Trouble viewing this email? View in web browser
 
 
What we learned from CXOs during Cybersecurity Awareness Month
Kyle Fiehler, Senior Transformation, Zscaler
Cybersecurity Awareness Month may be in our collective rearview mirror, but if there’s one thing we learned from the executives we spoke with to mark the occasion, it’s that, much like the spirit of Christmas, user education is something cyber leaders must carry in their hearts all year long.

For Capitec Bank CTO and this month’s featured REvolutionary Andrew Baker, that means building in small weekly exercises to keep non-experts engaged and learning. For NOV CIO Alex Philips, it means stressing safe cyber habits at home with the understanding that these will carry over into the workplace. For Cloud Security Alliance (CSA) President Illena Armstrong, closing the cybersecurity skills gap is a calling, not a calendar-based activity.

Of course, it’s not only front-line users needing cybersecurity schooling. SEC rules due to come into effect this December will ask boards to improve their understanding as well. For that, we have just the resources. The next installment in the “Seven Series” was written for board members by board members. With phenomena like AI-enabled ransomware groups, verified identity attacks, and evolving security frameworks (see below for stories), there will always be plenty to learn, so download your copy today.

Combined with our offerings for architects and CXOs, we empathize with the pursuit of lifelong learning, from the most novice users to experienced IT and cyber professionals at the top of their game.
 
From the Office of the CTO:
Your biggest barriers to digital transformation aren’t technical…they’re cultural
Gary Parker,CTO in Residence, Zscaler
As an infrastructure and security practitioner with nearly 30 years of experience, I’ve witnessed periods of rapid change in the technology landscape. However, I have seen a lot of things stay practically the same. Historically, our jobs as infrastructure and security professionals have involved installing the “plumbing” that ensures organizations remain connected through traditional networking and security practices. Important, but rarely revolutionary.

For decades, organizations have considered networking and security a cost of doing business. Business leaders consider IT a cost center, not a revenue generator. They were just things companies had to do to keep the lights on. Those who have been successful have done those things the same way. Proven methodologies developed years ago allowed us to reliably connect users, applications, and smart devices that propelled our organizations forward. Without these capabilities, global business would screech to a halt.

However, things have changed and the target has moved.

How digital transformation is empowering IT leaders to be business enablers.
 
Editor's Picks
AI has been tech’s darling since ChatGPT was released to the masses, unveiling the transformative potential of large language models for all the world to see. As businesses scramble to operationalize AI-enabled interfaces, ransomware actors will use it to scale operations, widen profit margins, and increase their likelihood of pulling off successful attacks.
How the good guys can keep pace with adversaries
Cybersecurity has been identity-centric since the first username and password appeared. During the infancy of personal computers, user identification was considerably simpler. At that time, workplace technology was physically confined to an office and the business network (if one existed). The only people with access were employees and maybe office cleaning staff.
Exploring identity-based risk in the modern era
Post-pandemic change and economic uncertainty have many organizations looking for new ways to stretch scarce resources. However, some are unaware of how large a role IT and cybersecurity optimizations can play in these efforts. That’s particularly true of organizations still using traditional castle-and-moat architecture, powered by “last-gen” security technologies.
Reduce risk and cut costs with zero trust
As state CIO, your charter is to secure as fully as possible all data and services used at the state level and to advise a variety of agencies and groups at the local level who may need to access those resources. But you quickly discover the agencies are an unpredictable hodgepodge of security capabilities statewide.
Giving the cyber “have-nots” a shot with a unified public-sector strategy
I recently read “What Got You Here Won't Get You There” by Marshall Goldsmith. The book's premise, as the title suggests, is that the things that got you where you are today may not get you where you want to be tomorrow. While jotting down a quick summary of the book, I started to relate its teachings to cyber.
In pursuit of personal and professional growth as a CXO
Elena Elkina, Partner at Aleada Consulting, uses her legal and technical background to help organizations explore the treacherous intersection of privacy and security. Are your security processes compliant with privacy regulations? Does complying with security regulations mean you have met your privacy obligations?
Hear insights from this dynamic leader at the intersection of law and tech
 
ad-communityforum-04@2x.png
 
 
Contact
Contact the Customer Experience &
Transformation Team: [email protected]





LP-Asset-Aid-v1_twitter.pngView us on YouTube: youtube.com/@CXOrevolutionaries
Follow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
logo-zscaler-white 139x30.png