Skip to main content
Joseph   Blankenship

Joseph Blankenship

VP, Research Director Serving Security & Risk Professionals

Joseph supports security and risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a BA in English from Auburn University.

Joseph Blankenship

VP, Research Director Serving Security & Risk Professionals

Joseph supports security and risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a BA in English from Auburn University.

Joseph Blankenship's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Zero Trust Security Playbook

    July 2, 2020Joseph Blankenship, Heidi Shey

    In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military gain. To combat this, security leaders need Forrester's Zero Trust Model of information security. With Zero Trust, you can develop robust prevention, detection, and incident response capabilities to protect your company's vital digital business ecosystem. Our Zero Trust playbook shows you how to use the Zero Trust Model and the ZTX framework to defend your firm and your data.

  • For Security & Risk Professionals

    REPORT: Prevent Fraud And Phishing Attacks With DMARC

    Email Authentication Keeps Cybercriminals Out Of Your Inbox

    March 31, 2020Joseph Blankenship, Claire O'Malley

    Despite the many security technologies and education in place, phishing and business email compromise remain two of the biggest threats for organizations everywhere. Domain-based Message Authentication, Reporting & Conformance (DMARC) is an email authentication protocol that verifies legitimate senders and prevents malicious emails or unverified sources from ever reaching the workforce's inbox. In this report, we explain what DMARC is, how it works, and discuss vendors that can help S&R leaders implement it today.

  • For Security & Risk Professionals

    REPORT: A Practical Guide To A Zero Trust Implementation

    Roadmap: The Zero Trust Security Playbook

    January 15, 2020 Chase Cunningham, David Holmes, Jinan Budge, Paul McKay, Andras Cser, Heidi Shey, Joseph Blankenship, Merritt Maxim

    Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the fundamental shifts in strategy and architecture Zero Trust demands. However, Zero Trust does not require that you rip out all your current security controls to start fresh, and with the right approach you can realize benefits right away. Security leaders should read this report to understand the practical building blocks of a successful Zero Trust implementation roadmap.

  • For Security & Risk Professionals

    REPORT: Don't Poison Your Employee Experience With The Wrong Approach To Insider Threat

    Security Leaders Must Balance Security, Governance, And Employee Privacy

    December 20, 2019Joseph Blankenship, Enza Iannopollo

    Your colleagues are one of the biggest threats to the security of your organization, but treating them as criminals is obviously not an option. Considerations for employees' privacy, company culture, and local standards for lawful, fair, and acceptable labor practices are key to the success of your insider threat program. This report helps security and risk (S&R) pros set up a program that not only delivers against their security objectives, but doesn't sacrifice employee experience (EX).

  • For Security & Risk Professionals

    REPORT: Best Practices: Phishing Prevention

    Protect Against Email-Borne Threats With Forrester's Layered Approach

    September 30, 2019Joseph Blankenship, Claire O'Malley

    Attackers use phishing and other social engineering tactics to infiltrate corporate networks. Advances in malicious email protection can recognize and stop obvious phishing attempts, but enterprises remain vulnerable to this common attack vector. In this report, we provide best practices that can help security and risk (S&R) professionals at enterprises stop phishing attacks.

View all of Joseph Blankenship's Research

Clients Who Work With Joseph Blankenship Also Work With:

View all related analysts