Save or Share this Report

Josh   Zelonis

Josh Zelonis

Senior Analyst Serving Security & Risk Professionals

Josh is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyberthreat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.

Previous Work Experience

Prior to joining Forrester, Josh accumulated over 13 years of experience as a security practitioner with demonstrated success in product architecture, engineering, and security assessment roles. As a product architect, Josh helped design and build innovative technologies in the breach detection space, architecting both endpoint and appliance products with a focus on data collection and analytics. His background also includes extensive experience in security assessment roles including red team, vulnerability research, and compliance.

Education

Josh holds a B.S. in computer science from the California State University, San Marcos.

Josh Zelonis

Senior Analyst Serving Security & Risk Professionals

Josh is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyberthreat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.

Previous Work Experience

Prior to joining Forrester, Josh accumulated over 13 years of experience as a security practitioner with demonstrated success in product architecture, engineering, and security assessment roles. As a product architect, Josh helped design and build innovative technologies in the breach detection space, architecting both endpoint and appliance products with a focus on data collection and analytics. His background also includes extensive experience in security assessment roles including red team, vulnerability research, and compliance.

Education

Josh holds a B.S. in computer science from the California State University, San Marcos.

Josh Zelonis's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels

    July 18, 2017Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't new, but current technologies are gaining interest again due to a wave of innovation and venture capital investment. In this report, we explain the benefits and limitations of deception technology and profile and explain when it makes sense to invest in it (and when it doesn't).

  • For Security & Risk Professionals

    REPORT: Vendor Landscape: External Threat Intelligence, 2017

    Tools And Technology: The Security Architecture And Operations Playbook

    June 26, 2017Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course correction for the industry by clearly delineating the offerings of 30 vendors that provide externally sourced intelligence. It also offers a guide for using this data to build a successful threat intelligence capability.

  • For Security & Risk Professionals

    REPORT: The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook

    April 26, 2017 Merritt Maxim, Jeff Pollard, Amy DeMartine, Nick Hayes, Joseph Blankenship, Josh Zelonis, Andras Cser

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects we complete each quarter; and perspectives from key industry events such as the RSA Conference to answer two of our clients' most frequent questions: 1) "What security innovations are emerging?" and 2) "What disruptive technologies should I pilot?" This report cuts through hype and helps you assess the most important developments in the next 12 months.

  • For Security & Risk Professionals

    REPORT: Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It

    April 21, 2017Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in enterprise breaches. Identifying vulnerable systems on your network and applying patches is clearly not a rote process at enterprise scale. This report provides security and risk (S&R) pros an overview of the vulnerability management vendor landscape and information on trends that directly affect and enable business operations.

  • For Security & Risk Professionals

    REPORT: Achieve Early Success In Threat Intelligence With The Right Collection Strategy

    S&R Pros Must Use Strategic Intelligence To Maximize Their Investment

    April 11, 2017Josh Zelonis

    Threat intelligence is a different animal than most security and risk (S&R) professionals are used to dealing with. For those new to the space, getting started can feel like an overwhelming experience with a high price tag. This document is intended as a guide for maximizing a demonstrable benefit out of your initial investment in threat intelligence, allowing you to generate executive- and board-level support for continuing to mature this capability.

View all of Josh Zelonis's Research

Clients Who Work With Josh Zelonis Also Work With:

View all related analysts

Connect

Brief Our Analysts

Upcoming Events

Webinar: 2018’s Top Five Retail Security Threats

Date: October 17, 2017
Time: 11:00 AM-11:40 AM Eastern Standard Time
Register
View all upcoming events