Trouble viewing this email? View in web browser
cxo-voices-banner.png
 
 
Zscaler execs spell out the perils of legacy architecture at RSAC
Kyle Fiehler, Senior Transformation Analyst

“Don’t think lift and shift; think architectural change”

Zscaler CEO & Founder Jay Chaudhry helped open RSAC 2023 with this rousing call to action. At the Cloud Security Alliance's traditional summit, he invited executives from E.ON and Dow Chemical to describe their zero trust journeys and field audience questions.

Bryan Green, Zscaler CISO - Americas, advised on practical steps for mapping zero trust transformations to NIST's authoritative 800-207 special publication. Next, Global CISO Deepen Desai and Sudeep Singh, APT Research Tech Lead, presented threats posed to MFA by AitM attacks, which have been documented increasing in the wild.

Speaking of CISOs, we have plenty of them on CXO REvolutionaries Insights, where you can find ongoing advice from professionals at the top of their game, like Dawn-Marie Hutchinson, a top-five global CISO, according to CSO Magazine. Check in regularly to stay up-to-date with executive-focused and executive-authored analysis.

cxo-voices-banner.png
 
From the Office of the CTO:
CXO Insights: Evolution of zero trust and the security service edge (SSE)
Sanjit Ganguli, VP Transformation Strategy & Field CTO - Global Enterprise, Zscaler
With the recent publication of Gartner’s updated Magic Quadrant for Security Service Edge, we have been asked by a number of CXOs about this fast-growing solution category and how it relates to zero trust. The short answer is that they are closely intertwined.

Zero trust is a framework for securing organizations in the cloud and mobile world that asserts that no user or application should be trusted by default. Zero trust is a way of thinking that permeates across a number of areas, not just new architecture or technology. There are practical zero trust implementations from vendors, like Zscaler, that have solutions with zero trust frameworks at their core. Once deployed, zero trust technology provides secure access for users, things, and workloads to public or private destinations.

The most common taxonomy used to describe solutions with zero trust architecture is called Security Service Edge or SSE.
 
Editor's Picks
In healthcare, medical devices required for patient care, like dialysis machines, intravenous pumps, pacemakers, and vital signs monitors, are typically part of the hospital IT network. As such, they are usually linked to the local network and to cloud computing services that help manage them.
Learn how healthcare IoT introduces threats – and how zero trust can help
In articles about how threat actors can use AI, you've probably noticed they fall into two categories: improving deception capabilities and automating malicious coding. The first case argues that generative AI using large language models can create phishing and smishing lures that are more believable. The second topic is AI writing malware.
Why neither is as concerning as another potential capability
Digital transformation occurs not only in technology but also in a number of non-technology areas. These include changes in culture and mindset, organizational structure, processes, and skill sets. While often not prioritized during secure digital transformations, these areas all play a critical role in its success.
Why technology isn’t the only digital transformation consideration
When news broke that unknown actors were mailing exploding USB sticks to newsrooms in Ecuador, CISO Francis Yeow remarked that it fits a pattern of threat actors returning to their old tricks to attack their targets. While explosive capabilities may be new, threat actors have been smuggling malicious payloads into USB sticks since at least 2008.
Tips for overcoming the proven formula of phishing + malware
Even with all of the benefits associated with zero trust architecture (ZTA), there are still several obstacles that can either slow down or derail the journey. There are three common obstacles that technology leaders need to overcome.
Learn how to overcome these common obstacles
 
Podcast Center
Tune in and zone out to stories of digital business and cybersecurity excellence from across our CXO community.
The CISO’s Gambit | Ep. 25
The nexus of cyber, AI, and education is getting more complex, but CISO and polymath Sam Curry delivers sharp insights and memorable anecdotes for leaders facing asymmetric threats from a borderless offense.
Listen now

Cloudy with a Chance of Trust | Ep. 43
The big three cloud service providers are in an arms race to release new functions and win market share, forcing organizations to contend with misconfigurations, excessive entitlements, sensitive data exposure, unpatched vulnerabilities, and blind spots across their asset inventories. Learn how CNAPP and DLP can help you get back in control from Zscaler SVP & GM, Posture Control Rich Campagna.
Listen now

The CIO Evolution | Ep. 19
How can a chip maker help vendors create better security software? Nathan Howe, Zscaler, VP Emerging Tech & 5G, explains what's under the hood of the integrations between CrowdStrike, Zscaler, and Intel that were announced at RSA Conference 2023 in San Francisco.
Listen now
 
 
ad-communityforum-04@2x.png
 
 
Contact
Contact the Customer Experience &
Transformation Team: [email protected]





LP-Asset-Aid-v1_twitter.pngView us on YouTube: youtube.com/@CXOrevolutionaries
LP-Asset-Aid-v1_twitter.pngFollow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
logo-zscaler-white 139x30.png