Josh   Zelonis

Josh Zelonis

Senior Analyst Serving Security & Risk Professionals

Josh is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyberthreat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.

Previous Work Experience

Prior to joining Forrester, Josh accumulated over 13 years of experience as a security practitioner with demonstrated success in product architecture, engineering, and security assessment roles. As a product architect, Josh helped design and build innovative technologies in the breach detection space, architecting both endpoint and appliance products with a focus on data collection and analytics. His background also includes extensive experience in security assessment roles including red team, vulnerability research, and compliance.

Education

Josh holds a B.S. in computer science from the California State University, San Marcos.

Josh Zelonis

Senior Analyst Serving Security & Risk Professionals

Josh is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyberthreat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.

Previous Work Experience

Prior to joining Forrester, Josh accumulated over 13 years of experience as a security practitioner with demonstrated success in product architecture, engineering, and security assessment roles. As a product architect, Josh helped design and build innovative technologies in the breach detection space, architecting both endpoint and appliance products with a focus on data collection and analytics. His background also includes extensive experience in security assessment roles including red team, vulnerability research, and compliance.

Education

Josh holds a B.S. in computer science from the California State University, San Marcos.

Josh Zelonis's Research

Most RecentMost Popular
  • For Infrastructure & Operations Professionals

    REPORT: Ransomware Is A Business Continuity Issue

    Firms Are Just Not Prepared To Handle Cybersecurity-Induced Disasters

    May 22, 2018 Naveen Chhabra, Josh Zelonis

    Ransomware attacks hit firms hard on all fronts — the business, partners, clients, employees, and regulators. Successfully getting out of a ransomware situation requires I&O and S&R pros to work hand in hand. This report gives IT leaders a view of the state of readiness during ransomware attacks — and exposes the illusion of preparedness. It offers insights into why leaders should bridge the gap between S&R and I&O teams in their organization for the goal of a well-coordinated recovery.

  • For Security & Risk Professionals

    REPORT: Protect Your Business From Parasitic Cryptomining

    The Cryptocurrency Gold Rush Is Fueling New Cybercrime And Enterprise Risk

    March 30, 2018 Joseph Blankenship, Jeff Pollard, Josh Zelonis

    Cryptocurrency values have soared to astronomical, unsustainable, gold-rush levels, and like any gold rush, this one has attracted its share of bad actors and parasites. Cryptomining — adding transactions to a public ledger and releasing new currency — requires an enormous amount of compute power, so cybercriminals and other unscrupulous opportunists seek to use your enterprise compute power to unlock this wealth — at great expense and risk to you.

  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Vulnerability Risk Management, Q1 2018

    The 12 Providers That Matter Most And How They Stack Up

    March 14, 2018Josh Zelonis

    In our 22-criteria evaluation of vulnerability risk management (VRM) providers, we identified the 12 most significant ones — Beyond Security, BeyondTrust, Digital Defense, IBM, Kenna Security, NopSec, Qualys, Rapid7, Skybox Security, Symantec, Tenable, and Tripwire — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.

  • For Security & Risk Professionals

    REPORT: Now Tech: Endpoint Detection And Response, Q1 2018

    Forrester's Overview Of 26 EDR Providers

    February 1, 2018Josh Zelonis

    You can use endpoint detection and response (EDR) offerings to improve endpoint visibility, orchestrate threat remediation, and achieve superior threat hunting. But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security and risk professionals should use Forrester's Now Tech report to understand the value they can expect from an EDR provider and select vendors based on size and functionality.

  • For Security & Risk Professionals

    REPORT: Lessons Learned From The World's Most Notable Privacy Abuses And Security Incidents, 2017

    Continuous Improvement: The Data Security And Privacy Playbook

    January 23, 2018 Heidi Shey, Josh Zelonis

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and firms are still absorbing the costs. By reflecting on these incidents, we glean long-term lessons that help security and risk (S&R) pros improve their firm's overall security posture, its breach response, and its appreciation of privacy law and customer trust. To do this, each year we select and analyze notable incidents from the past 12 months to provide these critical lessons.

View all of Josh Zelonis's Research

Clients Who Work With Josh Zelonis Also Work With:

View all related analysts