dominate headlines, social engineering remains a proven and effective way to gain a foothold on a network. New research from ThreatLabZ drives home the importance of defending against phishing attacks as a preferred method for compromising organizations, with phishing rates rising a startling 29% from 2020 to 2021.
Learn more about the ThreatLabz phishing research
David Chou was one of the early pioneers of cloud computing at Microsoft. He used diagrams to articulate the different services models available in the cloud compared to traditional on-premise responsibilities. These concepts were first envisioned between 2008 and 2010. A lot has happened in cloud computing since then, and I thought it would be interesting to revisit this model armed with the hindsight of the last 10 years (and through a security lens).
Get tips for implementing zero trust here
Contact the Customer Experience & Transformation Team: [email protected]

Contact REvolutionaries Editor-in-Chief Chris Jablonski at [email protected]
LP-Asset-Aid-v1_twitter.pngFollow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
Sponsered By
logo-zscaler-white 139x30.png