Joseph   Blankenship

Joseph Blankenship

Principal Analyst Serving Security & Risk Professionals

Joseph supports security and risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a B.A. in English from Auburn University.

Joseph Blankenship

Principal Analyst Serving Security & Risk Professionals

Joseph supports security and risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a B.A. in English from Auburn University.

Joseph Blankenship's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Recruiting And Retaining Insider Threat Analysts

    To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts

    March 7, 2019Joseph Blankenship

    Whether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need privileged access to do their jobs. Also, as employees, they're entitled to privacy and due process, so security pros must handle these incidents with greater care. There should be an insider threat program to detect, investigate, and respond to them. This report helps security pros recruit and retain the most critical role of the program: the insider threat analyst.

  • For Security & Risk Professionals

    REPORT: New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019

    Forrester's Landscape Overview Of 21 Providers

    February 28, 2019 Merritt Maxim, Joseph Blankenship

    A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems, leading to changing behaviors and disruption in the broad cybersecurity market. This report presents a review of the emerging vendors in the ICS security market. Security professionals should use it to understand the capabilities within major market segments and to inform their technology strategies.

  • For Security & Risk Professionals

    REPORT: How Insiders Use The Dark Web To Sell Your Data

    Financial Services Firms Need To Prioritize Monitoring For Insider Threats

    February 28, 2019Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy for them to find each other, negotiate the terms, and conduct the transaction. This report focuses on the marketplace for insider information and how security and risk leaders can protect their firms' sensitive data. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Now Tech: Antiphishing Solutions, Q1 2019

    Processes: The Security Architecture And Operations Playbook

    January 8, 2019Joseph Blankenship, Nick Hayes, Claire O'Malley

    You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security and risk (S&R) professionals should use Forrester's Now Tech report to understand the value they can expect from an antiphishing solution provider and select vendors based on size and functionality.

  • For Security & Risk Professionals

    REPORT: The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019

    Tools And Technology: The Security Architecture And Operations Playbook

    January 2, 2019 Josh Zelonis, Joseph Blankenship

    Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and response, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide™ report presents an analysis of the maturity and business value of the 18 technology categories that support Zero Trust threat detection and response. Security professionals should read this report to shape their firm's investment approach to these technologies.

View all of Joseph Blankenship's Research

Clients Who Work With Joseph Blankenship Also Work With:

View all related analysts