Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
Integration and services needed for cybersecurity efficacy and operations efficiency
Malware detection, prevention, and response activities are quickly bringing endpoint and network security together.
Great read for those who want to understand what might happen as a result of a devastating cyber-attack on critical infrastructure
Wave of security breaches illustrates the need to step back before moving forward
Cybersecurity progress in Washington depends upon the right policies and programs based upon the right technical details
Great potential but too much hype and confusion are getting in the way
PCI and other regulations will drive this behavior, but CIOs/CISOs need to build an incident response program with the same focus, discipline, and rigor as BC/DR
High energy, strong community, scary cybersecurity situation
CISOs must prioritize identity, data security, and security monitoring, and strive for a “single-pane-of-glass” across enterprise IT, SaaS, PaaS, and IaaS
Lots of money, lots of opportunity, and lots of risk. VCs should abandon status quo investment strategies and look toward services, industry solutions, middleware, and data security
Enterprises should prepare for, and take advantage of, the consumerization of authentication technology
Security analytics growth will drive growth in PCAP appliances, analytics distribution networks, SDN and middleware.
A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy.
CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition.
High demand will drive new intelligence, services, tools and executive cybersecurity skill sets.
Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change.
It’s time to stop blaming employees and enlist their help.
Large organizations should delegate endpoint security to a group dedicated to malware prevention, detection, and response across all technology areas.
Applications, endpoints, networks, and servers will enforce security policies related to identity and data security.
Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response.
Enterprise organizations should selectively bolster defenses based upon threat intelligence and industry trends.
Large organizations need help monitoring user behavior activity, alternative endpoints, threat intelligence, and sensitive data.
Congressional report points to people, process, and technology problems