Jon Oltsik

Senior Principal Analyst

  • News
    Oct 6, 2015

    Acronis looks to roll out quantum encryption solutions - Security Watch

  • News
    Oct 5, 2015

    FireEye (FEYE), F5 Enter Global Partnership -

  • Blogs
    Oct 1, 2015

    Happy Cybersecurity Awareness Month?

    As October begins, we in New England look forward to fall foliage, warm days and cool nights. Aside from orange and bright red leaves here in Massachusetts, everyone will see a prominent display of the color pink, as October is also breast cancer awareness month. Finally, if you are a dedicated cybersecurity professional, you may (that’s right, may) know that October is also national cybersecurity awareness month.

  • News
    Sep 30, 2015

    Juniper unites cloud and physical in new reference architecture - FierceEnterpriseCommunications

  • Blogs
    Sep 29, 2015

    U.S. Critical Infrastructure under Cyber-Attack

    ESG recently published a new research report titled, Cyber Supply Chain Security Revisited, focused on cyber supply chain security practices and challenges at U.S.-based critical infrastructure organizations. The term “critical infrastructure” is associated with 16 industries designated by the U.S. Department of Homeland Security (DHS), “whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof”.

  • News
    Sep 29, 2015

    Acronis, ID Quantique prepare for the arrival of quantum computing - Network World Asia

  • Blogs
    Sep 25, 2015

    My Take-aways from Splunk Conf 2015

    When I first became familiar with Splunk years ago, I thought of it as a freeware log management tool for inquisitive security analysts. Useful for general purposes, but I didn’t see it as a true enterprise security management system, a category defined by vendors like ArcSight, Intellitactics, and Network Intelligence at that time.

  • Blogs
    Sep 23, 2015

    Book Report: Future Crimes

    Future Crimes by Marc Goodman details the dark side of technology, examining how new technologies are used and abused for criminal purposes. In just under 400 pages, Goodman provides some basic historical background on computer security and then guides the reader through a cybercrime journey spanning consumer, industrial, medical, and various other technologies.

  • Blogs
    Sep 18, 2015

    Cyber Supply Chain Security Is Increasingly Difficult for Critical Infrastructure Organizations

    As the old cybersecurity adage states, "The cybersecurity chain is only as strong as its weakest link." Smart CISOs also understand that the proverbial weak link may actually be out of their control.

  • briefs
    Sep 17, 2015

    Webroot’s Intelligent Approach to Endpoint Security

    The endpoint often plays a central role in the cyber kill chain, serving as the entry point and staging ground for a broader attack, a dynamic that has raised the stakes in protecting the endpoint attack surface area. Today’s endpoint security market is in transition, with customers seeking solutions that protect against zero day malware and exploits while evaluating whether “next-generation” solutions augment or replace traditional antivirus. Webroot SecureAnywhere Business Endpoint Protection strives to bridge the gap with a smart approach to detect, prevent, and remediate malware on endpoints.

  • Blogs
    Sep 15, 2015

    The Network’s Role as a Security Sensor and Policy Enforcer

    According to ESG research, 79% of cybersecurity professionals working at enterprise organizations (i.e., more than 1,000 employees) believe that network security management and operations is more difficult today than it was two years ago. Why? Infosec pros point to a combination of increasingly dangerous cyber-threats, new IT initiatives like cloud and mobile computing, legacy point tools, and growing security operations overhead.

  • research reports
    Sep 14, 2015

    Cyber Supply Chain Security Revisited

    In order to explore cyber supply chain security practices and challenges further, ESG surveyed 303 IT and information security professionals representing large midmarket (500 to 999 employees) organizations and enterprise-class (1,000 employees or more) organizations in the United States within vertical industries designated as critical infrastructure by the U.S. Department of Homeland Security (DHS). All respondents were familiar with/responsible for their organization’s information security policies and procedures, especially with respect to the procurement of IT products and services. Respondents also had to be familiar with cyber supply chain security as defined previously. 

  • Blogs
    Sep 11, 2015

    Challenges around Operationalizing Threat Intelligence

    When it comes to threat intelligence, there seem to be two primary focus areas in play: The threat intelligence data itself and the legislative rhetoric around threat intelligence sharing (i.e., CISA, CISPA, etc.). What’s missing? The answer to a basic question: How do organizations get actual value out of threat intelligence data and threat intelligence sharing in a meaningful way?

  • esg video capsules
    Sep 9, 2015

    ESG Video Capsule: Threat Intelligence and Enterprise Cybersecurity Practices, Part 3 - The Future of Threat Intelligence

    In this ESG Video Capsule series, ESG Senior Principal Analyst Jon Oltsik reviews recent ESG research on Threat Intelligence trends. In this segment, Jon discusses the future of threat intelligence.

  • Blogs
    Sep 8, 2015

    My Assessment of VMware NSX

    At last week’s VMworld event in San Francisco, I spent a good deal of time speaking with VMware, its customers, and a wide variety of its partners about the cybersecurity use case for NSX

More Results:



Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. 

Full Biography