

Jon Oltsik
Jon Oltsik is a distinguished analyst, fellow, and the founder of the ESG’s cybersecurity service. With over 35 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. Jon focuses on areas such as cyber-risk management, security operations, and all things related to CISOs.

The strong link between cyber threat intelligence and digital risk protection
Digital transformation initiatives and hybrid IT increases risk and drives the need for digital risk protection. Threat intelligence programs must accommodate this requirement.

Dissecting threat intelligence lifecycle problems
Following a threat intelligence lifecycle is a best practice, but many organizations have process bottlenecks that impact their entire program.

Cyber threat intelligence programs: Still crazy after all these years
Organizations are spending on threat intelligence, but ESG research reveals CTI may not be getting a good return on investment.

Why CISOs change jobs
CISOs often deliver suboptimal performance and have a short shelf life. Organizations are often at fault for both outcomes.

Economic headwinds could deepen the cybersecurity skills shortage
Security professionals will remain in high demand, but economic fallout will make hiring even harder.

Cybersecurity spending and economic headwinds in 2023
Investments will increase but CISOs will be more selective, driving the need for federated technology architectures.

The changing role of the MITRE ATT&CK framework
Organizations are using the MITRE ATT&CK framework as more than a security operations reference architecture, adding new use cases and making it part of strategic future plans.

XDR: Still confusing after all these years
It’s time to stop debating about what XDR is and focus on how it fits in a security operations center modernization strategy.

Making the case for security operation automation
Most organizations are automating security operations processes and achieving benefits. An intelligent strategy and appropriate technology decisions can accelerate these projects.

5 reasons why security operations are getting harder
SOC teams struggle to keep up with a dangerous threat landscape, growing attack surface, and voluminous security alerts.

Top 5 attack surface challenges related to security operations
The growing attack surface is extending the security/software developer gap, increasing vulnerabilities, and slowing security investigations.