Greetings, and welcome to my Gartner blog! My name is Ben, and I’m the most recent addition to the Security & Risk Management Strategies team within Gartner for Technical Professionals (GTP). Yep, that’s the same team as Anton Chuvakin, Erik Heidt, and Ramon Krikken.
A Little About Me
I’m joining Gartner from the vendor space, where I worked as Principal Consultant for an IT GRC software company. Prior to that, I’ve held a wide variety of roles ranging from internal FTE doing systems and network administration, incident response, security testing and assurance, and overseeing security programs, to traditional audit and security consulting roles. My interests within security and risk management are very broad, including security program management, risk management, appsec, DevOps, and so on.
What I’ll Be Covering
It’s a bit early to start staking claims to topics as being my “coverage area” (the most popular question I’ve received thus far). I’m currently second chair on a NAC-related project where I’m paired with a mentor to learn the Gartner research process (we’re updated the paper “Architectural Alternatives for Enforcing Network Access Control Requirements” (G00227091)). Beyond that, discussions are ongoing about “what’s next” for my research agenda.
Missing Any Coverage?
There is an opportunity, as part of my onboarding and acclimation process, to help identify gaps in our existing coverage. As such, I wanted to provide you with the opportunity to comment. Bearing in mind that I’m on the GTP side of the research house, and thus not involved in the Magic Quadrants produced by Gartner for IT Leaders (ITL), are there topics that would benefit from our technical and architectural focus?
Thank you, and I look forward to sharing my thoughts with you here going forward!
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
Bring Your Own: come gestire dispositivi e app in modo sicuro?
Il trend del Bring Your Own continua a crescere, impattando sempre piu' il modo in cui le aziende devono implementare le proprie strategie...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.