Jon Oltsik

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.

Jon was named one of the top 100 cybersecurity influencers for 2015 by Onalytica, and he is active as a committee member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners. Often quoted in the business and technical press, Jon also publishes articles on The Cipher Brief, a digital, security-based conversation platform that connects the private sector with the world’s leading security experts, and is also engaged in cybersecurity issues, legislation, and technology discussions within the U.S. government.

Cisco poised to become a cybersecurity force

Moving to central network security policy management for hybrid clouds

Moving to central network security policy management for hybrid clouds

With controls built into the infrastructure, the industry is headed toward central network security policy management (and reporting).

The rise of analyst-centric security operations technologies

The rise of analyst-centric security operations technologies

The shift of technology to meet analyst needs has altered the infosec market -- for the better.

Symantec in a position to progress and prosper

Symantec in a position to progress and prosper

Symantec has some internal challenges and increased competition, but it appears to be facing these challenges from a position of strength in the market.

Containers are here. What about container security?

Containers are here. What about container security?

ESG data indicates that cybersecurity pros have problems around the nuances of container technology and implementing container-centric security controls.

It’s time to think harder about security data management

It’s time to think harder about security data management

Organizations are running into scalability problems as they collect, process, and analyze more security data. It’s time for enterprise security data management.

The evolution of security operations, automation and orchestration

The evolution of security operations, automation and orchestration

Basic functionality of SOAR products is being supplemented with strong integration, canned runbooks, and case management.

Cloud computing security chaos continued at RSA Conference 2018

Cloud computing security chaos continued at RSA Conference 2018

Cloud security has growing needs and lots of challenges. Here are some thoughts on solutions and strategies.

What is a cybersecurity technology platform anyway?

What is a cybersecurity technology platform anyway?

Vendors are pushing platforms, but features, functionality, and definitions vary. Here’s a list of “must have” cybersecurity platform attributes.

Quick take-aways from the RSA Security Conference

Quick take-aways from the RSA Security Conference

Last week's RSA Security Conference had good discussions and industry focus, but there was too much hype -- and there's lots of work ahead.

Cloud security will (and should) dominate the RSA Conference

Cloud security will (and should) dominate the RSA Conference

Cloud computing is a runaway IT train, but cloud security is still messy and immature. RSA should become the place to go for cloud security vision, training, best practices, and technology leadership.

Software-defined perimeter: Important initiative, ineffective name

Software-defined perimeter: Important initiative, ineffective name

A geeky and confusing name doesn’t communicate business, privacy, and security benefits. Instead of software-defined perimeter, I suggest ubiquitous security access services (USAS).

Load More