Joseph   Blankenship

Joseph Blankenship

Principal Analyst Serving Security & Risk Professionals

Joseph supports security and risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a B.A. in English from Auburn University.

Joseph Blankenship

Principal Analyst Serving Security & Risk Professionals

Joseph supports security and risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a B.A. in English from Auburn University.

Joseph Blankenship's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Enterprise Email Security, Q2 2019

    The 12 Providers That Matter Most And How They Stack Up

    May 16, 2019Joseph Blankenship

    In our 32-criterion evaluation of enterprise email content security providers, we identified the 12 most significant ones — Barracuda, Cisco, Clearswift, Forcepoint, Microsoft, Mimecast, Proofpoint, Retarus, Sophos, Symantec, Trend Micro, and Zix — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk professionals select the right one for their needs.

  • For Security & Risk Professionals

    REPORT: Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook

    March 25, 2019 Paul McKay, Jeff Pollard, Jinan Budge, Joseph Blankenship, Andras Cser, Merritt Maxim, Amy DeMartine, Claire O'Malley

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions, consulting engagements, and dozens of primary research interviews with chief information security officers (CISOs), security vendors, and major security consultancies and service providers. CISOs: Leverage this report to guide your security program strategy and prioritize changes to security architecture and operations for the coming year.

  • For Security & Risk Professionals

    REPORT: Recruiting And Retaining Insider Threat Analysts

    To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts

    March 7, 2019Joseph Blankenship

    Whether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need privileged access to do their jobs. Also, as employees, they're entitled to privacy and due process, so security pros must handle these incidents with greater care. There should be an insider threat program to detect, investigate, and respond to them. This report helps security pros recruit and retain the most critical role of the program: the insider threat analyst.

  • For Security & Risk Professionals

    REPORT: New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019

    Forrester's Landscape Overview Of 21 Providers

    February 28, 2019 Merritt Maxim, Joseph Blankenship

    A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems, leading to changing behaviors and disruption in the broad cybersecurity market. This report presents a review of the emerging vendors in the ICS security market. Security professionals should use it to understand the capabilities within major market segments and to inform their technology strategies.

  • For Security & Risk Professionals

    REPORT: How Insiders Use The Dark Web To Sell Your Data

    Financial Services Firms Need To Prioritize Monitoring For Insider Threats

    February 28, 2019Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy for them to find each other, negotiate the terms, and conduct the transaction. This report focuses on the marketplace for insider information and how security and risk leaders can protect their firms' sensitive data. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

View all of Joseph Blankenship's Research

Clients Who Work With Joseph Blankenship Also Work With:

View all related analysts