WSJ and Zscaler CEO Jay Chaudhry on How Agentic AI Is Changing the Security Playbook

Our CEO, Jay Chaudhry, sat down with WSJ's VP of Custom Programming, Raakhee Mirchandani, at the 2025 WSJ Tech Council Summit in New York City to discuss:

  • Why zero trust + AI is essential to combating advanced cyberthreats
  • How AI is helping both threat actors and defenders alike
  • Why legacy approaches highlight the need for zero trust architecture
zscaler-wall-street-journal-exploring-agentic-ai

Security and Segmentation

Zero Trust Everywhere: secure your workforce, branches, clouds, and AI

Secure all users
Secure all users, apps, and devices by hiding your attack surface to protect your data against cyberthreats
Reduce costs
Reduce costs by eliminating legacy technology that is complicating your network and security
Improve agility and scalability
Improve agility and scalability to empower your organization for digital growth and performance
A CXO’s guide to evaluating zero trust architecture
A CXO’s guide to evaluating zero trust architecture

Explore the five pillars of zero trust that replace legacy solutions and strategies to foster AI innovation and business growth.

Read the ungated brochure
Eliminate the attack surface, prevent lateral threat movement
Eliminate the attack surface, prevent lateral threat movement

Implementing zero trust at the branch helps prevent network threats and simplify access for users, devices, and apps across locations.

Read the ungated ebook
A unified data security platform built for the AI era
A unified data security platform built for the AI era

Get complete data visibility: discover and classify sensitive data everywhere—at rest and in motion—with advanced LLM classification.

Read the ungated ebook

Customer Success Stories

Learn more from Zscaler customers

Telecommunications200,000 Users

“The migration to a modern SASE solution for us improved our security in a number of ways. First, it allowed us to consolidate this large attack surface of a number of VPNs down to one more modern system that is supported by Zscaler for us. We don't have to maintain and patch and service all these different systems.”

Jeff Simon, Senior Vice President & Chief Security Officer, T-Mobile

Healthcare4,000+ Employees47 Locations

“Zscaler is a pioneer in zero trust. It has built its platform from the ground up and understands how it needs to be implemented in environments like ours and other industries as well.”

Dr. Zafar Chaudry, Chief Digital Officer and Chief AI and Information Officer, Seattle Children’s

Entertainment & Hospitality70,000 Employees31 Resorts

“Traditional VPN is definitely a legacy approach, no doubt about it. Shifting that to Zero Trust means we're going to constantly check and validate your posture, your identity. If you look at modern Zero Trust architecture that's cloud-first, you're going to see a shift to walls around every single entity, every single service, system, network.”

Stephen Harrison, CISO, MGM Resorts International

Finance Tech1,600 Employees16 Countries

“Zscaler is the backbone of our zero trust strategy. It not only helps us be more secure, it allows us to scale securely and innovate without compromise.”

Siva Vadakandra, Director of Security and Infrastructure, Zuora

t-mobile-zscaler-customer-success
t-mobile-logo
Dr. Zafar Chaudry
Seattle Children's Hospital
Stephen Harrison
MGM Resorts
zscaler-customer-zuora
zuora-logo
NaN/04

Zero trust architecture

Make your network invisible with our zero trust + AI security cloud

 It’s time for a new security approach. The Zscaler Zero Trust Exchange™, the largest inline security cloud, hides your network and scans inbound and outbound traffic to provide proactive protection across the various stages of the attack chain so you can protect your data and users against fast-evolving cyberthreats, including AI-based attacks.

We ensure zero trust by identifying your users, connecting them directly to applications, and validating all stages of access.

9B+ threats and policy violations blocked daily

Secure internet, email, devices, applications, GenAI tools, public clouds, and branch networks.

85% greater protection against ransomware

Protect against ransomware by securing all traffic between users, applications, and clouds.

47M+ users secured in our cloud

Ensure zero trust by identifying your users, connecting users to applications, and eliminating VPNs.

90% reduction in legacy security costs

Reduce infrastructure costs and improve networking and security agility by eliminating firewalls.

Zero Trust + AI

Thrive in the AI era with Zero Trust + AI

It’s time for a modern approach with Zscaler’s comprehensive zero trust architecture and AI that blocks GenAI data loss, prevents attacks against AI systems, and stops AI-powered cyberattacks to securely embrace AI in the enterprise.

To fuel AI, Zscaler offers the most secure cyber platform with the largest security dataset, fed by over 500 trillion daily signals, as well as data from over 150 third-party security sources.

Zscaler zero trust + AI helps

Achieve newfound productivity
Achieve newfound productivity

Safely call on Al technologies to spark greater productivity for your workforce, with no risk to your data.

Innovate with confidence
Accelerate innovation with confidence

Put more trust in Al-driven decision-making, customer interactions, and operational workflows than ever.

Maintain more resilient business
Maintain more resilient business

Get the most effective protections against Al-powered attacks with industry-leading zero trust and Al.

Realize better security outcomes
Realize better security outcomes

Ensure precise Al inputs for more accurate outcomes that speed up and automate security and IT.

BG Image

our platform

The Zscaler Zero Trust Exchange

Secure user, workload, and device communication between and 

within the branch, cloud, and data center.

Zero Trust Everywhere
Stop Cyberattacks

Stop Cyberattacks

  • Become Invisible to Attackers
  • Prevent Compromise
  • Prevent Lateral Movement
Learn more
Secure Data

Secure Data

  • Find, Classify, and Assess Data Security Posture
  • Prevent Data Loss Across All Channels
Learn more
Secure AI

Secure AI

  • Secure the Use of Public AI
  • Secure Private AI Apps and Models
  • Secure Agent Communications
Learn more
Automate Ops

Automate Ops

  • Accelerate Security Operations
  • Optimize Digital Experiences
Learn more

Suggested Resources

Learn and explore resources

Phishing and Ransomware Insights for C-Suite

executive report

Phishing and Ransomware Insights for C-Suite

Read the report
zscaler-cyber-2025-are-you-prepared

video

WSJ's Ms. Leighton-Jones and Zscaler CEO Mr. Chaudhry on Reducing Cyber Risk with Zero Trust and AI

Why Is Zero Trust Cybersecurity So Essential Today?

BLOG

Why Is Zero Trust Cybersecurity So Essential Today?

Read the blog
A Guide to Enabling Work from Anywhere

white paper

A Guide to Enabling Work from Anywhere

Read the white paper
Zscaler ThreatLabz Ransomware Report

report

Zscaler ThreatLabz Ransomware Report

Read the report
6 Principles of Cloud Security Posture

BLOG

6 Principles of Cloud Security Posture

Read the blog
Zero Trust, AI and the outlook for cybersecurity in 2025

Article

Zero Trust, AI and the outlook for cybersecurity in 2025

Read the article

01 / 05