CXO Security

Rewriting the Application Access Playbook

Rewriting the Application Access Playbook

Users have left the premise and working outside the four walls of your organization. With the cloud as the new home, applications are leaving the data center. 5G is redefining network and connectivity. Delivering seamless and secure user experience, maintaining business agility, and boosting workforce productivity in this dynamically shifting business and IT landscape would require fundamentally rethinking and resetting the application access paradigm. But how should one go about it, and what are the pitfalls? For those who are farther along the journey, what is the learning? How should IT or Security leaders rewrite their organization’s application access playbook?

Contributor

Download Podcast

Apple Podcast, Google Podcast, Spotify, Pandora, iHeartRadio, SoundCloud, TuneIn, and Stitcher. Find other syndication channels here or search CIO Talk Network podcast on any other app.

Explore More

Contributors

Lisa Lorenzin

Lisa Lorenzin, Director of Transformation Strategy, Zscaler

Lisa Lorenzin is Director of Transformation Strategy at Zscaler, specializing in secure application access and digital transformation. For more than 20 years, she has worked in a variety of network and information security roles and has con... More   View all posts

Exclusive Sponsor

Sponsor Resources

Lisa Lorenzin

Login


Not Member Yet?
Register

Register

  • Name

  • Contact Info

  • About Yourself

  • Minimum length of 8 characters
  • Upload
  • Location

  • Professional Background

  • Other Social Profiles

  • Areas of Interest