Josh   Zelonis

Josh Zelonis

Senior Analyst Serving Security & Risk Professionals

Josh is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyberthreat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.

Previous Work Experience

Prior to joining Forrester, Josh accumulated over 13 years of experience as a security practitioner with demonstrated success in product architecture, engineering, and security assessment roles. As a product architect, Josh helped design and build innovative technologies in the breach detection space, architecting both endpoint and appliance products with a focus on data collection and analytics. His background also includes extensive experience in security assessment roles including red team, vulnerability research, and compliance.

Education

Josh holds a B.S. in computer science from the California State University, San Marcos.

Josh Zelonis

Senior Analyst Serving Security & Risk Professionals

Josh is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyberthreat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.

Previous Work Experience

Prior to joining Forrester, Josh accumulated over 13 years of experience as a security practitioner with demonstrated success in product architecture, engineering, and security assessment roles. As a product architect, Josh helped design and build innovative technologies in the breach detection space, architecting both endpoint and appliance products with a focus on data collection and analytics. His background also includes extensive experience in security assessment roles including red team, vulnerability research, and compliance.

Education

Josh holds a B.S. in computer science from the California State University, San Marcos.

Josh Zelonis's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: The State Of The Threat Intelligence Platform Market, Q3 2018

    A Market And Investment Review

    July 30, 2018Josh Zelonis

    As security and risk (S&R) pros adopt threat intelligence capabilities within their organizations, it becomes necessary to manage that intelligence using a threat intel platform (TIP). This report introduces the key features that define a TIP, insight into venture capital (VC) investment, and an overview of the most relevant players.

  • For Security & Risk Professionals

    REPORT: The Forrester Tech Tide™: Zero Trust Threat Prevention, Q3 2018

    Tools And Technology: The Security Architecture And Operations Playbook

    July 12, 2018 Amy DeMartine, Chase Cunningham, Joseph Blankenship, Josh Zelonis

    Zero Trust (ZT) threat prevention is increasingly critical to deny malicious attackers' access to enterprise assets. To accelerate their performance in ZT threat prevention, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support ZT threat prevention. Security pros should read this report to shape their firm's investment approach to these technologies.

  • For Security & Risk Professionals

    REPORT: Planning For Failure: How To Survive A Breach

    Organization: The Security Architecture And Operations Playbook

    July 6, 2018Josh Zelonis, Paul McKay, Jinan Budge, Heidi Shey

    Cybercriminals are using more-sophisticated attacks to steal valuable intellectual property and the personal data of your customers, partners, and employees. Their motivations run the gamut from financial to retaliatory. With enough time and money, they can breach the security defenses of even the largest enterprises. You can't stop every cyberattack. However, your customers expect you to respond quickly and appropriately. If you contain a breach poorly and botch the response, you will pay millions in remediation costs and lost business, and it will ruin your firm's reputation. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Endpoint Detection And Response, Q3 2018

    The 12 Providers That Matter Most And How They Stack Up

    July 5, 2018Josh Zelonis

    In our 20-criteria evaluation of endpoint detection and response (EDR) providers, we identified the 12 most significant ones — Carbon Black, Cisco Systems, CrowdStrike, Cybereason, Cylance, Digital Guardian, Endgame, ESET, FireEye, RSA, SentinelOne, and Symantec — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.

  • For Infrastructure & Operations Professionals

    REPORT: Ransomware Is A Business Continuity Issue

    Firms Are Just Not Prepared To Handle Cybersecurity-Induced Disasters

    May 22, 2018 Naveen Chhabra, Josh Zelonis

    Ransomware attacks hit firms hard on all fronts — the business, partners, clients, employees, and regulators. Successfully getting out of a ransomware situation requires I&O and S&R pros to work hand in hand. This report gives IT leaders a view of the state of readiness during ransomware attacks — and exposes the illusion of preparedness. It offers insights into why leaders should bridge the gap between S&R and I&O teams in their organization for the goal of a well-coordinated recovery.

View all of Josh Zelonis's Research

Clients Who Work With Josh Zelonis Also Work With:

View all related analysts