Download the App!
show episodes
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
  continue reading
 
Loading …
show series
 
IT departments often battle the perception of being the "department of no.” In this episode, Zscaler CIO Praniti Lakhwara talks about her guiding principle of enabling every desk to be more productive while simultaneously managing the needs of the business. She discusses the CIO/CISO relationship, the biggest challenges facing CIOs today, the benef…
  continue reading
 
From missiles to your money, Regions Bank Senior VP of Cybersecurity Engineering Jay Patty has more than 20 years of cybersecurity experience protecting some of society’s most important assets. In this episode, he recalls his career trajectory and the personal traits that keep him seeking cyber’s toughest challenges. Tune in to learn critical diffe…
  continue reading
 
In her second sit-down with host Pamela Kubiatowski, Voya Financial CISO Stacy Hughes turns from the technical to the interpersonal. Hughes speaks as an industry advocate and mentor about the importance of going deeper than standard cyber awareness training, mentorship as "servant leadership," practical advice for dealing with the time constraints …
  continue reading
 
What are CISOs to make of recent rulings against their colleagues and increasing scrutiny from the SEC, whose new reporting rules are dnow in effect? Host Pam Kubiatowski sits down with renowned Voya Financial CISO and FinTech veteran Stacy Hughes to discuss how the new rules affect incident response, the importance of CEO support, and consideratio…
  continue reading
 
From Microsoft to Salesforce, Syam Nair’s work has left an indelible mark on the intersection of technology and business productivity. He recently joined Zscaler as CTO and EVP of Research and Development. In this episode, he relates lessons from the first 100 days on the job, the personal philosophies that guide his professional life, and what exc…
  continue reading
 
When a prospect has trouble grasping the architecture underpinning zero trust, Zscaler calls in Brian Deitch. The Chief Technology Evangelist is known for his colorful technical whiteboarding sessions and passion for infosec. He joined the show to discuss his career, early experiments with social engineering, and influences on his distinctive style…
  continue reading
 
He never planned to climb the ladder of corporate technology leadership. But an obsession with hard problems led him down the path to becoming the CTO for South Africa's Capitec Bank. In this episode, learn more about Andrew Baker's career arc, including going from "my very first project was to remove Zscaler because I didn't see the value in it," …
  continue reading
 
Zscaler VP & GM of Product Management Dhawal Sharma joined the show to preview some of the innovations to be announced at Zenith Live '23 in Las Vegas and Berlin this June. But before he does, Dhawal provides a glimpse into the challenges and goals of product management teams, how they prioritize release roadmaps, and the importance of customer-cen…
  continue reading
 
The big three cloud service providers are in an arms race to release new functions and win market share, which is great for innovation. On the flip side, orgs contend with misconfigurations, excessive entitlements, sensitive data exposure, unpatched vulnerabilities, and bindpsots across their asset inventories. Learn how the combined power of CNAPP…
  continue reading
 
Business continuity planning has become a board-level conversation. With so many resources now living in the cloud, outages threaten organizations' very survival. Host Pam Kubiatowski welcomes Harsha Nagaraju, Sr. director, product marketing to the show to discuss the features and capabilities Zscaler offers to enhance clients' resilience against m…
  continue reading
 
Mergers and acquisitions in media, entertainment, and gaming are unique because users are in the driver’s seat, and monetizing their engagement is the name of the game. Praveen Bhasin, managing partner at Tata Consulting Services rejoins Zscaler’s Sami Ramachandran and host Pam Kubiatowski to discuss transactions in this dynamic sector, including h…
  continue reading
 
There are 44 countries and over 200 languages spoken in Europe, making for a complex place for organizations doing trade, complying with data privacy laws, and architecting a zero trust models. In this episode, returning guest Martyn Ditchburn, director of transformation strategy at Zscaler, says thinking globally but implementing locally while sol…
  continue reading
 
Praveen Bhasin (Tata Consulting Services) and Sami Ramachandran (Zscaler) return for the second part of their M&A series, focusing on the trends in the rapidly transforming healthcare industry. Learn about notable transactions in the space, how greater value is extracted from speeding up integrations, and the ingredients needed that make deals succ…
  continue reading
 
If you've ever sat on a couch or put on a jacket, chances are you've experienced a product from Coats. Ben Corll, former VP of cybersecurity for the more than two-century-old industrial thread manufacturer joins the show to talk about leading the company's digital transformation. He discusses gradually adopting a zero trust mindset, why his biggest…
  continue reading
 
Scalability may just be cybersecurity’s saving grace, and AI can enable it. Howie Xu, Zscaler VP of machine learning and AI, explains how his team is going the distance to solve one of cybersecurity’s thorniest problems: augmenting human intelligence where it would otherwise be spread too thin. Tune in to learn how collaborating with domain experts…
  continue reading
 
Praveen Bhasin, Managing Partner at Tata Consulting Services (TCS), shares insights from his book of business and is bullish about life sciences, manufacturing, healthcare, and retail. In this episode, he joins Sami Ramachandran, Zscaler Managing Director, M&A, Divestiture, and Private Equity, and show host Pam Kubiatowski to discuss TCS’s role in …
  continue reading
 
Pam and Brad dissect their recent discussion with NIST Fellow Ron Ross (episode 34) and provide advice for applying the guidance in the special publications he helped develop. Listen to this complimentary deep dive to learn how best to apply controls, properly differentiate and value your data assets, rank and classify your apps, and manage risk by…
  continue reading
 
The cybersecurity world can be divided into two halves--one above the waterline and one below it, says NIST’s Ron Ross. Whereas certification & accreditations (C&As) and assessment & authorizations (A&As) have focused on the former, more needs to be done below the surface to better safeguard hardware, software, and firmware. In this special episode…
  continue reading
 
In this episode, co-host Lisa Lorenzin reveals she is embarking on the next step of her own transformation journey. She looks back on a nearly 30-year career in IT, from the help desk to Field CTO. Lorenzin covers milestones and learnings she picked up along the way, including her zero trust "aha moment" and the changing role of women in IT.…
  continue reading
 
The man without a title joins hosts Lisa Lorenzin and Pam Kubiatowski to discuss the art of talking about technical topics with non-specialists. The master communicator says he stays focused on the “why” when trying to explain complex technologies – and discusses how virtual whiteboarding can be more effective at making a case for an IT purchase th…
  continue reading
 
In this episode, Lisa Lorenzin hands the microphone to co-host and fellow Field CTO Pam Kubiatowski. They explore Pam's experience on topics spanning the "great resignation," soaring SaaS adoption, the importance of user experience, technical debt, and the ever-present pressure to cut costs. For those who've already begun their transformation, tech…
  continue reading
 
Zscaler CISO - AMS Bryan Green braved crowds and his own reservations to be on the scene at RSAC this year. Afterward, he joined Pam & Lisa to discuss popular topics – including identity and access management, securing cloud workloads, and managing third-party risk – and draw parallels between COVID-prevention best practices and zero trust strategi…
  continue reading
 
Zscaler CISO and VP of Security Research and Operations Deepen Desai has a big job. He's not only responsible keeping Zscaler secure, he's also tracking the pulse on the global threat landscape and ensuring customers around the world are protected. Desai joins hosts Lisa Lorenzin and Pam Kubiatowski to explain the objectives of ThreatLabz including…
  continue reading
 
When it comes to firewalls, things are...complicated. In this episode, Pam interviews Lisa to get at the heart of the dangers and drawbacks of using these legacy network protection tools. Traditional firewalls can't do zero trust, but they can coexist with your modernized infrastructure as you begin your journey. Listen now to learn more.…
  continue reading
 
Did you know having a VPN is like getting bombarded with robocalls because you decided to have your phone number listed in a telephone directory? According to Tony Paterra, SVP Emerging Products at Zscaler, with VPN you’re choosing to be a beacon for threats. In the latest episode, he joins Lisa and Pam to get to the essence of doing zero trust the…
  continue reading
 
Nobody can outrun a bear. We're advised to stand tall, wave our arms, and talk loudly, yet calmly - but it might be easier to distract the bear, or to just not let him see you in the first place! In cybersecurity, attackers and threats are hard to outrun using traditional network protections. In this episode, Pam and Lisa explore new approaches tha…
  continue reading
 
The "Wild West" is a term organizations sometimes use to describe the unregulated cloud environments they encounter along their transformation journeys. Compared to established public clouds with well-defined security guardrails, these lawless environments are often built by unknown dev teams and operate like black boxes for users. Even among the "…
  continue reading
 
On this episode, our guest Misha Kuperman, Zscaler SVP cloud operations and ecosystem, returns for an update on the Zscaler cloud. He shares a platform review, thoughts on top issues like supply chain threats and geopolitical risks, and the implications of the Cold War between the West and China - exacerbated by the FCC's decision to revoke Chinese…
  continue reading
 
Cybersecurity is often cited as a key obstacle for expanded cloud and multi-cloud migration, but what if the opposite is true? What if security delivered via the cloud can harden your entire enterprise information technology architecture? In this episode, Pam and Lisa confess their hesitations about moving to the cloud early in their careers, given…
  continue reading
 
Guest Martyn Ditchburn, director, transformation strategy at Zscaler, joins Pam and Lisa to recount his zero trust journey across the merger of companies, on- and off-network protection, and the COVID-19 transition. Using a modern approach to connect and secure users and apps in the cloud can radically speed up time to value for M&A, streamline the…
  continue reading
 
Operational technology leaders are at crossroads as the digitization of the industrial world accelerates. In one direction is the legacy "IT-centric" approach to data security that is ill-suited for OT and IoT systems. The other is extending the zero trust model to devices, effectively hiding hard-to-access and hard-to-patch, agentless IP-enabled s…
  continue reading
 
With 19 episodes in the rearview mirror, Lisa and Pam consider zero trust from a wider perspective, reflecting changes in hybrid work and solution maturity. Inspired by recent customer discussions in the field, they discuss how organizations are applying zero trust protection on-prem through tools such as Zscaler Private Access (ZPA), and how relat…
  continue reading
 
If your malware problem is eclipsed by your adversary problem it’s time for active defense. In this episode, guest Sahir Hidayatullah, VP, Active Defense at Zscaler, covers the latest strategies for marrying zero trust with active defense and how the Zscaler Zero Trust Exchange helps make it seamless. Listeners get a brief history of the origins of…
  continue reading
 
Lisa and Pam shift gears to walk through their career milestones through the lens of coaching and mentoring and the influence of key individuals in both their professional and personal lives. Heartfelt and candid, they open up to share valuable stories about continuous improvement, career development, and empathetic leadership.…
  continue reading
 
How different is zero trust for federal agencies as compared to the private sector? To find out, Lisa and Pam invite guest Zscaler Federal CISO, Danny Connelly, who has been on both sides of the fence. The three experts share advice on separating hype from reality when evaluating approaches to IT modernization, and why square one of your foundation…
  continue reading
 
You can never know enough about the performance of your SaaS and critical applications and the best source for insights is from the end-user perspective. Modern toolsets use this approach to help teams diagnose issues and enhance the experience in ways legacy troubleshooting technologies can't. In this episode, Lisa and Pam welcome guest Sanjit Gan…
  continue reading
 
Internet connectivity with mainland China is strictly regulated by the government, with sweeping laws banning many types of content and sites, and ongoing traffic inspection. The patchwork of technical and regulatory requirements results in “choke points” for content providers and their customers, who grapple with application availability and perfo…
  continue reading
 
The modern workplace is now up to every organization to define. Enabling it, however, means the same thing: secure user access to apps and data with full visibility and granular control without compromising a seamless experience wherever that experience takes place. In this episode, Lisa and Pam offer advice on how to deliver remote access in a hyb…
  continue reading
 
5G means a lot of different things to different people and there’s a world of difference between it and previous wireless generations. In this episode, Pam and Lisa interview Nathan Howe, VP of Emerging Technology at Zscaler, who covers the specific points of differentiation that every enterprise technology leader should know about as they plan for…
  continue reading
 
Lisa and Pam talk about the Executive Order that President Biden recently signed to improve the nation’s cybersecurity and protect federal government networks. This will help the federal government avoid and respond to malicious events like the one a week ago for the East Coasts pipeline. What does this Executive Order do, and why is everyone so ex…
  continue reading
 
Topics Covered: How does transitioning to SASE change a typical organization structure Why are people transitioning to SASE? People and apps are anywhere now… Need to be agile, and enable the business What are some of the things to think about prior to starting the journey Focus on your technical staff not only the skills but their mindset...are th…
  continue reading
 
We recap our digital event on April 20th - Seize the Zero Trust Moment Jay - overview / market / move to Zero Trust Zero Trust Exchange - modern architecture Part of your zero trust ecosystem - API integrations Problems we solve Modern workplace enablement: work from anywhere, great user experience Security transformation: cyber threat protection, …
  continue reading
 
How Zero Trust has evolved over the past decade - Pam interviews Lisa on: Where does the term Zero Trust come from? Gartner talks a lot about ZTNA and SASE - is it the same thing? Why didn’t it take off when it was first introduced? What does it mean today? And is it the same for all? Where do you see companies struggle with moving to a Zero Trust …
  continue reading
 
Second part of Lisa and Pam’s discussion on M&A: The last episode covered how ZPA helped. How did ZIA enter the picture? Addressed in phases? ZPA w/ Client Connector > ZIA Tying in ZIA after the ZPA solution for enterprise SaaS apps What concrete suggestions do CISOs need What was left to accomplish Gaps in coverage Secure workloads What about dive…
  continue reading
 
Loading …

Quick Reference Guide