Featured Content from Jon Oltsik

ESG Brief

On Demand Webinar: The State of Cybersecurity Analytics and Operations

Groundbreaking research-based discussion exploring the complexities and nuances of modern security analytics and operations recorded on Wednesday, July 19th with analysts Jon Oltsik and Doug Cahill.

Read more»

 


 

ESG Brief

[ESG Blog] Cybersecurity Skills Shortage: Profound Impact on Security Analytics and Operations

I’ve written a lot about the cybersecurity skills shortage over the past 5 years. For example, ESG research indicates that 45% of organizations claim to have a problematic shortage of cybersecurity skills. To me, the cybersecurity skills shortage represents an existential problem. 

ESG Brief

[ESG Blog] Cybersecurity Skills Shortage: Profound Impact on Security Analytics and Operations

I’ve written a lot about the cybersecurity skills shortage over the past 5 years. For example, ESG research indicates that 45% of organizations claim to have a problematic shortage of cybersecurity skills. To me, the cybersecurity skills shortage represents an existential problem. 

ESG Research Report

[ESG Blog] The Internet of Identities (IoI)

Everyone is talking about IoT these days and for good reason – there are already billions of devices connected to the global Internet and some researchers are predicting 50 billion by 2020. This alone will make CISOs' jobs more difficult, but security executives face many other associated challenges as well:

ESG Research Report

[ESG Blog] The Internet of Identities (IoI)

Everyone is talking about IoT these days and for good reason – there are already billions of devices connected to the global Internet and some researchers are predicting 50 billion by 2020. This alone will make CISOs' jobs more difficult, but security executives face many other associated challenges as well:

ESG Infographic

[ESG/ISSA Research Report] Through the Eyes of Cyber Security Professionals: An Annual Research Report (Part 2)

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.

ESG Infographic

[ESG/ISSA Research Report] Through the Eyes of Cyber Security Professionals: An Annual Research Report (Part 2)

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.

ESG TechTruth

[ESG/ISSA Research Report] The State of Cyber Security Professional Careers: An Annual Research Report (Part 1)

In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.

ESG TechTruth

[ESG/ISSA Research Report] The State of Cyber Security Professional Careers: An Annual Research Report (Part 1)

In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.

SOAPA: An Interview with Marc van Zadelhoff, IBM General Manager of Security

networksasia.png

“IoT introduces an avalanche of new devices, network traffic, and protocols to the mix,” writes Jon Oltsik, senior principal analyst at The Enterprise Strategy Group. “The security team will need the right skills and tools to identify IoT devices, secure IoT data and traffic, and recognize the difference between legitimate and suspicious communications.”

Read the entire article at Networks Asia

Some of our clients: