Hero Panel Image

EDITOR'S PICK

Identity transformation and emerging cyber security capabilities

Share:
Phil Armstrong

Phil Armstrong

CIO

Great-West Lifeco, Inc. (former)

Maneesh Sahu

Maneesh Sahu

Contributor

Zscaler

Mar 8, 2022

Experts cover securing the supply chain by minimizing supplier risk and integrating third-party identities, advances and challenges in device identity, IOT, and how to embrace DevOpsSec successfully.

Once you have a zero trust architecture in place, it can enable cyber security capabilities that will be commonplace in the future. In this episode, host Phil Armstrong welcomes guests Maneesh Sahu, director, OT network and security transformation, Zscaler, and Bil Harmer, operating partner, Craft Ventures, to explore the latest technologies that can help IT leaders support their digital aspirations.

Learn about securing the supply chain by minimizing supplier risk and integrating third-party identities, advances and challenges in device identity, and IOT, and how to embrace DevOpsSec and the no-code and low-code development trend while staying on top of their challenges. 

Listen now:

Listen on SpotifyAppleGoogle

WHAT IS THE CIO EVOLUTION?

The CIO Evolution, a CXO REvolutionaries podcast sponsored by Zscaler CIOs are a special breed of executive: the Swiss Army Knife of leaders. They lead the innovation agenda and use technology to power the capabilities that deliver business outcomes. This podcast covers the art and science of business transformation and the tools CIOs use: cloud, mobile, AI, zero trust. More importantly, it investigates the true essence of digital leadership.

Recommended