Our seasoned analysts couple their industry-leading B2B research with in-depth buyer intent data for unparalleled insights about critical technology markets.
Clients trust us across their GTMs—from strategy and product development to competitive insights and content creation—because we deliver high-quality, actionable support.
Browse our extensive library of research reports, research-based content, and blogs for actionable data and expert analysis of the latest B2B technology trends, market dynamics, and business opportunities.
Our seasoned analysts couple their industry-leading B2B research with in-depth buyer intent data for unparalleled insights about critical technology markets.
Clients trust us across their GTMs—from strategy and product development to competitive insights and content creation—because we deliver high-quality, actionable support.
Browse our extensive library of research reports, research-based content, and blogs for actionable data and expert analysis of the latest B2B technology trends, market dynamics, and business opportunities.
Analyst Emeritus Jon Oltsik founded the cybersecurity practice at Enterprise Strategy Group in 2003 and has spent the subsequent 20 years studying cyber-threats, cyber-risk management, technical defenses, and CISO strategies.
With over 35 years of technology industry experience, he is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO’s perspective.
Jon is a founding member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners, and he was named one of the top 100 cybersecurity influencers by Onalytica. Often quoted in the business and technical press, he is also engaged in cybersecurity issues, legislation, and technology discussions within the US government.
Jon has appeared in The Wall Street Journal, The New Yorker, Forbes, The New York Times, CNBC, Investor’s Business Daily, CSO, Tech Republic, Network World, and Dark Reading, among others. He holds a BA and MBA from the University of Massachusetts, Amherst.
Cybersecurity risk has never been greater, while defending against cyber-attacks is more difficult today than it’s ever been. A successful cybersecurity strategy must be a diverse combination of fundamental security hygiene and an openness to new strategic ideas and technology innovation.”
Jon Oltsik Analyst Emeritus, Cybersecurity Strategies
Security hygiene and posture management has become increasingly difficult because of factors like a growing attack surface, the increased use of cloud computing, and the need to support a remote workforce. These factors can create security vulnerabilities that lead directly to cyber-attacks.