Trouble viewing this email? View in web browser
Some things you just have to experience live
Daniel Ballmer, Senior Transformation Analyst

Information is on the internet, but experience isn’t.

If you were to search the internet, you would discover that Zscaler Founder, CEO, and Chairman Jay Chaudhry was born in a small village in India. He and his wife invested their life savings in a cybersecurity startup called SecureIT. He founded another three successful companies before his fifth business, Zscaler, became the world’s largest cloud-native zero trust security platform.

But search engines can’t tell you what it’s like to start from humble beginnings and build a global company that handles more daily transactions than Google. The internet cannot teach you how he did it, what it was like, or the lessons learned along the way.

This is why every year Zscaler gathers our customers, peers, and yes, our founder, at an event called Zenith Live. The internet dispenses information, but Zenith Live explores experiences. As Chaudhry puts it, “Zenith Live brings security practitioners, industry leaders, and technology experts together to discuss the most pressing, real-world cybersecurity challenges facing organizations today along with strategies and practical solutions to address them.”

Join us in Las Vegas from June 12-15 or Berlin from June 26-29 to experience the premier gathering of industry-leading tech professionals sharing their digital transformation experience and helping each other succeed.

Information is always available.
The Zenith Live ‘23 experience is only happening in June.
This is your chance.

Register to join us for Chaudhry’s keynote, Securing the Enterprise with Zero Trust for All—Users, Customers, Workloads, IoT/OT, live in person.

From the Office of the CISO:
Complexity will cost you. Vendors are counting on it
Tony Fergusson, CISO - EMEA, Zscaler
I spoke at a conference some time ago and used one of my favourite analogies, which compares zero trust to a Tesla EV and legacy networking to gas-powered cars. It’s a new way of thinking about things, I emphasized.

I had just finished presenting how great zero trust is as a framework – how it reduces complexity and cost while promising better security and more agile operations – when a hand shot up.

“If zero trust is so great,” the audience member asked, “why isn’t everyone already doing it?”

It’s a good question. I once asked it myself. Zscaler research suggests that more organizations (90%) have begun some type of zero trust initiative, but only 22 percent are confident that they are leveraging the cloud to its full potential. What’s the holdup?

Nevertheless, I replied with what I thought was a satisfying answer: “Inertia, basically.”
Editor's Picks
Cybersecurity is in the spotlight among boards of directors, with long-anticipated US Securities and Exchange Commission (SEC) rules expected to significantly impact if passed. Security incidents typically trigger full-board involvement in cyber-risk oversight, but if new stringent SEC rules pass, cybersecurity may figure more prominently on board agendas.
Read what new cyber rules may mean for boards on NACD BoardTalk
No matter where your organization stands on the road to zero trust – even if it hasn’t yet set out – your next step just became a little clearer. CISA’s newly released Zero Trust Maturity Model 2.0, rather than expecting organizations to jump straight into the deep end, contains benchmarks for newcomers.
A former CIO's action items from CISA’s revised zero trust maturity model
If cybersecurity is a way of life and you want variety and independence, a virtual CISO option may be the right fit. vCISOs are independent or contracted employees that carry out the role of a CISO for companies that may not have a case or budget for a full-time equivalent.
See if you have the traits to thrive in the vCISO role
Zscaler CISO Deepen Desai recently presented at the RSA conference about the vulnerabilities of multi-factor authentication (MFA). Desai leads ThreatLabz, Zscaler’s embedded threat research team, who have been actively tracking a large phishing campaign that bypasses MFA since uncovering advanced phishing kits.
Get the findings and fixes for MFA phishing
How and why NIST’s special publication 800-207 charts the industry trust model's evolution from network-centric to zero trust and how organizations can adapt their processes to meet the demands of the modern-day threat landscape.
Putting NIST’s zero trust guidance into practice
Podcast Center
Tune in and zone out to stories of digital business and cybersecurity excellence from across our CXO community.
Cloudy with a Chance of Trust | Ep. 44
Zscaler VP & GM of Product Management Dhawal Sharma joined the show to preview some of the innovations to be announced at Zenith Live '23 in Las Vegas and Berlin this June. But before he does, Dhawal provides a glimpse into the challenges and goals of product management teams, how they prioritize release roadmaps, and the importance of customer-centric innovation.
Listen now

The CIO Evolution | Ep. 21
Private equity firms searching for transaction opportunities are increasingly focused on portfolio performance. In this episode, 20-year industry veteran and private equity practice lead at Zscaler, Akshay Grover, covers how leaders in PE can preserve and create value by applying cyber risk management measures.
Listen now

Contact the Customer Experience &
Transformation Team: [email protected]

LP-Asset-Aid-v1_twitter.pngView us on YouTube:
LP-Asset-Aid-v1_twitter.pngFollow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
logo-zscaler-white 139x30.png