KEMBAR78
Top 5 predictions webinar | PPTX
Top 5 security predictions for 2019
WEBCASTS
Stan Lowe
Global Chief Information Security Officer | Zscaler
Bil Harmer
Americas Chief Information Security Officer | Zscaler
Want to ask a question?
We’ll answer questions live,
or follow up afterwards
Please take survey and let us
know how we did
Contact us if you have any
other questions or comments
©2018 Zscaler, Inc. All rights reserved.2
Secure
Your Cloud
Transformation
Network security is irrelevant as
the cloud becomes your data
center and the internet
your new network
The Market Leader in Cloud Security
What we do
Deliver fast and secure access to
apps and services over the internet
How we do it
A purpose-built cloud security
platform that sits between
your users and apps
Leader
in the Gartner
SWG Magic Quadrant
years in a row!!
7
3250+
Customers
Nasdaq:
ZS
300
of the
Forbes Global
2000
Governments rush to the clouds.
1 Private sector to the rescue.
State employees begin moonlighting
with organized crime.2
IoT and Botnets make headlines3
Hacker
C2 Server
Victim
Website
Compromised
IoT device
Current Botnet Activity | Zscaler Threat Insights
4 Cyber breaches hit the “Street”4
Cloud Migration
Stock Price
Breach
Focus on supply chains weakest link5
©2018 Zscaler, Inc. All rights reserved.8
Always on
Always Connected
Mobility
App Transformation
to the Cloud
Network
Transformation
Security
Transformation
Cloud
Agility and Capacity
(process/analyze)
+Digital
Transformation
Drivers
©2018 Zscaler, Inc. All rights reserved.9
Network security is becoming irrelevant
Secure the network to protect
users and apps
Open Internet
Internet Gateway
Security Appliances
Build a security moat appliances to
protect the network
Open Internet Public Cloud Private Cloud / DCSaaS
IoT Mobile HQ Branch
Decouple network access from
application access
Policy Enforcement
Checkpost
Securely connects an authorized user
to an app/ service on any network
Old World
Network Centric
New World
User Centric
©2018 Zscaler, Inc. All rights reserved.10
Global load balancing
Distributed denial of service protection
External firewall / intrusion prevention
VPN concentrator
Internal firewall
Internal load balancer
Firewall / intrusion prevention
URL filter
Anti-virus
Data loss prevention
Secure sockets layer inspection
Sandbox
Any device, any location, on-network or off-network
Externally managed Internally managed
Securely connects users to externally managed
SaaS applications and internet destinations
Zscaler Internet Access (ZIA)
Securely connects authorized users to
internally managed applications
Zscaler Private Access (ZPA)
HQMOBILE BRANCHIOT
App migration is driving network and security transformation
Fast and secure policy-based access to applications and services over the Internet
©2018 Zscaler, Inc. All rights reserved.10
Open Internet Public Cloud Private Cloud / DCSaaS
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Q&A and Next Steps
Whitepaper
Solution Brief
Webcast
Ask us a question Learn More | Share
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Speaker Q&A
Stan Lowe
Global Chief Information Security Officer
Zscaler
Bil Harmer
Americas Chief Information Security Officer
Zscaler

Top 5 predictions webinar

  • 1.
    Top 5 securitypredictions for 2019 WEBCASTS Stan Lowe Global Chief Information Security Officer | Zscaler Bil Harmer Americas Chief Information Security Officer | Zscaler
  • 2.
    Want to aska question? We’ll answer questions live, or follow up afterwards Please take survey and let us know how we did Contact us if you have any other questions or comments
  • 3.
    ©2018 Zscaler, Inc.All rights reserved.2 Secure Your Cloud Transformation Network security is irrelevant as the cloud becomes your data center and the internet your new network The Market Leader in Cloud Security What we do Deliver fast and secure access to apps and services over the internet How we do it A purpose-built cloud security platform that sits between your users and apps Leader in the Gartner SWG Magic Quadrant years in a row!! 7 3250+ Customers Nasdaq: ZS 300 of the Forbes Global 2000
  • 4.
    Governments rush tothe clouds. 1 Private sector to the rescue.
  • 5.
    State employees beginmoonlighting with organized crime.2
  • 6.
    IoT and Botnetsmake headlines3 Hacker C2 Server Victim Website Compromised IoT device Current Botnet Activity | Zscaler Threat Insights
  • 7.
    4 Cyber breacheshit the “Street”4 Cloud Migration Stock Price Breach
  • 8.
    Focus on supplychains weakest link5
  • 9.
    ©2018 Zscaler, Inc.All rights reserved.8 Always on Always Connected Mobility App Transformation to the Cloud Network Transformation Security Transformation Cloud Agility and Capacity (process/analyze) +Digital Transformation Drivers
  • 10.
    ©2018 Zscaler, Inc.All rights reserved.9 Network security is becoming irrelevant Secure the network to protect users and apps Open Internet Internet Gateway Security Appliances Build a security moat appliances to protect the network Open Internet Public Cloud Private Cloud / DCSaaS IoT Mobile HQ Branch Decouple network access from application access Policy Enforcement Checkpost Securely connects an authorized user to an app/ service on any network Old World Network Centric New World User Centric
  • 11.
    ©2018 Zscaler, Inc.All rights reserved.10 Global load balancing Distributed denial of service protection External firewall / intrusion prevention VPN concentrator Internal firewall Internal load balancer Firewall / intrusion prevention URL filter Anti-virus Data loss prevention Secure sockets layer inspection Sandbox Any device, any location, on-network or off-network Externally managed Internally managed Securely connects users to externally managed SaaS applications and internet destinations Zscaler Internet Access (ZIA) Securely connects authorized users to internally managed applications Zscaler Private Access (ZPA) HQMOBILE BRANCHIOT App migration is driving network and security transformation Fast and secure policy-based access to applications and services over the Internet ©2018 Zscaler, Inc. All rights reserved.10 Open Internet Public Cloud Private Cloud / DCSaaS
  • 12.
    ©2017 Zscaler, Inc.All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Q&A and Next Steps Whitepaper Solution Brief Webcast Ask us a question Learn More | Share
  • 13.
    ©2017 Zscaler, Inc.All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Speaker Q&A Stan Lowe Global Chief Information Security Officer Zscaler Bil Harmer Americas Chief Information Security Officer Zscaler

Editor's Notes

  • #5 Global governments will look to the private sector to help with securing cloud apps as they offload commodity IT applications and services. Due to skills shortages, governments don’t have the knowledge, skills and abilities to migrate data and applications and services to the cloud. As a result, governments around the world will look to the private sector to help with securing cloud apps as they offload commodity IT applications and services to the cloud.
  • #6 There will be an increase of state employed hackers “moonlighting” with organized criminal elements. State-employed InfoSec pros are moonlighting as hackers-for-hires within criminal organizations all over the world. This trend is especially prevalent in Russia, where government employees who are paid poorly, can earn extra income working for powerful and sophisticated criminal networks with ties to the government.
  • #7 There will be a substantial increase in IoT system exploits and botnet recruitment. As the number of IoT devices rise and we deploy 5G to connect everything, we’re going to see a huge increase in the use of IoT devices for DDoS attacks, phishing, ransomware and cryptomining. Reaper was an example of the power of IoT devices and with the addition of 5G and increased compute power the risk is only going to grow.
  • #8 Cyber breeches will have increased impacts on corporate stock prices, especially in the technology and cyber security sector. The rate at which we’re seeing attacks, and the breadth of the impact is alarming but as of yet haven’t had a large impact on stock prices. However this will soon change as organizations complete their digital transformation and move to the cloud. Once this happens, a breach is going to have a larger impact on their revenue and as a result a detrimental effect on stock price. Another impact of companies moving operations and revenue to the cloud is we’re going to see more criminal and state organizations going after cybersecurity companies to infiltrate code in their distribution base or take them offline to get to the corporations themselves
  • #9 There will be an increased focus on supply chain sourcing and security especially in government sectors, with government holding companies monetarily liable for supply chain security. The government has long required parts used inside government systems to be sourced from “approved” sources. However, there hasn’t been any teeth in enforcing these policies. In 2019 the government will increase physical site-audits and assertions for companies to meet in their physical and logical supply chains. Failure to comply with policies or ability to show due-diligence will result in fiscal fines.
  • #11 Life was simple in the old world – you controlled apps, devices and the network. You secured the network New world – Users are everywhere, apps are in the cloud. Internet is becoming the corporate network – that you don’t control. How do you secure it? You don’t. Don’t secure the network