SlideShare una empresa de Scribd logo
1 de 30
The evolving roles of CISOs and CIOs
Larry Biagini
Chief Technical Evangelist
Jason Georgi
Director, Transformation Office
Engage in the Discussion
• Type your questions into the chat box in the Webex
panel or email us at webcast@zscaler.com
• We’ll try to get to all questions during the Q&A
session. If we do not get to your question, we’ll make
sure to follow up afterwards
• At the end of the webcast – please let us know how
we did! By answering three questions, you will be
entered into a drawing for an Amazon Echo!
Jason Georgi
Jason Georgi
Head of the Value Management Office
• Jason has over 23 years of experience driving innovation
initiatives across global organizations
• He joined Zscaler two years ago after spending nine years
at GE, where he led GE’s Global Network Shared Services
• Jason is currently the Director of Zscaler's Transformation
Office. His office works with customers and partners to
understand the benefits of IT transformation in terms of
business outcomes.
Jason Georgi
Director,
Transformation Office
Zscaler
Larry Biagini
Jason Georgi
Head of the Value Management Office
• Larry Biagini recently retired as Vice President and Chief
Technology Officer of GE
• While at GE, Larry’s focus was on contemporizing
infrastructure, employee services and deploying cloud
technology enabling secure usage of those services by GE’s
employees, customers and partners
• At Zscaler, Larry helps customers and partners better plan and
execute their inevitable move towards expanding their use of
cloud services
Larry Biagini
Chief Technical Evangelist
Cloud: what’s all the fuss about?
enterprise decision-makers
who are building private clouds
enterprise decision-makers
procuring public cloud services
global public cloud market by
2020, up from $146B in 2017
Source: Forrester Research survey
38%
32%
$236B
Cloud adoption will accelerate…
Creating new opportunities and threats
The point is…
©2016 Zscaler, Inc. All rights reserved
Improved analytics, cloud and user interfaces are
driving agility and user experiences…
the Internet is the foundation of business transformation
Business must embrace the Internet as their greatest weapon
7
CEOs are taking notice of how digital has changed the game
Business Transformation is real
Technology is no longer the sole domain of technologists
8
IT must change or
become irrelevant
There is only one network in the world
9©2016 Zscaler, Inc. All rights reserved
There is only one network in the world
1
0
©2016 Zscaler, Inc. All rights reserved
AND YOU DON’T CONTROL IT
©2016 Zscaler, Inc. All rights reserved
Business is going to drive the change – like it or not
It’s back to the
drawing board if you
want to thrive
Transformation does not start in the data center
12
It starts with the organizational mindset of
doing business differently
What has to change?
CISO
• Shift from “security
and controls” to “risk
and enablement”
1
3
CIO
• Shift from technology-
first to business-first
CTO
• Shift from
architecting corporate
networks to
embracing the cloud
Technology evolution…
1
4
©2016 Zscaler, Inc. All rights reserved
Controls Framework
Users
Devices
Networks
Applications
Data
Controls Framework
Users
Devices
Networks
Applications
Data
Internet
Internet
• It is a business discussion
around why unsanctioned apps are
being used
• Understanding the usage helps frame
the risk associated
• Is usage malicious or careless?
• Either way, do we have a data leakage
or exfiltration problem?
15
To keep from breaking new business processes and models, and be
compliant…change the conversation from ’CONTROL' to ’RISK'
CISO’s evolving mindset
16
The New CISO
©2016 Zscaler, Inc. All rights reserved
• Stop talking Security with your board
• Get visibility into cloud services that are being consumed in your
environment
• Separate your critical assets from the consumers of those assets
• Get Identity right - Invest in identity and access management
• Create a risk assessment and risk appetite so that the business
has a means to make decisions
17
The New CIO
©2016 Zscaler, Inc. All rights reserved
• Focus on Growth
• Move from an IT shop to a Digital Enabler
• Address your legacy environment head on
• Be honest with the board about technology debt
• Go fast - Speed is the new currency
18
Controls Based
No You Can’t
Build Services
Prevention
Requirements
Network-Centric
IT
Risk Based
Yes… and here’s how
Create Value
Detection & Response
Innovation – Fail Fast
User-Centric
IT & OT©2016 Zscaler, Inc. All rights reserved
Transform…
How Zscaler can help: cloud security
for every campus, user, application and
device on the Internet
19 ©2016 Zscaler, Inc. All rights reserved
Unmatched security – all
users, branches, and
devices
Consistent policy and
protection by design vs.
exception
Always up-to-date
No need to be patient zero
Consolidate point products
and simplify IT
Cloud-enabled network
Rapid deployment
Policy based Access for
Internal, Cloud and SaaS
No Capex, elastic
subscription fee
Reduced Opex, no box
management
Manage Security &
Compliance policy vs.
Technology
No yearly maintenance fee
Reduced MPLS costs
Higher productivity –
local breakouts
Prioritize business apps
Consistent User experience
Empowers users to leverage
cloud apps
Intelligent Peering for
SaaS/O365
Anywhere Access with ZPA
Fast Response Time
(End-Users)
Reduced Risk
(CISO)
IT Simplification
(CTO / IT Head)
Impressive Value
(CIO / CFO)
The foundation of a modern access and security architecture
Zscaler Cloud Security Platform
Consolidate and simplify point appliances
©2016 Zscaler, Inc. All rights reserved
CLOUD SECURITY PLATFORM
100+
data centers
worldwide
30B+
transactions processed
every day
125M+
threats blocked
every day
120K+
security updates
every day
ACCESS CONTROL
CLOUD FIREWALL
CLOUD APPS (CASB)
URL FILTERING
BANDWIDTH CONTROL
THREAT PREVENTION
ADVANCED PROTECTION
ANTI-VIRUS
INTRUSION PREVENTION
CLOUD SANDBOX
DATA PROTECTION
FILE TYPE CONTROLS
DLP INTERNAL DATA
Zscaler cloud traffic – compared to other transaction volumes
0.5
2
4
5.4
7.7
35
0 5 10 15 20 25 30 35
Tweets on Twitter
Facebook Active Users
Google Searches
Salesforce.com Transactions
YouTube Views
Zscaler Transactions
Daily Volume (Billions)
Zscaler Internal & Confidential
We scale as Internet traffic grows
23
• Secured 2 Trillion transactions
• Stopped 3.4 Billion threats (0.2%)
• Enforced 67 Billion policies (3.4%)
Zscaler Cloud Q3 FY17 Summary
14% quarterly growth rate
Zscaler Internal & Confidential
So you don’t need to put a perimeter around every campus, user, application or device
Gain visibility into all of the
applications, users, threats, and
botnet-infected machines.
GLOBAL, REAL-TIME
REPORTING
SINGLE POLICY CONSOLE
Define policies by user,
group, location. Policy
follows the user.
MOBILE EMPLOYEES
Connect – Control – Secure
Nothing bad comes in, nothing good
leaks
Zscaler App GRE
SIMPLY CONFIGURE THE ROUTER OR ENDPOINT DEVICE TO FORWARD TRAFFIC TO ZSCALER
HQ REMOTE OFFICES
ID PROVIDER
24 ©2016 Zscaler, Inc. All rights reserved
Zscaler builds a perimeter around the Internet…
Zscaler: A foundation for modern access and security
Access to the Internet & Apps1
SAML
Integratio
n
IDENTITY & ACCESS4
REPORTING & ANALYTICS6
Inbound & Outbound Gateway
BRANCH (SD-WAN)3
FW/IPS:
DDoS:
DATA CENTER PROTECTION2
MDM:
AV:
Encryption:
ENDPOINT PROTECTION5
(BROADBAND)
A three-step journey to cloud and mobility transformation
SECURE
Up-level your security
Enable secure SD-WAN / local Internet
breakouts – optimize backhaul.
Deliver a better and more secure
user experience.
TRANSFORM
Cloud-enable your network
SIMPLIFY
Remove point products
Phase out gateway appliances at
your own pace.
Reduce cost and
management overhead.
Make Zscaler your next hop
to the Internet.
Fast to deploy. No infrastructure
changes required.
Key Takeaways
27
• Move from IT and Security shops to digital enablers
• Speed is the new currency in the connected world, friction is unacceptable
• Legacy technology can and will hold you back, address it
• Realize work is an activity, not a place
• Get visibility into cloud services consumed by your users
• Legacy controls cannot keep you safe in the digital world
• Stop talking Security with your board, start talking about addressable risk
28
Jason Georgi
Director, Transformation Office,
Zscaler
Learn more about transformation
Other Webcasts
Lessons for thriving - not just surviving - in the cloud
Jay Chaudhry - Zscaler & Frederik Janssen – Siemens
On Demand: zscaler.com/company/webcasts
Questions and next steps
Larry Biagini
Chief Technical Evangelist,
Zscaler
Cloud vs. On-Premises Security: Can you afford not to switch?
A review of the cost dimensions to consider when IT is making a strategic move to the cloud
On Demand: zscaler.com/company/webcasts
Create a frictionless experience
Protect your users from the Internet – Zscaler Internet Access
Protect your network from your users – Zscaler Private Access

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
IAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - PresentationIAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - Presentation
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
CloudCamp Chicago - November 2013 Fighting Cloud FUD
CloudCamp Chicago - November 2013 Fighting Cloud FUDCloudCamp Chicago - November 2013 Fighting Cloud FUD
CloudCamp Chicago - November 2013 Fighting Cloud FUD
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
shchyrinprom2009
shchyrinprom2009shchyrinprom2009
shchyrinprom2009
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
 
Melbourne Office 365 User Group - February 2015
Melbourne Office 365 User Group - February 2015Melbourne Office 365 User Group - February 2015
Melbourne Office 365 User Group - February 2015
 
MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge Gateways
 
Protecting Data Everywhere - Barracuda
Protecting Data Everywhere - BarracudaProtecting Data Everywhere - Barracuda
Protecting Data Everywhere - Barracuda
 
Going to the SP2013 Cloud - what does a business need to make it successful?
Going to the SP2013 Cloud - what does a business need to make it successful?Going to the SP2013 Cloud - what does a business need to make it successful?
Going to the SP2013 Cloud - what does a business need to make it successful?
 
TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 

Similar a The evolving CIO|CISO relationship

Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis
 

Similar a The evolving CIO|CISO relationship (20)

The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
The Future of Enterprise IT
The Future of Enterprise IT The Future of Enterprise IT
The Future of Enterprise IT
 
Nvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 decNvis pitch deck version 4 - 2021 dec
Nvis pitch deck version 4 - 2021 dec
 
Cloud the current future v6
Cloud   the current future v6Cloud   the current future v6
Cloud the current future v6
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Codero: The Future of IT is Here
Codero: The Future of IT is HereCodero: The Future of IT is Here
Codero: The Future of IT is Here
 
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
 
How to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN ProjectsHow to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 

Más de Zscaler

Más de Zscaler (20)

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deployment
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

The evolving CIO|CISO relationship

  • 1. The evolving roles of CISOs and CIOs Larry Biagini Chief Technical Evangelist Jason Georgi Director, Transformation Office
  • 2. Engage in the Discussion • Type your questions into the chat box in the Webex panel or email us at webcast@zscaler.com • We’ll try to get to all questions during the Q&A session. If we do not get to your question, we’ll make sure to follow up afterwards • At the end of the webcast – please let us know how we did! By answering three questions, you will be entered into a drawing for an Amazon Echo!
  • 3. Jason Georgi Jason Georgi Head of the Value Management Office • Jason has over 23 years of experience driving innovation initiatives across global organizations • He joined Zscaler two years ago after spending nine years at GE, where he led GE’s Global Network Shared Services • Jason is currently the Director of Zscaler's Transformation Office. His office works with customers and partners to understand the benefits of IT transformation in terms of business outcomes. Jason Georgi Director, Transformation Office Zscaler
  • 4. Larry Biagini Jason Georgi Head of the Value Management Office • Larry Biagini recently retired as Vice President and Chief Technology Officer of GE • While at GE, Larry’s focus was on contemporizing infrastructure, employee services and deploying cloud technology enabling secure usage of those services by GE’s employees, customers and partners • At Zscaler, Larry helps customers and partners better plan and execute their inevitable move towards expanding their use of cloud services Larry Biagini Chief Technical Evangelist
  • 5. Cloud: what’s all the fuss about? enterprise decision-makers who are building private clouds enterprise decision-makers procuring public cloud services global public cloud market by 2020, up from $146B in 2017 Source: Forrester Research survey 38% 32% $236B
  • 6. Cloud adoption will accelerate… Creating new opportunities and threats The point is…
  • 7. ©2016 Zscaler, Inc. All rights reserved Improved analytics, cloud and user interfaces are driving agility and user experiences… the Internet is the foundation of business transformation Business must embrace the Internet as their greatest weapon
  • 8. 7 CEOs are taking notice of how digital has changed the game Business Transformation is real
  • 9. Technology is no longer the sole domain of technologists 8 IT must change or become irrelevant
  • 10. There is only one network in the world 9©2016 Zscaler, Inc. All rights reserved
  • 11. There is only one network in the world 1 0 ©2016 Zscaler, Inc. All rights reserved AND YOU DON’T CONTROL IT
  • 12. ©2016 Zscaler, Inc. All rights reserved Business is going to drive the change – like it or not It’s back to the drawing board if you want to thrive
  • 13. Transformation does not start in the data center 12 It starts with the organizational mindset of doing business differently
  • 14. What has to change? CISO • Shift from “security and controls” to “risk and enablement” 1 3 CIO • Shift from technology- first to business-first CTO • Shift from architecting corporate networks to embracing the cloud
  • 15. Technology evolution… 1 4 ©2016 Zscaler, Inc. All rights reserved Controls Framework Users Devices Networks Applications Data Controls Framework Users Devices Networks Applications Data Internet Internet
  • 16. • It is a business discussion around why unsanctioned apps are being used • Understanding the usage helps frame the risk associated • Is usage malicious or careless? • Either way, do we have a data leakage or exfiltration problem? 15 To keep from breaking new business processes and models, and be compliant…change the conversation from ’CONTROL' to ’RISK' CISO’s evolving mindset
  • 17. 16 The New CISO ©2016 Zscaler, Inc. All rights reserved • Stop talking Security with your board • Get visibility into cloud services that are being consumed in your environment • Separate your critical assets from the consumers of those assets • Get Identity right - Invest in identity and access management • Create a risk assessment and risk appetite so that the business has a means to make decisions
  • 18. 17 The New CIO ©2016 Zscaler, Inc. All rights reserved • Focus on Growth • Move from an IT shop to a Digital Enabler • Address your legacy environment head on • Be honest with the board about technology debt • Go fast - Speed is the new currency
  • 19. 18 Controls Based No You Can’t Build Services Prevention Requirements Network-Centric IT Risk Based Yes… and here’s how Create Value Detection & Response Innovation – Fail Fast User-Centric IT & OT©2016 Zscaler, Inc. All rights reserved Transform…
  • 20. How Zscaler can help: cloud security for every campus, user, application and device on the Internet 19 ©2016 Zscaler, Inc. All rights reserved
  • 21. Unmatched security – all users, branches, and devices Consistent policy and protection by design vs. exception Always up-to-date No need to be patient zero Consolidate point products and simplify IT Cloud-enabled network Rapid deployment Policy based Access for Internal, Cloud and SaaS No Capex, elastic subscription fee Reduced Opex, no box management Manage Security & Compliance policy vs. Technology No yearly maintenance fee Reduced MPLS costs Higher productivity – local breakouts Prioritize business apps Consistent User experience Empowers users to leverage cloud apps Intelligent Peering for SaaS/O365 Anywhere Access with ZPA Fast Response Time (End-Users) Reduced Risk (CISO) IT Simplification (CTO / IT Head) Impressive Value (CIO / CFO) The foundation of a modern access and security architecture
  • 22. Zscaler Cloud Security Platform Consolidate and simplify point appliances ©2016 Zscaler, Inc. All rights reserved CLOUD SECURITY PLATFORM 100+ data centers worldwide 30B+ transactions processed every day 125M+ threats blocked every day 120K+ security updates every day ACCESS CONTROL CLOUD FIREWALL CLOUD APPS (CASB) URL FILTERING BANDWIDTH CONTROL THREAT PREVENTION ADVANCED PROTECTION ANTI-VIRUS INTRUSION PREVENTION CLOUD SANDBOX DATA PROTECTION FILE TYPE CONTROLS DLP INTERNAL DATA
  • 23. Zscaler cloud traffic – compared to other transaction volumes 0.5 2 4 5.4 7.7 35 0 5 10 15 20 25 30 35 Tweets on Twitter Facebook Active Users Google Searches Salesforce.com Transactions YouTube Views Zscaler Transactions Daily Volume (Billions) Zscaler Internal & Confidential
  • 24. We scale as Internet traffic grows 23 • Secured 2 Trillion transactions • Stopped 3.4 Billion threats (0.2%) • Enforced 67 Billion policies (3.4%) Zscaler Cloud Q3 FY17 Summary 14% quarterly growth rate Zscaler Internal & Confidential
  • 25. So you don’t need to put a perimeter around every campus, user, application or device Gain visibility into all of the applications, users, threats, and botnet-infected machines. GLOBAL, REAL-TIME REPORTING SINGLE POLICY CONSOLE Define policies by user, group, location. Policy follows the user. MOBILE EMPLOYEES Connect – Control – Secure Nothing bad comes in, nothing good leaks Zscaler App GRE SIMPLY CONFIGURE THE ROUTER OR ENDPOINT DEVICE TO FORWARD TRAFFIC TO ZSCALER HQ REMOTE OFFICES ID PROVIDER 24 ©2016 Zscaler, Inc. All rights reserved Zscaler builds a perimeter around the Internet…
  • 26. Zscaler: A foundation for modern access and security Access to the Internet & Apps1 SAML Integratio n IDENTITY & ACCESS4 REPORTING & ANALYTICS6 Inbound & Outbound Gateway BRANCH (SD-WAN)3 FW/IPS: DDoS: DATA CENTER PROTECTION2 MDM: AV: Encryption: ENDPOINT PROTECTION5
  • 27. (BROADBAND) A three-step journey to cloud and mobility transformation SECURE Up-level your security Enable secure SD-WAN / local Internet breakouts – optimize backhaul. Deliver a better and more secure user experience. TRANSFORM Cloud-enable your network SIMPLIFY Remove point products Phase out gateway appliances at your own pace. Reduce cost and management overhead. Make Zscaler your next hop to the Internet. Fast to deploy. No infrastructure changes required.
  • 28. Key Takeaways 27 • Move from IT and Security shops to digital enablers • Speed is the new currency in the connected world, friction is unacceptable • Legacy technology can and will hold you back, address it • Realize work is an activity, not a place • Get visibility into cloud services consumed by your users • Legacy controls cannot keep you safe in the digital world • Stop talking Security with your board, start talking about addressable risk
  • 29. 28 Jason Georgi Director, Transformation Office, Zscaler Learn more about transformation Other Webcasts Lessons for thriving - not just surviving - in the cloud Jay Chaudhry - Zscaler & Frederik Janssen – Siemens On Demand: zscaler.com/company/webcasts Questions and next steps Larry Biagini Chief Technical Evangelist, Zscaler Cloud vs. On-Premises Security: Can you afford not to switch? A review of the cost dimensions to consider when IT is making a strategic move to the cloud On Demand: zscaler.com/company/webcasts
  • 30. Create a frictionless experience Protect your users from the Internet – Zscaler Internet Access Protect your network from your users – Zscaler Private Access

Notas del editor

  1. I appreciate you taking the time to meet with us today. We’re very excited to share some significant changes that are happening in the industry and provide some color around how and why a lot of our customers are transforming their enterprise IT through cloud enablement.
  2. With Zscaler fully deployed, it provides a lot of value to all key users and stakeholders. For users we deliver a fast user experience by eliminating the latency associated with stacks of appliances and backhaul. From a risk perspective, there is no question on the value of protection our cloud delivers. The shift to the cloud eliminates patch management, outage windows, and vendor end-of-life issues — allowing you to focus on more important things than updating boxes. From a financial perspective, it’s all Opex and we can optimize MPLS spend. So if you’re looking to either improve your overall security posture or secure your mobile worker, evaluating SD-WAN transformation to simply the branch and reduce costs, deploying Office 365 and/or migrating your apps from the data center to AWS or Azure, we can help.
  3. We are often asked where exactly Zscaler fits and what do we replace appliance-based infrastructures. First we very carefully select 1 of the 6 security areas where we want to play in the security ecosystem. Let me walk you through these 6 areas, because with 3,000 security vendors all trying to talk the same lingo it gets very confusing in terms of who does what. We categorized them into six buckets: Access to the Internet and cloud applications through the outbound and inbound gateway we have been talking about. We deliver all this functionality. Data center protection. We don't really fit into trying to protect your legacy data center. You still need traditional firewall boxes and DDoS protection. We believe a majority of apps will move to the cloud and this market will eventually go away. We do however, interoperate with these vendors to create a tunnel from your edge router or firewall to our cloud. Intelligent routing of traffic around your branch. Internet traffic is routed locally, and data center traffic is routed over MPLS. SD-WAN is getting a lot of attention as companies like to minimize the hardware footprint in the branch and simplify management. Some are driving to the Internet-only branch. We are working with these vendors to make it a checkbox to route traffic to Zscaler. Identity and access management. It becomes extremely important in today's mobile world. We work with Microsoft ADFS, Ping, and OKTA via a SAML integration. Endpoints. Here you may use MDM for device management, doing endpoint encryption and running AV. The challenge with AV is that malware morphs so rapidly it can’t keep up with it. That’s why a lot of companies are moving away from signature-based AV. Rich reporting through inline traffic inspection. This last area is an important one. All the logs files are correlated in real time, providing visibility into users, apps, and threats blocked within a minute or 2 for all users around the world. Many large companies want to correlate logs across firewalls, switches and Zscaler in their SIEM. We have the ability to stream logs to a SIEM via our Nanolog streaming service (NSS).
  4. With Zscaler it’s simple to get started. In fact, we’ve cut over 40,000 in 1 weekend night and 160,000 users over 60 days. All you need to do to make Zscaler your next hop to the Internet is to make Zscaler your default route. A number of customers did this to block threats that were going undetected by their current security appliances without making any policy changes. Some also start by securing their mobile workers, then migrating their office locations. This allows them to take their security from a 6 or 7 to a 9 or 9.5 out of 10. No one is perfect. One ZPA customer got started with one of the uses cases before replacing their entire VPN infrastructure. The second phase of the journey involves phasing out security appliances to reduce cost and complexity. This can be done at your pace, but more often than not, this is typically shortly after or in tandem with starting to send traffic to Zscaler. With Zscaler in place, the third phase of the journey is about routing traffic locally via Internet breakouts to Zscaler. By routing traffic locally companies can optimize their MPLS spend and deliver a more secure and better user experience. Office 365 has been a key accelerator for local breakouts as Microsoft now recommends routing traffic locally and doing local DNS. So users are connecting to the closest Office 365 pop and on their CDN Network as fast as possible. ExpressRoute is now only recommending for very specific use cases. Microsoft also cautions against hub-and spoke-architectures with centralized proxies for a variety of reasons.