Jon Oltsik

Jon Oltsik is a distinguished analyst, fellow, and the founder of the ESG’s cybersecurity service. With over 35 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. Jon focuses on areas such as cyber-risk management, security operations, and all things related to CISOs.

Attributes of a mature cyber-threat intelligence program

The strong link between cyber threat intelligence and digital risk protection

The strong link between cyber threat intelligence and digital risk protection

Digital transformation initiatives and hybrid IT increases risk and drives the need for digital risk protection. Threat intelligence programs must accommodate this requirement.

Dissecting threat intelligence lifecycle problems

Dissecting threat intelligence lifecycle problems

Following a threat intelligence lifecycle is a best practice, but many organizations have process bottlenecks that impact their entire program.

Cyber threat intelligence programs: Still crazy after all these years

Cyber threat intelligence programs: Still crazy after all these years

Organizations are spending on threat intelligence, but ESG research reveals CTI may not be getting a good return on investment.

Why CISOs change jobs

Why CISOs change jobs

CISOs often deliver suboptimal performance and have a short shelf life. Organizations are often at fault for both outcomes.

Economic headwinds could deepen the cybersecurity skills shortage

Economic headwinds could deepen the cybersecurity skills shortage

Security professionals will remain in high demand, but economic fallout will make hiring even harder.

Cybersecurity spending and economic headwinds in 2023

Cybersecurity spending and economic headwinds in 2023

Investments will increase but CISOs will be more selective, driving the need for federated technology architectures.

The changing role of the MITRE ATT&CK framework

The changing role of the MITRE ATT&CK framework

Organizations are using the MITRE ATT&CK framework as more than a security operations reference architecture, adding new use cases and making it part of strategic future plans.

XDR: Still confusing after all these years

XDR: Still confusing after all these years

It’s time to stop debating about what XDR is and focus on how it fits in a security operations center modernization strategy.

Making the case for security operation automation

Making the case for security operation automation

Most organizations are automating security operations processes and achieving benefits. An intelligent strategy and appropriate technology decisions can accelerate these projects.

5 reasons why security operations are getting harder

5 reasons why security operations are getting harder

SOC teams struggle to keep up with a dangerous threat landscape, growing attack surface, and voluminous security alerts.

Top 5 attack surface challenges related to security operations

Top 5 attack surface challenges related to security operations

The growing attack surface is extending the security/software developer gap, increasing vulnerabilities, and slowing security investigations.

Load More