Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Seeking out cyber challenges with Jay Patty, SVP of Cybersecurity Engineering at Regions Bank
|
Mar 26, 2024 |
Lessons in servant leadership from Voya Financial CISO Stacy Hughes (part 2)
|
Jan 22, 2024 |
Security leaders under the spotlight with Voya Financial CISO Stacy Hughes (part 1)
|
Jan 16, 2024 |
‘Planned happenstance:’ Lessons from a life in tech with Zscaler CTO Syam Nair
|
Oct 09, 2023 |
Illustrating the “art of the possible” with Brian Deitch
|
Jul 19, 2023 |
How Andrew Baker, a CTO 'seduced by complexity,' came to embrace zero trust
|
Jun 08, 2023 |
Product management on the main stage: Innovations to be unveiled at Zenith Live '23
|
May 31, 2023 |
Coming to grips with an increasingly diverse, dynamic, and automated public cloud
|
Mar 27, 2023 |
Blackouts, brownouts, and Black Swans: Maintaining uptime in spite of it all
|
Mar 06, 2023 |
Consolidation and consumers set tone for media and entertainment M&A
|
Feb 14, 2023 |
Zero trust in Europe
|
Jan 19, 2023 |
M&A in life sciences and healthcare
|
Dec 16, 2022 |
Pulling the thread on zero trust with Ben Corll, CISO
|
Dec 02, 2022 |
How AI/ML assists in solving the unsolvable in cybersecurity
|
Nov 07, 2022 |
Talking mergers, acquisitions, and divestitures with TCS
|
Oct 25, 2022 |
Key NIST cybersecurity publications and how to apply them
|
Sep 14, 2022 |
Talking standards with NIST Fellow Dr. Ron Ross
|
Aug 15, 2022 |
So long, not goodbye
|
Jul 30, 2022 |
How to talk tech, featuring Bill Lapp
|
Jul 18, 2022 |
To go far, go together: The value of collaboration in transformation
|
Jul 06, 2022 |
RSAC 2022: An attendee's perspective on hot topics and the elephant in the room
|
Jun 21, 2022 |
Anatomy of a threat with Zscaler CISO and ThreatLabz chief Deepen Desai
|
Jun 01, 2022 |
Firewalls: the good, the bad, and the ugly
|
May 17, 2022 |
Zscaler Private Access innovations with Tony Paterra, SVP Emerging Products
|
Apr 28, 2022 |
Outrunning the bear
|
Apr 13, 2022 |
Navigating the Wild West of cloud workflows
|
Mar 25, 2022 |
Misha Kuperman: Scaling a cloud for uncharted territory
|
Mar 10, 2022 |
Trusting your cloud apps: from conceptual breakthrough to realization
|
Feb 25, 2022 |
Confidence and permission: the secrets to successful zero trust
|
Feb 09, 2022 |
IT, IoT, IIoT, OT: zero trust for every...thing
|
Jan 27, 2022 |
Maturing zero trust via an operational mindset
|
Jan 12, 2022 |
Engaging the adversary with cloud-enabled active defense
|
Dec 21, 2021 |
Stronger together: the role of coaching and mentoring in leadership transitions
|
Dec 10, 2021 |
Bridging the zero trust gap between public and private sectors
|
Dec 01, 2021 |
Zero trust and private app visibility: a new ray of light for digital experience
|
Nov 09, 2021 |
The Great Firewall of China
|
Oct 26, 2021 |
“Safety science” for cybersecurity with Ira Winkler, leading cyber-espionage authority
|
Oct 06, 2021 |
Enabling the modern workplace no matter how you slice it
|
Sep 21, 2021 |
Sizing up the transformative opportunity of 5G
|
Sep 01, 2021 |
New & Notable from Zenith Live 2021
|
Aug 19, 2021 |
Breaking down segmentation: From networks to workloads
|
Jun 22, 2021 |
Zenith Live Is Around the Corner!
|
Jun 02, 2021 |
Biden’s Executive Order on Cybersecurity
|
May 17, 2021 |
Let’s get SASE
|
May 14, 2021 |
Seize the Zero Trust Moment
|
May 14, 2021 |
The Long Short History of Zero Trust
|
Apr 26, 2021 |
Zero Trust and M&A, Part 2
|
Apr 22, 2021 |
Zero Trust and M&A, Part 1
|
Apr 15, 2021 |
What’s Ahead on the Zero Trust Exchange Horizon
|
Apr 15, 2021 |
Solarwinds and Supply Chain Attacks
|
Apr 13, 2021 |