
THE WORLD’S PREMIER SECURE DIGITAL TRANSFORMATION EVENT IS GOING VIRTUAL AND FREE.
The new IT enables business growth,
but only when leaders look beyond the limits
of legacy systems, legacy security, and legacy thinking to advance a cloud-first future.
WHO SHOULD
ATTEND?
CIOs
New business enablers who are strategically breaking barriers — both real and metaphorical — to realize opportunity.
CISOs
Security leaders who need the latest cybersecurity insight from expert research and threat-protection teams.
CTOs & HEADS OF INFRASTRUCTURE
Technology and infrastructure leaders looking to change the game with comprehensive visibility into enterprise data traffic.
ARCHITECTS
Network, security, and enterprise builders who want to learn and share cloud best practices for creating the future.
PRACTITIONERS & OPERATIONS PROFESSIONALS
IT professionals who want to join an expert community of IT operations pioneers leading cloud cybersecurity charge.
CloudOPs + Dev/SecOPs
Operations practitioners looking for expert training on bringing security, compliance, and risk awareness to the development process.
WHY ATTEND?
ADVANCE YOUR CAREER
with in-demand knowledge and skills for the cloud-first world.
MEET THE INNOVATORS
behind the leading technologies that drive cloud transformation.
HEAR FROM VISIONARY LEADERS
at companies like Siemens, and Microsoft, and Takeda Pharmaceuticals.
LEAD YOUR TEAM AND YOUR ORGANIZATION
into the secure, digital future.
LEADING CUSTOMER CXO SPEAKERS

MARKUS SONTHEIMER
CIO & CDO
DB Schenker

HANNA HENNIG
CIO
Siemens AG

STEVE MCCRYSTAL
Chief Enterprise and
Technology Officer
Unilever

MIKE TOWERS
CISO
Takeda Pharmaceutical Company

RICH AGOSTINO
SVP & CISO
Target

ROB FRANCH
CTO
Cushman & Wakefield

JAYA RAMASWAMY
SVP & CIO
Hitachi America, Ltd.

JAIRO OREA
CISO
Kimberly-Clark

DIANE SCHWARZ
CIO
Johnson Controls

BENJAMIN VAUGHN
VP & CISO
Hyatt

MIKE BAKER
CISO
Kelly Services

JOHN MAYA
VP, Operational Excellence
Royal Caribbean Group

VISH NARENDRA
SVP & CIO
Graphic Packaging International

MARIA JOSE LLORET CRESPO
VP IT Operations & Chief Technologist
Johnson Controls

DOMINIQUE TESSARO
CIO
VINCI Energies

MICHAEL PERRINO
Group CISO
CMA CGM
SPECIAL GUESTS

CAPTAIN SCOTT KELLY
Former Astronaut
& Military Fighter Pilot
NASA

ANDY GREENBERG
Technology Journalist & Author of "Sandworm"
WIRED

ALEX SIMONS
Corporate Vice President
Microsoft Identity Division

JODY DAVIDS
Former SVP & Global CIO
Pepsico
ZSCALER EXECUTIVE SPEAKERS

JAY CHAUDHRY
CEO, Chairman & Founder
Zscaler

AMIT SINHA
President & CTO
Zscaler

KAVITHA MARIAPPAN
EVP, Customer Experience & Transformation
Zscaler

PATRICK FOXHOVEN
CIO & EVP, Emerging Technologies
Zscaler
DAYS 1 AND 2 AGENDA AT-A-GLANCE
KEYNOTES
DAY 1
8:30 – 9:05 AM
CEO Keynote by Jay Chaudhry
9:05 – 9:35 AM
Product Innovations
9:40 – 10:00 AM
Voice of the Customer - Secure Digital Transformation (CIO) - Making IT more resilient, responsive, and secure
10:00 – 10:15 AM
Customer Spotlight
10:15 – 10:35 AM
Guest Speaker Captain Scott Kelly: "The Sky Is Not The Limit: Lessons From A Year In Space"
10:35 – 10:50 AM
Q&A with Captain Scott Kelly
DAY 2
8:30 – 9:00 AM
Cyberthreats & Cloud Protection Innovations
9:00 – 9:20 AM
Voice of the Customer – Security Transformation (CISO)
9:25 – 9:55 AM
How Microsoft and Zscaler’s approach to Zero Trust fosters agility, resiliency, and business continuity
9:55 – 10:15 AM
Voice of the Customer - Network Transformation (CTO )
10:15 – 10:35 AM
Guest Speaker Andy Greenberg: "Sandworm: Lessons From the Worst Cyberattack in History"
10:35 – 10:55 AM
Q&A with Andy Greenberg
BREAKOUTS
DAY 1
11:30 AM – 12:00 PM
Introducing the Zscaler Multi-mode CASB
Breakout Session: Secure Internet and SaaS Access with Zscaler Internet Access
The Internet-only Branch: Myth or Reality?
The compass is broken when it comes to modern network security - Why TIC 3.0 offers a more flexible approach
What's new with Zscaler Private Access?
12:00 – 12:30 PM
Modernize your Government Security Stack Today
Secure Private Application Access with Zscaler Private Access
Securing All Ports and Protocols with Zscaler Cloud Firewall and Cloud IPS
Threat-hunting with ThreatLabZ
What's New with Zscaler Internet Access?
12:30 – 1:00 PM
Best Practices for Optimizing Your Zoom and Collaboration Experience
How Zero Trust Security Can Eliminate the VPN Attack Surface and Protect Against COVID-19 Cyberthreats
How to Boost CASB Security for your Agency
Secure Applications and Workloads with Zscaler Cloud Protection
Technical Deep Dive into Deploying Zscaler Client Connector (Formerly Z App)
1:00 – 1:30 PM
Best Practices for Stopping Encrypted Attacks with Complete SSL Inspection
Introducing Zscaler Workload Segmentation: Identity-Based Microsegmentation for the Real World
NCR Perspective: Deploying SASE with VMware and Zscaler
Risky Discussion: Why Adopting Cloud-Based Security Minimizes IT Risk and Improves End-User Experience
Superior User Experience Management with Zscaler Digital Experience
Under the Hood: Exploring Zscaler's Global Cloud Footprint and Scale
1:30 – 2:00 PM
Cloud DLP Best Practices - Crawl, Walk, Run
Defending the DoDIN, one of the World’s Largest Networks
Introducing Zscaler Cloud Security Posture Management (CSPM) Avoiding IaaS/PaaS/SaaS Misconfigurations
The Future of Network and Security Architecture with Gartner's SASE Framework
Unifying Endpoint and Cloud Applications Security with CrowdStrike and Zscaler
Zscaler Digital Experience (ZDX) in the Real World
DAY 2
11:30 AM – 12:00 PM
Achieving Comprehensive Data Protection with Zscaler Cloud Security
An Inside Look at the Threat Landscape in State and Local Government
Deploying the Zscaler Zero Trust Exchange in China
Embrace DevSecOps in your Organization with Zscaler
What's New with Zscaler Digital Experience
Zero Trust Security for Server to Server and Multi-cloud Connectivity
12:00 – 12:30 PM
Embracing the Cloud to Make Telework a Success for Government
Implement Zero Trust Security with ZPA Private Service Edge Instances
Maintaining Business Continuity with a Safe and Productive Work-From-Anywhere Workforce
Microsoft and Zscaler - Microsoft 365 Best Practices
Operational and Deployment Best Practices and Lessons Learned
12:30 – 1:00 PM
Best Practices from Norsk Hydro for Rapid Ransomware Recovery and Prevention
Cushman & Wakefield Transforms WAN: Embraces SASE with Silver Peak and Zscaler
Discover Your Exposed Network Attack Surface: Introducing Zscaler Security Assessment Toolkit
Innovative Approach to Secure Server Access to the Internet
Zero Trust Security for your B2B Customers and Partners
1:00 – 1:30 PM
Microsoft and Zscaler – How the Enterprise deploys Work from Anywhere in the New Normal
SSL Inspection is Critical: How to Overcome Legal and Privacy Objections
Top Tips on How to Get ZPA Deployed in 24 Hours
Using Cloud Browser Isolation for Safe Web Access and VDI Replacement
1:30 – 2:00 PM
Using Cloud Browser Isolation for Safe Web Access and VDI Replacement
Beyond the Hype: The Future of AI/ML for Security Operations
Local Government Up-levels Elections Security Posture with Microsegmentation
Securing Multi Cloud Connectivity
Securing Your IoT and OT Infrastructure
TRAINING
December 7
12:00 – 2:00PM
Cloud Firewall with Z-tunnel 2.0 Workshop | Limited Seating
Getting ZPA Working Workshop | Limited Seating | Session is Full
Threat Protection with Cloud Sandbox and ZIA Workshop | Limited Seating
December 8
2:00 – 4:00 PM
Data Protection with DLP & EDM Workshop | Limited Seating
ZPA Advanced Policy Control | Limited Seating | Session is Full
Zscaler Client Connector Deployment & User Authentication Workshop | Limited Seating | Session is Full
December 9
2:00 – 4:00 PM
Endpoint Protection Integration Workshop | Limited Seating | Session is Full
Traffic Forwarding with SD-WAN Workshop | Limited Seating | Session is Full
ZPA Application Discovery and Basic Management Workshop | Limited Seating | Session is Full
December 10
12:00 – 2:00PM
Inline and Out of Band Data Protection with CASB Workshop | Limited Seating | Session is Full
User Experience Management with ZDX Workshop | Limited Seating | Session is Full
ZPA Troubleshooting Workshop | Limited Seating | Session is Full
December 11
12:00 – 2:00PM
Getting ZPA Working Workshop | Limited Seating | Session is Full
Migrating to ZTunnel 2.0 Workshop | Limited Seating
Security Operations Workshop | Limited Seating | Session is Full
ARCHITECTURE WORKSHOPS
Day 1
11:30 – 12:30 PM
Application Transformation for Zero Trust | Limited Seating
Application Transformation for Zero Trust | Limited Seating | Session is Full
Network Transformation - Advanced | Limited Seating
Network Transformation - Standard | Limited Seating
Network Transformation - Standard | Limited Seating
Security Transformation | Limited Seating
12:30 – 1:30 PM
Application Transformation for Zero Trust | Limited Seating
Application Transformation for Zero Trust | Limited Seating
Network Transformation - Advanced | Limited Seating
Network Transformation - Standard | Limited Seating
Network Transformation - Standard | Limited Seating
Security Transformation | Limited Seating
Day 2
11:30 – 12:30 PM
Application Transformation for Zero Trust | Limited Seating
Application Transformation for Zero Trust | Limited Seating
Network Transformation - Advanced | Limited Seating
Network Transformation - Standard | Limited Seating
Network Transformation - Standard | Limited Seating
Security Transformation | Limited Seating
12:30 – 1:30 PM
Application Transformation for Zero Trust | Limited Seating
Application Transformation for Zero Trust | Limited Seating
Network Transformation - Advanced | Limited Seating
Network Transformation - Standard | Limited Seating
Network Transformation - Standard | Limited Seating
Security Transformation | Limited Seating
ASK THE EXPERTS
Day 1
1:00 – 1:30 PM
How Zscaler Defends Against Sophisticated Cyberthreats
Implementing Zero Trust Architecture with Zscaler
1:30 – 2:00 PM
Deploying & Optimizing O365 with Zscaler
Securing Workload Communications with Zscaler Client Connector
Day 2
1:00 – 1:30 PM
Implementing Data Protection with Zscaler CASB & DLP
Deploying Zscaler in China and Other Regulated Countries
1:30 – 2:00 PM
How Zscaler Secures Multi-Cloud Connectivity & SD-WAN
Making Zoom & Microsoft Teams work with Zscaler
WOMEN IN IT
Day 1
11:00 – 12:00 PM
Confidence and Collaboration Bring IT Career Success
LIVE Q&A/ DEMO
Day 1
2:30 – 3:15 PM
CSPM & SSPM
Cloud Access Security Broker (CASB) | Data Protection
Securing IoT/OT Systems
Zscaler Internet Access (ZIA)
Zscaler Workload Segmentation
3:15 – 4:00 PM
Browser Isolation
Workload Communications with Cloud Connector
Zscaler Digital Experience (ZDX)
Zscaler Private Access (ZPA)
Day 2
2:30 – 3:15 PM
CSPM & SSPM
Cloud Access Security Broker (CASB) | Data Protection
Securing IoT/OT Systems
Zscaler Internet Access (ZIA)
Zscaler Workload Segmentation
3:15 – 4:00 PM
Browser Isolation
Workload Communications with Cloud Connector
Zscaler Digital Experience (ZDX)
Zscaler Private Access (ZPA)
CXO PANELS
Day 1
11:00 – 12:00 PM
Women in IT: Confidence and Collaboration Bring IT Career Success
12:00 – 12:45 PM
CIO Perspective Panel: Transforming applications, networks, and security: Moving beyond legacy systems for better enterprise resiliency
Day 2
12:00 – 12:45 PM
CTO Perspective Panel: Move fast and clean up as you go: Network transformation creates business transformation
1:00 – 1:45 PM
CISO Perspective Panel: Securing everything everywhere: Zero trust enables digital transformation
VIRTUAL EXPERIENCES
Join the Zenith Live Challenge
Give for Good
Take a Space Selfie
Play a Game
Go Social
Connect with Zscaler
SPONSORED BY
REVISIT ZENITH LIVE 2019
Catch up on all the great keynotes and breakout talks
from last year’s event.
READY TO REACH BEYOND?
Check out the full agenda and register today.
©2020 Zscaler, Inc. All rights reserved.