Trouble viewing this email? View in web browser
The right tool for evoking cybersecurity awareness across the board
Christopher Jablonski, Director, CXO REvolutionaries & Community, Zscaler

Love it or hate it, Cybersecurity Awareness Month is always a time when cyber mindshare across the citizenry ticks upward and cyber leaders that have the luxury to take a step back and question and update cybersecurity approaches do so. But where to start? Most costly incidents can be attributed to human behavior, so how about there? In the age of engineered influence, how do we trust human judgment calls that can expose organizations to risk?

23-10-ZS-BoDBook-Cover-01.pngHuman discretion is valuable since everything can't be automated and nuances and edge cases to deal with in business (see story below). Using as much technology as possible to handle processes and workflows, enforcing robust policies, and enhancing vigilance will safeguard your organization against breaches. I’ll spare you from a recital of the proactive measures you already know that protect your data and fortify your enterprise.

But there’s a very influential group that does not know about them: your organization’s board of directors. Since cyber risk is gaining pole position among the usual business risks boards concern themselves with, we produced a new book with the help of some knowledgeable authors who happen to be board members themselves. With the board on your side, you can drive cybersecurity initiatives that have backing from the absolute top. I recommend downloading the free 100-page guide and sharing it with your board’s risk committee. That’ll raise awareness.

From the Office of the CTO:
Human discretion is great, right? Not when it’s the lifeblood of social engineering attacks
Brett James, CTO in Residence, Zscaler
When people talk about zero trust, the first thing that comes to mind is the network, the infrastructure, or the architecture of the enterprise. That is a good starting point, but IT organizations only start to reconsider policies and procedures to support the new concepts during implementation. At this point, IT pros really start to understand what a true zero trust transformation entails.

It entails everything.

To get a handle on it, start with the industry-standard source for zero trust architecture: The National Institute of Standards and Technology. Its NIST 800-207 special publication on zero trust focuses on IT infrastructure, introducing the policy enforcement point (PEP) as not only a centralized application access and authorization point but also a mechanism for stopping malware and other cyber attacks.

Making a case for people-centric policy enforcement points.
Editor's Picks
Many years ago, businesses were starting to make the move from analytics to big data, and I was looking for the right vendor to help my team do the same. An established brand had already approached my organization claiming their solution could solve all our problems. But a smaller, less well-known company in California had also approached us with a significantly cheaper bid.
Where a CXO turns for guidance when a decision matter
While the connection between cybersecurity, environmental, social, and governance (ESG) issues, and private companies may not be immediately obvious, they influence one another in significant if sometimes subtle ways. Much like how awareness of carbon emissions and climate change has become mainstream, cybersecurity has risen to the top of the ESG agenda.
Why even private companies should care about ESG
High-profile incidents are one of the most surefire ways to get companies to take cybersecurity off of the back burner and into focus for leadership. Breaches are commonly due to a lack of resources, whether that be skilled personnel, the right tools, or a lack of progress toward a mature cybersecurity program.
How CISOs can make the most of the period following a breach
When an attacker scans your environment for entryways, what’s the most promising vulnerability they will discover? Verizon's 2023 Data Breach Investigations Report found that over 74% of breaches required human exploitation to be successful. That means humans still represent the greatest vulnerability to our cybersecurity. This won’t surprise many working in the field. Unfortunately, awareness of the problem has not reduced the risk it represents.
Create a culture of security
If you want to make an Indian beam with national pride, you need only mention the country’s Unified Payments Interface (UPI) success. This homegrown interbank digital payments infrastructure has made India the world's largest source of digital payment transactions. Along the way, UPI has integrated millions of formerly unbanked Indians into the formal economy.
Zero trust architecture can ensure banks can handle the added traffic
Podcast Center
Tune in and zone out to stories of digital business and cybersecurity excellence from across our CXO community.
The CISO’s Gambit | Ep. 29
Challenge yourself, get uncomfortable, scale up, and learn the language of business. Discover the vital steps CISOs take to stay sharp, mentor tomorrow's leaders, and secure a global organization.
Listen now

The CIO Evolution | Ep. 25
Drawing on recent survey results, Liz Ramey, senior director of content at Evanta, a Gartner Company, explains how CIOs are shifting their functional priorities to respond to ever-increasing demands to keep pace with the business and deliver results. Tune in to this episode to learn how technology leaders in the C-suite carry out their complex responsibilities today, such as juggling GenAI with non-tech demands, and what it takes to succeed.
Listen now

Cloudy with a Chance of Trust  | Ep. 47
From Microsoft to Salesforce, Syam Nair’s work has left an indelible mark on the intersection of technology and business productivity. He recently joined Zscaler as CTO and EVP of Research and Development. In this episode, he relates lessons from the first 100 days on the job, the personal philosophies that guide his professional life, and what excites him most about the future of Zscaler from a technology perspective.
Listen now
Contact the Customer Experience &
Transformation Team: [email protected]

LP-Asset-Aid-v1_twitter.pngView us on YouTube:
Follow us on Twitter: @zscaler
Connect on LinkedIn: CXO REvolutionaries
logo-zscaler-white 139x30.png