Top Banner
Agenda 6:00 – 6:30 p.m. Registration & Networking 6:30 – 6:45 p.m. Introductions and Opening Remarks • Tom Field, SVP Editorial, Information Security Media Group • Bil Harmer, Americas CISO, Zscaler 6:45 – 8:30 p.m. Roundtable Discussion 8:30 p.m. Program Concludes Security as a Catalyst for Digital Transformation ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by Zscaler
10

Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

Oct 14, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

Agenda6:00 – 6:30 p.m. Registration & Networking

6:30 – 6:45 p.m. Introductions and Opening Remarks

• Tom Field, SVP Editorial, Information Security Media Group• Bil Harmer, Americas CISO, Zscaler

6:45 – 8:30 p.m. Roundtable Discussion

8:30 p.m. Program Concludes

Security as a Catalyst for Digital Transformation

ISMG SECURITY EXECUTIVE ROUNDTABLEsponsored by Zscaler

Page 2: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

Introduction Digital transformation: It’s the present and future of business, as enterprises adapt to work at the speed and convenience of new demands.

But as applications move to the cloud and employees, partners and customers interact outside the traditional perimeter, what proactive role should security play? How can security leaders avoid being obstacles and actually become catalysts for change - partners and trusted counsel to the business?

If you’re looking for new answers to these questions, then welcome to this exclusive executive roundtable on Security as a Catalyst for Digital Transformation.

Guided by insight from Bil Harmer, Americas CISO at event sponsor Zscaler, this invitation-only dinner will draw from the experiences of the attendees, offering thoughts on how they have been able to ensure that their security organizations play a productive role in their enterprises’ digital transformations. Among the discussion topics:

• Where is your organization in its own digital transformation, and what role does security currently play?• What role do you want security to play, and what’s the roadmap to get there?• What are some best-practice security strategies to adopt as your enterprise moves to the cloud?

You’ll have the opportunity to discuss the topic with a handful of senior executives and market leaders in an informal, closed-door setting, from which you will emerge with new strategies and solutions you can immediately put to work.

Security as a Catalyst for Digital Transformation 2

Page 3: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

Discussion PointsAmong the questions to be presented for open discourse:

• Where is your organization in its own digital transformation: on the road; just getting started; still parked in the garage?

• What role does security play in your organization’s digital transformation?

• What role do you want security to play?

• What are your biggest obstacles to getting a more prominent role for security?

• What investments will you make in the coming year to ensure a secure digital transformation?

Security as a Catalyst for Digital Transformation 3

Page 4: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

About the ExpertJoining our discussion today, to share the latest insights and case studies is:

Bil HarmerAmericas CISO Zscaler

Bil Harmer is the Americas CISO at Zscaler. In this role he engages security executives at a peer level to drive strategic change and facilitate industry wide collaboration on emerging security and privacy topics. While developing the Security and Data Protection program for SuccessFactors/SAP he pioneered the processes for security and privacy compliance used by Cloud vendors today. Prior to joining Zscaler Harmer was the Chief Security Officer at GoodData Corp and the VP Security & Cloud Privacy Officer for the Cloud Division of SAP. He has provided advisory services to Adallom, Integris, ShieldX Networks and Resolve Systems. He is CISSP, CISM and CIPP certified.

About ZscalerZscaler (NASDAQ: ZS) enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances are unable to match. Used in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of customers from cyberattacks and data loss. Learn more at zscaler.com or follow us on Twitter @zscaler.

Learn more at www.zscaler.com.

Security as a Catalyst for Digital Transformation 4

Page 5: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

About the ModeratorLeading our discussion today is:

Tom FieldSVP EditorialInformation Security Media Group

Field is responsible for all of ISMG's 28 global media properties and its diverse cadre of senior-level editors and reporters. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

About ISMGInformation Security Media Group (ISMG) is the world’s largest media organization devoted solely to information security and risk management. Each of our 28 media properties provides education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Our annual global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

For more information, visit www.ismg.io.

Security as a Catalyst for Digital Transformation 5

Page 6: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

NOTE: In advance of this event, ISMG’s Tom Field spoke about security and digital transformation with Zscaler’s Bil Harmer. Here is an excerpt of that conversation.

State of the UnionTOM FIELD: What do you see as the ‘state of the union’ for security organizations and their enterprises’ digital transformations?

BIL HARMER: Security organizations, including their leaders seem to be in one of two camps: helping drive digital transformation, or playing catch-up to a business that's moving fast. Those helping drive DT are doing so because they see the benefits and generally improved security of adopting cloud and SaaS. Those playing catchup are finding that their business leaders are forcing them to adapt and shift from a controls-based approach to a risk-based approach. Things are moving fast, so security teams need to also speak the language of business.

Security’s Missed OpportunityFIELD: Where does security often come up short?

HARMER: This depends on every organization, but in many cases it's legacy technology that comes up short. The technology that 75 percent or more organizations still have in place today was what was needed when the concept of a "perimeter" was still valid. But as that perimeter begins to erode, or in some cases has fully eroded, the technology handling security must evolve. There is still way too much "trust" inherent with today's corporate networks. So much of today's security spend is still meant to fortify a perimeter. The result is shrinking network attack surfaces (a good thing), but that just forces attack targeting on the easiest target...users. And once "trusted" users are infected, all that network perimeter defense is less meaningful.

To Be a CatalystFIELD: Where are security’s opportunities to truly be catalysts?

HARMER: First start with understanding the business. Years ago, creating friction was done purposely to ensure standards and compliance with the business direction of enterprise IT. Now, unsanctioned apps are in use, shadow IT is IT, and users are becoming their own CIO. Understanding why and getting ahead of this means security can be relevant by assessing why unsanctioned

apps are in use and re-writing IT's rules around increasing productivity.

Next, as applications move out of data centers to the cloud and users are working from anywhere, the corporate networks must evolve. And for the network to evolve, security must be in place. Considering the internet is the "network" used for all of these cloud and SaaS applications, it is becoming part of or entirely the corporate network. Security architectures must evolve to confront and enable this reality.

CONTEXT

Security as a Catalyst for Digital TransformationQ&A with Zscaler's Bil Harmer

“Those playing catchup are finding that their business leaders are forcing them to adapt and shift from a controls-based approach to a risk-based approach.”

Bil Harmer

Security as a Catalyst for Digital Transformation 6

Page 7: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

Must-Have Tools, SkillsFIELD: What are the tools and skills necessary to help enable this transformation?

HARMER: Tools and skills go hand-in-hand, but it's about approach. Realizing that the primary means of control for the last 20-30 years was based on being on the network and that must change is the first part. Next, just look at user working behavior. What services are they accessing, when and from where? A draconian approach to turning things off and forcing users inside may be good for security, but it will ultimately slow things down, which is bad for business. Next, focus on the user. User-centric control and an internet-based security strategy are fundamental.

The Right QuestionsFIELD: What are the questions security leaders need to ask to assess where they are – and what they need to move forward?

HARMER:

• If you try to protect everything, you protect nothing. With this in mind, where is our most critical data and how are we protecting it?

• You can't address what you can't see. Do we have full visibility into the services our users consume?

• What is our cloud strategy? How much of what we are doing can be done in the cloud?• How will our current security stack enable the movement of apps and services to the

cloud?• If we had no network to control for providing access to services, how would we implement

security?

Zscaler’s RoleFIELD: How is Zscaler helping security organizations lead their enterprises in digital transformation?

HARMER: Zscaler was born 10 years ago out of a vision that is today's reality. The shift of applications and workloads from data centers to cloud services was inevitable because it makes too much business sense to ignore. With this reality, Zscaler has been uniquely positioned as an enabler of digital transformation by helping organizations transform their networks from hub and spoke to cloud-ready. This means user experience is vastly improved, and there's no security compromise. Enabling organizations to take a more direct-to-cloud approach means there's less dependence on traditional network architectures. Additionally, Zscaler helps lay the foundation for zero trust by allowing organizations to remove employees, contractors, third parties and acquisition targets off of the corporate network, by leveraging user-centric security (via software-defined perimeter). Zscaler's approach to security has helped some of the largest companies in the world like GE, Siemens, and Abbott Labs, to realize their transformation journey. n

“There is still way too much 'trust' inherent with today's corporate networks.”

Security as a Catalyst for Digital Transformation 7

Page 8: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

Notes

Security as a Catalyst for Digital Transformation 8

Page 9: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

Notes

Security as a Catalyst for Digital Transformation 9

Page 10: Security as a Catalyst for Digital Transformation€¦ · in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of

902 Carnegie Center • Princeton, NJ • 08540 • www.ismgcorp.com

About ISMG

Information Security Media Group (ISMG) is the world’s largest media organization devoted solely to information security and risk management. Each of our 28 media properties provides education, research and news that is

specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Our annual global Summit series connects senior security professionals with industry thought leaders to find

actionable solutions for pressing cybersecurity challenges.

Contact

(800) 944-0401 • [email protected]

CyberEd