Fri, Sept 12 | Mumbai, India
Jio World Convention Centre

Session Catalog

Browse all Zenith Live ’25 breakout sessions.

Breakout Sessions

Secure AI
Risk and Reward of
Agentic AI
Fri, Sept 12 | 5.00pm (40mins) | Jasmine Hall

As we enter the era of agentic AI, we must also address its risks. This talk will define agentic AI, showcase its potential to streamline operations, and explore...

Secure AI
The Risks of GenAI Use—and How to Address Them with Zscaler
Fri, Sept 12 | 6.00pm (40mins) | Jasmine Hall

Join us as we outline key risks of public GenAI, including data loss, shadow AI, app data compliance, and unauthorized access to AI tools. We’ll also show...

Secure AI
Full Confidence in Business AI: Security for Enterprise LLMs and AI Apps
Fri, Sept 12 | 7.00pm (40mins) | Jasmine Hall

With more focus on public AI security, what about the risks of private LLMs deployed internally for productivity and process/workflow optimization? We’ll examine...

Data Security
Securing Your Data Landscape: An Intro to the Zscaler AI Data Security Platform
Fri, Sept 12 | 5.00pm (40mins) | Jasmine Hall

Discover how to understand and secure the ever-evolving data landscape with Zscaler’s AI-powered platform. Learn how to protect sensitive data across...

Data Security
The Future of Classification: Mastering Your Data Landscape with AI
Fri, Sept 12 | 6.00pm (40mins) | Jasmine Hall

Effective data classification is the foundation of mastering your data landscape and strengthening your security strategy. In this session, explore how Zscaler’s new...

Data Security
Revolutionizing DSPM: Unified Data Security and Compliance Made Simple
Fri, Sept 12 | 7.00pm (40mins) | Jasmine Hall

Discover how to revolutionize data security posture management (DSPM) with the unified Zscaler DLP platform. Learn to simplify compliance, enhance...

Zero Trust for Users
ZTNA Everywhere: Empowering secure access for remote and hybrid with Fully Managed App Connector & Private Service Edge
Fri, Sept 12 | 5.00pm (40mins) | Jasmine Hall

Enable ZTNA everywhere with seamless support for on-prem environments, hybrid users, and return-to-office strategies. ZPA simplifies deployment and...

Zero Trust for Users
AI Unleashed: Effortless App Segmentation, Zero Lateral Movement
Fri, Sept 12 | 6.00pm (40mins) | Jasmine Hall

Discover how AI-powered segmentation is transforming zero trust security. Simplify policy management, minimize the attack surface, and stop lateral...

Zero Trust for Users
Zero Trust Browser: Fewer Threats, Less VDI, and a More Productive Workforce
Fri, Sept 12 | 7.00pm (40mins) | Jasmine Hall

Learn more about the essential features of Zero Trust Browser, which not only protects users from web-borne threats with air-gapped browsing, but can also...

Security Operations
"How Many Assets Do We Really Have?" A Deep Dive on the New Asset Exposure Management App
Fri, Sept 12 | 5.00pm (40mins) | Jasmine Hall

"Learn how you can finally get an asset inventory you can trust, identify coverage gaps and other asset hygiene problems, auto-update your CMDB (yes, really!), and...

Security Operations
"Who's Misbehaving?" A Look at Our Broadening Features for Managing Identity Risk
Fri, Sept 12 | 6.00pm (40mins) | Jasmine Hall

Learn how Zscaler's behavioral profiling can help you quickly detect and contain threats from human and nonhuman identities, tapping user profiling...

Security Operations
"Stop Where You Are!" Preventing Lateral Movement with Deception and App Protection
Fri, Sept 12 | 7.00pm (40mins) | Jasmine Hall

If bad actors got into your systems, how would you know, and how would you stop them from gaining access to more systems? Deception uses honeypots to detect infiltrators, and...

Partner Connect
Partner Connect: Empowering Partnerships for Growth
Fri, Sept 12 | 5.00pm (2hours) | Jasmine Hall

This dynamic session will provide actionable strategies, valuable insights, and real-world customer success stories to help you drive growth, seize opportunities, and thrive in the ever-changing cloud security landscape.

Please note: This agenda is subject to change. Changes can occur up until the event date.