Jon Oltsik

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.

Jon was named one of the top 100 cybersecurity influencers for 2015 by Onalytica, and he is active as a committee member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners. Often quoted in the business and technical press, Jon also publishes articles on The Cipher Brief, a digital, security-based conversation platform that connects the private sector with the world’s leading security experts, and is also engaged in cybersecurity issues, legislation, and technology discussions within the U.S. government.

Economic headwinds could deepen the cybersecurity skills shortage

Cybersecurity spending and economic headwinds in 2023

Cybersecurity spending and economic headwinds in 2023

Investments will increase but CISOs will be more selective, driving the need for federated technology architectures.

The changing role of the MITRE ATT&CK framework

The changing role of the MITRE ATT&CK framework

Organizations are using the MITRE ATT&CK framework as more than a security operations reference architecture, adding new use cases and making it part of strategic future plans.

XDR: Still confusing after all these years

XDR: Still confusing after all these years

It’s time to stop debating about what XDR is and focus on how it fits in a security operations center modernization strategy.

Making the case for security operation automation

Making the case for security operation automation

Most organizations are automating security operations processes and achieving benefits. An intelligent strategy and appropriate technology decisions can accelerate these projects.

5 reasons why security operations are getting harder

5 reasons why security operations are getting harder

SOC teams struggle to keep up with a dangerous threat landscape, growing attack surface, and voluminous security alerts.

Top 5 attack surface challenges related to security operations

Top 5 attack surface challenges related to security operations

The growing attack surface is extending the security/software developer gap, increasing vulnerabilities, and slowing security investigations.

Five things security pros want from CNAPP

Five things security pros want from CNAPP

New research reveals what practitioners believe is most important for cloud security technology.

Cybersecurity is a constant fire drill—that’s not just bad, it’s dangerous

Cybersecurity is a constant fire drill—that’s not just bad, it’s dangerous

Security efforts based on heroism and tribal knowledge can’t scale. CISOs must address this situation as soon as possible.

5 things security pros want from XDR platforms

5 things security pros want from XDR platforms

New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform.

Bye-bye best-of-breed?

Bye-bye best-of-breed?

ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process.

SOC modernization: 8 key considerations

SOC modernization: 8 key considerations

Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole.

Load More