Jon Oltsik

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.

Jon was named one of the top 100 cybersecurity influencers for 2015 by Onalytica, and he is active as a committee member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners. Often quoted in the business and technical press, Jon also publishes articles on The Cipher Brief, a digital, security-based conversation platform that connects the private sector with the world’s leading security experts, and is also engaged in cybersecurity issues, legislation, and technology discussions within the U.S. government.

SOAPA vs. SOAR: How these security terms differ

SOAPA vs. SOAR: How these security terms differ

SOAPA and SOAR are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA).

Can VMware become a leading cybersecurity vendor?

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

Examining and addressing threat detection and response challenges

Examining and addressing threat detection and response challenges

Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed.

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics.

Security analytics: It’s all about the data

Security analytics: It’s all about the data

More security data drives the need for data modeling, data management, and data discipline

Managed security services will take center stage at Black Hat

Managed security services will take center stage at Black Hat

With organizations increasingly needing help detecting and responding to threats, expect managed security services to be one of the main themes at Black Hat 2019.

Network traffic analysis tools must include these 6 capabilities

Network traffic analysis tools must include these 6 capabilities

Organizations want advanced analytics, threat intelligence integration, and IoT support among other things in network traffic analysis (NTA) tools.

How organizations are bridging the cyber-risk management gap

How organizations are bridging the cyber-risk management gap

To bridge the cyber-risk management gap, organizations plan to get CISOs more involved with the business, focus on data security, hire staff, and provide more security awareness training.

Must-have features in a modern network security architecture

Must-have features in a modern network security architecture

Form factors and use cases are changing, so network security must be more comprehensive, intelligent, and responsive than ever before.

AWS re:Inforce 2019: Amazon shows its dedication to cloud security

AWS re:Inforce 2019: Amazon shows its dedication to cloud security

AWS re:Inforce sets the bar for cloud security and the industry. Now Amazon needs to reinforce this leadership in an era of dynamic software development and hybrid cloud computing.

Cybersecurity pros' haphazard participation in data privacy raises concern

Cybersecurity pros' haphazard participation in data privacy raises concern

Limited training and unclear roles/responsibilities for cybersecurity teams restrict the effectiveness of data privacy programs.

Security shines at Cisco Live

Security shines at Cisco Live

Cisco's security team highlighted market results, integrated portfolio, and future plans, but there is still some work ahead.

The most stressful aspects of being a cybersecurity professional

The most stressful aspects of being a cybersecurity professional

Keeping up with IT, educating users, and working with the business top the list of the most stressful things of being a cybersecurity professional.

Cybersecurity professionals are no match for cyber-adversaries

Cybersecurity professionals are no match for cyber-adversaries

In the battle against hackers, cyber-adversaries have an advantage over cyber-defenders, new research from ESG and ISSA finds.

Is the cybersecurity skills shortage getting worse?

Is the cybersecurity skills shortage getting worse?

New research indicates that things are not improving for filling the demand for cybersecurity skills. The ramifications are widespread.

North Dakota: An innovative and leading cybersecurity state

North Dakota: An innovative and leading cybersecurity state

North Dakota is addressing the cybersecurity skills shortage with policies and programs for government, education, and business.

5 threat detection and response technologies are coming together

5 threat detection and response technologies are coming together

Organizations use too many disparate point tools to detect and respond to cyber threats in a timely manner. As a result, CISOs want tight integration and interoperability across five cybersecurity technologies.

The growing demand for managed detection and response (MDR)

The growing demand for managed detection and response (MDR)

Threat detection/response is a high priority, but many organizations don’t have the staff or skills to perform these tasks alone. This translates into a growing managed detection and response (MDR) market.

Endpoint security is consolidating, but what does that mean?

Endpoint security is consolidating, but what does that mean?

Organizations seeking tightly-integrated endpoint security solutions must determine how far they want to go.

Load More