Jon Oltsik

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.

Jon was named one of the top 100 cybersecurity influencers for 2015 by Onalytica, and he is active as a committee member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners. Often quoted in the business and technical press, Jon also publishes articles on The Cipher Brief, a digital, security-based conversation platform that connects the private sector with the world’s leading security experts, and is also engaged in cybersecurity issues, legislation, and technology discussions within the U.S. government.

Cyber risk management continues to grow more difficult

It's time for a new cyber risk management model

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

Best-of-breed security products still dominate -- kind of

Best-of-breed security products still dominate -- kind of

CISOs want products that can prevent, detect, and respond to cyber attacks, but they also consider product consolidation and integration.

8 features a cybersecurity technology platform must have

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

Cybersecurity professional impressions on cloud-native security

Cybersecurity professional impressions on cloud-native security

Organization use cloud-native security controls, but they really want central management for cloud security across heterogeneous clouds.

6 takeaways from McAfee MPower

6 takeaways from McAfee MPower

The company articulates its device-to-cloud security strategy with vision and series of announcements.

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro provides an overview of its new cybersecurity products, platforms, and services.

Splunk lays out its cybersecurity vision

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

Cloudy future for security analytics

Cloudy future for security analytics

Greater data volumes are driving an architectural change, forcing security analytics to the cloud.

Form factor wars: Cloud-based or on-premises security technologies?

Form factor wars: Cloud-based or on-premises security technologies?

While most organizations are willing to consider cloud-based or on-premises security solutions, nearly one-third still demand the control associated with on-premises.

5 biggest cybersecurity challenges at smaller organizations

5 biggest cybersecurity challenges at smaller organizations

Manual processes, security complexity, and a lack of support from business management plague small and midsize businesses (SMBs).

CISOs recommend future actions for their organizations

CISOs recommend future actions for their organizations

More security goals for the business, formal security processes, and increased training top the list of recommendations from chief information security officers.

Load More