22 September 2022 | Bangalore, India | Taj MG Road
JOIN US LIVE!
Define and craft your business transformation roadmap with the latest innovations across zero trust, cloud security, and machine learning, alongside actual use cases.
Get the latest on AI, cloud security, DevSecOps, digital experience, and networking, and how they add business value. Take a close look at how Zscaler securely connects users, workloads, and IoT.
10:00 AM - 10:25 AM
Arrival & Registration
10:25 AM - 10:30 AM
10:30 AM - 10:55 AM
Keynote: Experience Your World, Secured.
10:55 AM - 12:00 PM
Innovation Keynote: Innovating at the Confluence of AI, Cloud, and Security
12:00 PM - 12:15 PM
12:15 PM - 12:40 PM
Customer Fireside Chat: Zero Trust & Digital Transformation Journey
12:40 PM - 12:55 PM
Tech Alliance Session: Making End-To-End Zero Trust Security a Reality
12:55 PM - 1:00 PM
1:00 PM - 2:00 PM
2:00 PM - 6:00 PM
*The agenda is subject to change without prior notice
Featured Keynote Sessions
Keynote: Experience Your World, Secured
The potential of technology to unlock value and drive progress has never been greater. Shifts to cloud, digital everything, and work-from-anywhere are profound for every organization, whether private or public sector. Meanwhile, hackers, cybercriminals, and nation-state actors are creating new sophisticated threats and business models such as ransomware and phishing as a service, smishing, and more. The imperative to transform your business, securely, has never been stronger.
This keynote explores innovations across zero trust, cloud security, and machine learning, as well as real-world use cases, to help organizations of all sizes define a roadmap to accelerate business and experience your world, secured.
Innovation keynote: Innovating at the Confluence of AI, Cloud, and Security
Join our technology leaders to dive into innovations in AI, cloud, cybersecurity, DevSecOps, digital experience, and networking. We’ll show you how we’re using AI and ML to introduce new Zero Trust Exchange capabilities that make cloud workloads more secure and easier to manage. You’ll learn how these new capabilities deliver a centralized approach to securing cloud infrastructure, sensitive data, and native applications deployed across multicloud environments while reducing complexity, cross-team friction, and overhead.
Featured Breakout Sessions
Let's lift the hood on the Zscaler Zero Trust Exchange and show off the engine powering more than 120 billion transactions per day. We'll learn how the Zscaler cloud architecture ensures a fast, reliable, and secure user experience. We'll also review how the company's Cloud Operations team ensures the platform is resilient in the face of any natural or manmade disaster and how the customer's can best take advantage of the cloud's BCP and DR capabilities to maximise their resiliency.
Over the past few years, public cloud adoption has evolved from lift-and-shift of traditional VM workloads into a single cloud provider to today’s reality of rapid adoption of dozens of cloud-native services. Multi-cloud has become the norm rather than the exception, and there’s been an ongoing shift to dynamic, ephemeral, and immutable workloads. As these changes continue to take root, security approaches developed for the public cloud several years ago need to evolve as well. In this session, you'll learn how the powerful combination of CNAPP and Cloud Workload Protection can secure your cloud estate, from build time to runtime.
Zscaler delivers zero trust with the Zscaler Zero Trust Exchange, a cloud-native platform, that leverages the largest security cloud on the planet to provide fast and secure connections and allows your employees to securely work from anywhere, on any device, using the internet as the corporate network. Learn about how Zero Trust Exchange works, its architecture, and how it uniquely delivers zero trust.
Zscaler’s evolved Zero Trust Exchange with industry-first security service edge (SSE) Innovations to deliver the world’s only next-gen ZTNA platform that stops the most sophisticated cyber attacks. Through this session, you will learn how our new ZTNA platform allows
1) Safeguarding private apps from compromise
2) Enhancing lateral movement detection to stop breaches
3) Reducing the attack surface of privileges users
Zscaler Internet Access has proven incredibly effective to prevent ransomware attacks, as we have seen over and over again over the past few years. In this session, we will discuss ransomware attacks and other threat landscape trends, dissect some of the most recent campaigns, and showcase how a defense-in-depth approach with Zscaler Internet Access can be used and configured to effectively prevent such attacks against our customers.
During this session, learn from experts what best practices organizations must follow while deploying and operationalizing ZDX, including 'Turning lights on' with ZDX and then setting up policies and alerting to derive maximum value from it.
The castle and moat model of network security is collapsing. Organizations will be spending in excess of $150 billion on information security this year and yet traditional defenses are coming up short. 77% of the threats flagged by traditional defense controls are false positives. Attackers remain undetected inside networks for up to 280 days. Boardrooms are discussing ransomware when they should be spending that time on business. Something is not right.
The threat landscape has changed but how we defend hasn’t. It’s time for a different approach. It’s time for Active Defense. Join this session to learn how you can use deception to deal with advanced threats that bypass traditional defenses.
Legacy appliance-based data protection can’t secure cloud and mobility, and simply moving traditional detection features to the cloud is not the answer. Join this session to learn why a proven scalable cloud-native architecture is the fundamental building block needed for airtight protection against breaches and data loss.
Zero Trust Exchange Platform / 101 / ZTE / Security / Network / Data
Dr. Satvinder Madhok
CTO & Global Head of Technology Infrastructure, Identity Access & Cybersecurity
Senior Regional Vice President
Global CISO | Head of Security Research & Operations