CLOUD SECURITY COACHING

The very best Zscaler-focused coaching program.

Recruiters

We are very friendly to all recruiters. If you bring us an opportunity, then it is registered as yours, plain and simple. We will not attempt in any way to take it direct, as we fully respect the value you offer.

Our terms are simple and straightforward: corp-to-corp and not at all interested in “contract to hire” or anything of the sort. Remote as well as on-site options are available, including all-inclusive pricing for the latter.

If you want the very best cloud security consulting, start with a consultant that understands what you want and need, with the actual experience to back it up:

FORTUNE 10 EXPERIENCE

Kevin has served as the business unit security officer (BISO) at McKesson (Fortune 5), where he lead the cybersecurity program for 75 software products, a very high revenue managed services program, and broadly evangelized the adoption of cloud security across the entire company. Perhaps more specifically, he introduced both of the most visible security platforms that continue to drive their success.

SILICON VALLEY LEADERSHIP

For many in cybersecurity, working in Silicon Valley is considered the very pinnacle of success. So while he has been through there in very big ways twice himself (Juniper Networks and Zscaler, as well several advisory board positions for startups), he knows that the creativity and drive that is the brand of that landscape is hardly confined to them. His clear passion for cybersecurity and ensuring that everyone wins plays a big part in the programs he is tasked with. 

 

Zscaler Deployment Advisory Services (DAS)

When most large enterprises begin with Zscaler, they also buy into their Deployment Advisory Services. With this, they get the comfort of having some truly extraordinary Zscaler engineers and project managers steer them toward success, for a slotted period of time or other predefined threshold.

But advisors are not coaches, and someone has to fill that role properly. It’s the difference between leaving behind a checklist or leaving a legacy. As the saying goes: “If you think it’s expensive to hire a professional, wait until you hire an amateur”. 

Advisors sit in the stands and shout down their suggestions.

Coaches are on the field and are accountable.

Kevin Peterson

ZecurityAscent

Zscaler Private Access (ZPA)

Kevin literally helped write the book on remote access. During his 7.5 years at Juniper Networks as Senior Product Manager for the Junos Pulse SSL VPN product line (now Pulse Secure), he not only co-authored the top book on the subject, but also ran the SSL VPN Insider blog site, where he was in constant contact with thousands of fans of that product.

As one of the handful of true remote access leaders (especially Zero Trust Network Access (ZTNA)), dating back to 2004, his insight into what businesses and users alike require is highly sought after. 

The remote access landscape has changed. Now was the time to start moving in that direction.

Zscaler Internet Access (ZIA)

Getting the most of the Zscaler platform means understanding the entire security stack. It means understanding quite deeply what it truly takes to make the Internet safe for business, putting together the plan that will succeed, then executing.

It’s a real challenge to find someone who understands and can also fully implement SSL inspection, data loss prevention (DLP), web proxy, CASB, bandwidth management, advanced threat protection, malware, sandboxing, DNS security, next generation firewall, SIEM, and everything else that is typically deployed between the user and the Internet, let alone also being able to work seamlessly with the network architects to fully optimize the traffic flows.

But more importantly, it’s finding the right person who can not only lead this, but do so with the sole purpose of making sure the client is far better off when he/she leaves. Because as a consultant, the goal is always to do what must be done to bring the most value, then go on to the next great opportunity. This is baked into the equation, ensuring that those who are in-house can get the outcome needed much faster through the extra set of hands, then happily take over when the prescribed time has come.

 

 

Documentation

When you are interviewing Kevin, make sure to ask about the ability to document the progress like few can. From Yammer posts for users, to advanced video training for engineers, to full bleed marketing sheets to delight the boardroom, there is nothing that can’t be rolled into the project.

Kevin Peterson CISSP