Sign in to view Jon’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Fort Collins, Colorado, United States
Sign in to view Jon’s full profile
Join with email or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
4K followers 500+ connections
Sign in to view Jon’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
4K followers 500+ connections
View mutual connections with Jon
Join with email or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Jon
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Join to view profile
Join with email
Sign in to view Jon’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Articles by Jon
- Access as a Service is a Growing Threat
Access as a Service is a Growing Threat
Recently Trend Micro researchers analyzed a new service offering in the undergrounds whereby malicious actors are…
26
- Celebrating My Work AnniversaryJul 17, 2020
Celebrating My Work Anniversary
Please bear with as I reminisce about my journey in cybersecurity and pardon the shameless plug for the company I'm…
137
27 Comments - Cybersecurity Awareness Month - My JourneyOct 1, 2019
Cybersecurity Awareness Month - My Journey
As we celebrate another cybersecurity awareness month, we wanted to build some awareness around the skills shortage by…
22
1 Comment
Activity
4K followers
No more previous content
- Jon Clay shared thisSharing a review of Q1'26 threat intelligence focused on the public sector, which confirms that this sector is among the hardest hit globally. The analysis reveals the challenges posed by financially motivated ransomware operators and nation-state APTs targeting government data exfiltration. TrendAI researchers are actively monitoring threat actors and underground activities to identify the latest trends affecting our public sector customers. This is part of our bi-weekly public sector blog series, so be sure to keep an eye out for new articles as we publish them. Enjoy the read and feel free to comment if you have questions or wish to discuss further and if you have any suggestions for future articles you'd like me to publish, let me know. #cybersecurity #cyberintelligence #publicsector
- Jon Clay shared thisAlways nice to have an article published on Security Boulevard and this one about AI Supply Chain risks could help you better understand this area of the AI stack. TrendAI was formed to help organizations manage this and other parts of AI security. Enjoy the read.Securing the AI Supply Chain: What are the Risks and Where to Start?Securing the AI Supply Chain: What are the Risks and Where to Start?
- Jon Clay posted thisI’m excited to share that I’ll be speaking at GovTech Singapore #STACKxCybersecurity2026! Happening 17 April 2026, the theme this year is “Creating a Trusted Digital Future Together.” In this session, we’ll move beyond the headlines to provide actionable guidance based on the latest research from TrendAI. We will deconstruct the vulnerabilities and emerging attack vectors unique to Agentic AI, while demonstrating the specific, critical logs that agencies and organizations should be monitoring to catch malicious activity in real-time using AI to fight AI. Join me and other practitioners as we discuss what the next frontier of digital trust can look like. Secure your seat now: https://lnkd.in/genQwrph #Cybersecurity #AI #TechEvent #GovTechSG
- Jon Clay shared thisTrendAI supports the new US national cyber strategy and we look forward to how this evolves over time. Our latest blog highlights the six pillars associated with the strategy and we'll be publishing additional blogs that go into more depth on each. Check it out. #cybersecurity #publicsector
- Jon Clay shared thisTrendAI researchers did a quick deep dive into what occurred with this Axios supply chain attack. Read up on the details in our latest blog.Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly DownloadsAxios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads
- Jon Clay posted thisI am pleased to participate as a speaker at the Phoenix Global Forum hosted by International Economic Forum of the Americas on May 13 at the Phoenix Convention Center. This year’s Forum will focus on the theme “Connect. Ignite. Transform.”, bringing together global leaders and experts to discuss the key challenges and opportunities shaping the international and regional economic landscape. I'll be on a panel, From Automation to Autonomy: The AI Industrial Shift, discussing with my fellow panelists how AI is disrupting things. Should be an excellent discussion. If you're in the area and can attend, would love to see you there. I'll have a lot to talk about as our TrendAI researchers are diving into #AI and how it is improving things.
- Jon Clay shared thisEnjoyed sharing my perspectives on the #cybersecurity industry and where things are going along with TrendAI direction to help customers become more resilient.The evolution of threat research: Looking beyond best-of-breed | Computer WeeklyThe evolution of threat research: Looking beyond best-of-breed | Computer Weekly
- Jon Clay shared thisWith the recent world events, this TrendAI research from a bit back is still very relevant for #CISO today. Feel free to share with your organization as it gives some very good ideas on how to navigate #cybersecurity during times of conflict. If you didn't read it when it was published, now's a good time: https://lnkd.in/gHy4V6xnCyber Considerations for Organizations During Times of ConflictCyber Considerations for Organizations During Times of Conflict
- Jon Clay shared thisTrendAI researchers reviewed the AI threat landscape from 2025 and share many of their findings in this new report. AI vulnerabilities is scaling up, underground markets are selling products and services around AI offerings. AI will help adversaries scale their attacks in 2026, this report gives you a good idea of where and how. Check it out.
No more next content
Jon Clay commented on a post 3w
Great seeing when Law enforcement can actually make arrests to get these criminals off the cyber streets. Congrats
Jon Clay commented on a post 1mo
Great to see you back Sanjay and I look forward to you growing our global partner business, which I know you'll do in no time. TrendAI is starting a new era in the cybersecurity industry and we have a great opportunity to change how our customers deal with adversaries.
No more previous content
- Jon Clay liked thisJon Clay liked thisLast night was the midnight marathon with the final lap of Q1 completed! Big shout out to Maranda McClure Ross Smith Stephanie Reinking Helaina Desimini!! Now I am coming up for air for a belated RSAC post! Best year yet for RSAC in San Francisco... the true highlight for me was—without a doubt—the connections. It was incredible to see Trenders in action for our official launch of TrendAI come to life! Whether it was catching up with cherished "OG" partner friends, strengthening recent ties, or the instant common ground conversations at the hotel breakfast counter forming new connections... the conference brought us all together! Nothing beats human connections! I want to thank Gregory Davis Chris Lafleur for their service... we learned a very special tradition from WW II that was reestablished in 2009 at "Top of the Mark" on Nob Hill called the "Squadron Bottle" (see photo) for service women and men to leave a bottle with a journal note in care of the bartender for the next to enjoy a drink. David Downs, Greg, Chris and I enjoyed seeing the history and tradition and reading the personal notes or sisterhood and brotherhood while Greg and Chris wrote their own. Both of my grandfathers served in WW II and grateful for the deep sacrifices our service members make. #RSAC2026 #CyberSecurity #TrendAI #SquadronBottle #Channel #Gratitude
- Jon Clay liked thisJon Clay liked thisPawn Storm is one of the top tier Russian-aligned APT groups, with decades of experience of attacks on the west In this TrendAI research by Feike Hacquebord and Hiroyuki Kakara they look at how the group is using their PRISMEX malware suite to target Government and Critical Infrastructure Entities Key takeaways: - Prolific Russia-aligned Advanced Persistent Threat (APT) group Pawn Storm has been using PRISMEX, a collection of interconnected malware components to target the defense supply chain of Ukraine and its allies including Czech Republic, Poland, Romania, Slovakia, Slovenia, and Turkey. - PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command and control. - Pawn Storm actively exploited multiple vulnerabilities, including a confirmed Windows zero-day (CVE-2026-21513). The .lnk files retrieved via CVE-2026-21509 (a security feature bypass vulnerability in the Microsoft Office Object Linking and Embedding (OLE) mechanism) may chain with CVE-2026-21513 (a Protection mechanism failure in MSHTML Framework) based on shared command-and-control infrastructure identified by Akamai, though TrendAI™ Research has not independently confirmed this linkage. - Infrastructure preparations was observed to have begun two weeks before the CVE-2026-21509 disclosure, indicating advance knowledge. - Both espionage and potential sabotage functionality were observed, including wiper commands. - This blog provides risk management guidelines that organizations can follow to protect against the cyber threat discussed in this blog. TrendAI Vision One™ detects and blocks the IoCs provided at the end of this blog. TrendAI customers can also access tailored hunting queries, threat insights, and intelligence reports to better understand and proactively defend against this campaign. https://lnkd.in/ekdutMTDPawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure EntitiesPawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities
- Jon Clay liked thisJon Clay liked thisAfter almost 16 wonderful years with Trend, the time has come for me to say thank you and goodbye as I prepare to return home to the UK. It’s hard to put into words what this journey has meant. What I will miss most are the people. The collaboration, the energy, and the shared commitment to doing great work have made these years truly memorable. I feel incredibly fortunate to have worked alongside such talented colleagues and leaders across regions, cultures, and teams — many of whom have become friends. There are far too many people to thank individually after such a long journey, but I’m especially grateful to Kevin Simzer for his partnership, leadership, and support over the years. I’ve learned a great deal from working together and truly valued the opportunity to contribute alongside him. Trend has been more than a role; it has been a community and an important part of my life for a long time. Together we’ve navigated growth, change, challenges, and successes, and I feel privileged to have been part of such a special organisation. To everyone I’ve had the privilege to work with along the way — thank you. I hope our paths cross again, and I look forward to staying in touch. As I make the move back to the UK, I’m carrying with me many great memories and friendships that I value enormously.
- Jon Clay liked thisJon Clay liked thisI’m thrilled to share that I’m joining Cloudflare! This is an exciting next chapter, and I couldn’t be more grateful for the opportunity to work with such an innovative company that’s making the Internet more secure and faster for everyone. A huge thank you to everyone involved in the interview process — especially my new manager Dominic, Chris from recruitment, and the HR team for their support and guidance. I also want to mention that my meeting with Mike was incredibly positive — I really appreciated the message he shared and the perspective he brought to our conversation. I’m especially looking forward to working with Aaron, who has already been super helpful and responsive to all my questions, and big thanks as well to Todd, who’s always provided great support and guidance. Excited to begin this journey and contribute to Cloudflare’s mission. Let’s make great things happen! 🌍⚡
- Jon Clay liked thisJon Clay liked thisAn interesting Ransomware development with the creation of the Leak Bazaar service (https://lnkd.in/erzTwsTq). This business pitches itself as a data-processing business, taking in dumps from Ransomware groups and processing them with a mixture of generative AI, machine learning, and hard-coded algorithms. The goal is to filter down the stolen data to the most valuable files for the criminals to monetise separately, or use as part of the extortion. This is exactly what we flagged as an upcoming threat in the TrendAI VibeCrime research from November 2025 by Stephen Hilt and myself (https://lnkd.in/ezwQgE_s , see Case Study 1 on page 13). We even built our own internal POC - although as expected the criminal versions go beyond this in terms of features. Cybercrimes embracing of the power of AI, and Agentic AI in particular, will continue to radically re-define the next decade of the ecosystem. One of the best tools to prepare for that is knowledge. I can genuinely recommend our VibeCrime paper as a still very relevant document, and also a big fan of news.aatf.ai for keeping up to date on all the latest AI developments.The Next Phase of Cybercrime: Agentic AI and the Shift to Autonomous Criminal OperationsThe Next Phase of Cybercrime: Agentic AI and the Shift to Autonomous Criminal Operations
- Jon Clay liked thisJon Clay liked thisThis year at RSAC felt different. I barely touched the show floor. I didn’t need to. Back-to-back conversations with customers, partners, analysts, and industry friends made one thing very clear: AI is not coming. It is already here, and it is accelerating fast. What stood out most wasn’t just the technology. It was the ecosystem. Long-time partners and a new generation of AI-native players were in the same room, building toward the same future. Less silo. Less noise. Less fighting for credit. More alignment. More urgency. More momentum. Customers and partners flew in from all over the world — showing up, aligned, ready to build together. That kind of trust doesn’t happen overnight. Around 6,000 employees across 75 countries. Customers across 185 countries. Governments in more than 100 countries — protected by TrendAI. That global strength showed up in every conversation at our TrendAI space this week. Different regions. Different perspectives. One direction. The conversations weren’t theoretical. They were specific. Urgent. Aligned. We’re building it — together with our customers and partners, from the front. TrendAI is leading AI security. Let’s go. 🚀
- Jon Clay liked thisPleased to welcome Dr. Thomas Ulmer to Magna AI as Engagement Director, Business Impact & Value Engineering. Thomas brings a strong combination of strategy, finance, and entrepreneurial experience, with a clear focus on translating advanced AI capabilities into measurable business outcomes. This role is critical as we continue strengthening our ability to connect AI investments to real operational value, disciplined prioritization, and tangible ROI for our customers. Looking forward to the impact he will help drive as we continue building Magna AI as a trusted partner for enterprise and sovereign AI transformation. Welcome to the team, Thomas. #MagnaAI #ArtificialIntelligence #ValueEngineering #AITransformation #BusinessImpactJon Clay liked thisWe are pleased to announce that Dr. Thomas Ulmer has joined Magna AI as Engagement Director, Business Impact & Value Engineering. With a strong background in strategy, finance, and entrepreneurship, Dr. Thomas brings extensive experience helping organizations translate complex technologies into clear business outcomes. In his role, he will work closely with clients to ensure AI initiatives deliver measurable impact and strategic value. We’re excited to welcome Dr. Thomas to the team and look forward to the contributions he will bring as Magna AI continues helping organizations unlock the full potential of AI. #MagnaAI #ArtificialIntelligence #BusinessImpact #ValueEngineering
No more next content
Volunteer Experience
-
Cub Scout Den Leader
Boy Scouts of America
- 5 years 3 months
Den Leader for my son's cub scout pack. Tiger, Wolf, Bear, Webelo I & II den leader. Started with 9 scouts and ended with 5 scouts achieving Arrow of Light.
-
Coach
Little League Baseball
- 1 year 3 months
Coached my son's little league baseball team for 2 summers. Had a lot of fun teaching the boys the fundamentals of baseball.
-
Speaker for Internet Safety for Kids & Family program
Trend Micro
- Present 11 years 4 months
Science and Technology
Provide support for the Trend Micro Internet Safety for Kids & Family which looks to teach students in K-12, teachers, and parents about being safe online.
-
Mentor
CyberPeace Institute
- Present 1 year 4 months
Science and Technology
Helping this organization improve their messaging and marketing of their brand and services.
Recommendations received
-
LinkedIn User
“Jon has the great ability to not sweat the small stuff which is a trait of an Executive. He knows how to motivate without pressuring. He's a man of few words and when words are spoken, his assessments are often true. He holds deep technology expertise and is very accurate when communicating to the market; Jon does not oversell or mislead with semi-truths which translates immediately into credibility. He is a very positive person and isn't into conflict. His assessments of timing and quality of delivery are most often realistic which adds to make working with Jon a pleasurable experience. I found his decisions most often fair and always within company guidelines. I'd definetly put him in front of customers, press and analysts as he's a true positive asset to his company's brand. Jon and I colaborated very closely on a video project so I can also say he looks great on camera! It was a pleasure working with Jon and I hope to again soon.”
2 people have recommended Jon
Join now to viewView Jon’s full profile
- See who you know in common
- Get introduced
- Contact Jon directly
Explore more posts
-
Yew Kuann CHENG (YK)
PCI Security Standards Council • 5K followers
𝗔𝗿𝗲 𝗵𝗼𝘁𝗲𝗹𝘀 𝘂𝗻𝗱𝗲𝗿 𝗮𝘁𝘁𝗮𝗰𝗸? For my next post highlighting sponsors of the PCI AP and EU Community Meetings (CM), I am featuring VikingCloud. https://lnkd.in/gXvJnNm5 Thank you to the VikingCloud team! I appreciate you signing up as the: (a) Premium Sponsor (the highest tier!) covering the Vendor Showcase at the North America Community Meeting; (b) Platinum Sponsor (top sponsor) covering the Welcome Reception at the Europe Community Meeting; and (c) Support Sponsor covering the coffee sleeves at the AP Community Meeting. PCI events are expensive to host and your sponsorships help us to offset the cost of the events! Hotels are an obvious target because they are a major merchant category, highly visible and accept lots of payments, both online and in-person. Based on VikingCloud’s 2025 State of Hospitality Cyber Report, 66% of hotel IT and cybersecurity leaders report more frequent cybersecurity attacks and 50% said that the attacks are more severe. Download the report here: https://lnkd.in/gggJdvKd Last week, I received an email from a leader of a hotel belonging to a large hotel chain. He has received notification to submit their PCI DSS documentation and the leader has no idea what to do… 🤷♂️ If you operate a business that must adopt PCI DSS, do send your staff for training or engage someone who can help you. PCI conducts many in-person and virtual trainings through the year. Look into the PCI ISA (Internal Security Assessor) or PCIP (PCI Professional Training) trainings. https://lnkd.in/gcA4hPxS And there are many PCI QSA (Qualified Security Assessors) around the world who can assist you. QSAs are independent cybersecurity companies who perform PCI DSS security assessments. They are trained and licensed by PCI Council. https://lnkd.in/gpH8V7Cp If you do not have the expertise to manage the compliance or protect your systems (and your brand reputation), do get help. VikingCloud cited that more than 80% of hotels were able to resolve incidents within 12 hours when they engaged an MSSP. Thanks for sharing your insights, VikingCloud! As a PCI GEAR (Global Executive Assessors Roundtable) member representing the PCI assessor community, do share these insights with the PCI leaders during your quarterly meetings to influence and improve PCI standards. Disclaimer: PCI Council is a neutral body and my personal post is not an endorsement of any organization or solution. PCI Security Standards Council #pcissc #pcicommunity #pcidss #pcidssv4 #datasecurity #cybersecurity #payments #paymentsecurity Video credit: Thank you Canva for your platform and the royalty-free video.
23
3 Comments -
Corero Network Security
7K followers
🚨 Just released: Corero’s 2025 Threat Intelligence Report 🚨 DDoS atacks are no longer just big floods.They're frequency, evasion, and protocol pivoting. Key insights: • 11 attacks/day avg. in 2024 • Mid-size attacks declining • Multi-vector attacks on the rise Read the release: https://bit.ly/44kLkn0
15
-
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
6
1 Comment -
Raj Soni, CISM
2K followers
Learn how to establish a robust Data Loss Prevention (DLP) program. Start by exploring the DLP strategy and maturity model to understand the key components. Then, take the next step and book an appointment for personalized guidance to tailor the program to your specific needs.
3
-
Jonathan Risto P. Eng
Most exposure programs don’t… • 3K followers
I’ve been thinking about exposure management less as a tooling problem and more as a systems problem. When discovery grows faster than mobilization capacity, exposure doesn’t just increase — it compounds. That accumulation is exposure debt.
16
2 Comments -
CYBER DEFENSE MAROC
863 followers
Not all alerts are created equal. Master alert triage by focusing on context: asset criticality, attack vector, and threat intelligence. Prioritize what threatens your crown jewels first, then tackle the noise. Efficient triage = faster response, less burnout. Your SOC’s secret weapon? Smarter, not harder. 🔍 #Cybersecurity #AlertTriage
-
Raj Samani
Rapid7 • 17K followers
Exploitation timelines are increasingly measured in days rather than weeks. Our latest report from Rapid7 Labs correlates vulnerability publication data, confirmed exploitation trends, frontline MDR incident response telemetry, and dark web, cybercrime, and nation-state intelligence to provide a unified view of how exposure evolves into compromise. One of the biggest standouts: how rapidly AI is being integrated into attacker playbooks, accelerating the operationalization of exposure. Many of the incidents we investigate still originate from known, unaddressed exposure. In those cases, attackers don’t need sophistication - they need opportunity. As remediation windows shrink, reducing that opportunity becomes essential to limiting compromise. You can download the 2026 Global Threat Landscape report here: https://r-7.co/4bQOAtq #infosec #cybersecurity
37
1 Comment -
John Van Blaricum
Beazley Security • 3K followers
Beazley Security's Security Posture Reports are used to assess risk in underwriting but are now available to any organization to provide a point in time view of their external attack surface. Learn how you can access at: https://lnkd.in/gwbMXWsb. Next up, we're going to make this functionality continuous and available as service through the VERACIS™ client portal.
36
-
Daniel Scott
CDN Partners, Inc. • 196 followers
We help you cut through the noise when choosing the right Managed Detection and Response (MDR) solution. Get the clarity you need. This MDR Buyer's Guide slices through the noise and delivers straight answers. It covers: -The essential services an MDR provider should offer -The superior outcomes you should expect from a best-in-class MDR service -Top questions to ask a potential MDR provider -An introduction to Sophos MDR, the world’s highest-rated and most-reviewed MDR service Download the guide and take the first step toward smarter protection: https://lnkd.in/eM9Pn4n6
3
1 Comment -
David Townsend
Corporate Information… • 7K followers
✳️DFARS Update Alert ✳️ DoW’s new class deviation (DARS 2026‑O0025) reorganizes—not expands—cybersecurity requirements. DFARS Part 240 and new clause 252.240‑7997 now centralize NIST SP 800‑171 Medium/High assessment access, precedence, and SPRS posting when the deviation is used. Key point: 7012, 7008, and all CMMC requirements remain fully in force. CMMC Level 2 (Self) is not eliminated. What changes is how DoW manages and prioritizes its own NIST 800‑171 assessments At CorpInfoTech, we closely track regulatory changes to help defense contractors navigate compliance with confidence and strengthen their security posture. DFARS Assessment Changes Explained: Practical Impacts for Contractors https://hubs.li/Q042vp4Q0 #CMMC #DefenseContractors #DFARS #NIST800171 #DoW #DoD #DiB
4
-
Ankita Dutta
OPSWAT • 2K followers
Manufacturing cybersecurity requires approaches that account for operational continuity as much as threat prevention. This OPSWAT webinar explores how proven technologies are deployed to protect industrial systems from file-based threats while allowing organizations to maintain safe and uninterrupted production.
3
-
Mark Oliver
Group Oliver • 3K followers
Cyber attackers are NOT slowing down. Is your security team keeping up? This report from eSentire lays out 5️⃣ strategic steps to help security leaders stay ahead of shifting threats. Download the report to get expert advice on how to reduce alert fatigue, improve visibility, and build smarter defenses. 🛡️
-
Sion Retzkin
Pentera • 4K followers
𝗠𝗼𝘀𝘁 𝗰𝘆𝗯𝗲𝗿 𝗿𝗶𝘀𝗸 𝗮𝘀𝘀𝗲𝘀𝘀𝗺𝗲𝗻𝘁𝘀 𝘀𝘁𝗮𝗿𝘁 𝘄𝗶𝘁𝗵 𝗮𝘀𝘀𝗲𝘁 𝗶𝗻𝘃𝗲𝗻𝘁𝗼𝗿𝗶𝗲𝘀 & 𝗰𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 𝗰𝗵𝗲𝗰𝗸𝗹𝗶𝘀𝘁𝘀 - 𝗯𝘂𝘁 𝗱𝗼𝗻’𝘁 𝗽𝗿𝗼𝘃𝗲 𝘄𝗵𝗲𝘁𝗵𝗲𝗿 𝗱𝗲𝗳𝗲𝗻𝘀𝗲𝘀 𝘄𝗼𝘂𝗹𝗱 𝗵𝗼𝗹𝗱 𝗮𝗴𝗮𝗶𝗻𝘀𝘁 𝗿𝗲𝗮𝗹 𝗮𝘁𝘁𝗮𝗰𝗸𝗲𝗿𝘀. Gartner’s Threat-Informed Defense Effectiveness (TiDE) reframes cyber risk, helping leaders base decisions on how attackers actually operate - by validating end-to-end scenarios across protect, detect, respond, and recover (PDRR), not relying on assumptions. Download the complimentary Gartner® TiDE report and see how security teams are building cyber resilience through proof: https://okt.to/FeVH3l Gartner
13
-
Van Lurton
3K followers
Overview of the 2025 SANS State of ICS/OT Security Survey The report’s clear message: Treat compliance as a baseline, not the goal. Prioritize visibility, faster remediation Key Findings (Direct from the Report) Incidents remain high and disruptive: 22% of organizations reported a cybersecurity incident in the past 12 months. – 40% caused operational disruption. – Nearly 20% took over a month to remediate (3% took over a year). – Top causes: Unauthorized external access (50%), ransomware (38%). Detection is improving, but recovery lags: – ~50% of incidents detected within 24 hours. – 60% contained within 48 hours total. – Remediation still takes days/weeks on average — a persistent weak spot. Regulation drives maturity: Regulated sites had the same incident rate as unregulated peers but experienced ~50% fewer financial losses and safety impacts. Threat intelligence pays dividends: 67% of organizations use it (mostly vendor feeds, government sources, and ISACs). Those who do are far more likely to improve monitoring, segmentation, and detection. Remote access remains a top risk: It accounted for half of all incidents, yet only 13% of organizations have fully implemented advanced controls (e.g., session recording, ICS/OT-aware access, real-time approvals). Preparedness is uneven: Only 14% feel fully prepared for emerging threats. However, organizations that include frontline technicians in exercises are 1.7× more likely to report strong readiness. Investment momentum is clear: Asset visibility, threat detection, and secure remote access dominate both 2025 deployments and 2026–2027 plans. Additional Notable Insights Incident Response (IR): 57% now have a dedicated ICS/OT IR plan (70% at regulated + threat-intel sites). Testing is increasing (25% quarterly). Those who test regularly also run more realistic drills (red/purple team, operational exercises). Visibility & Detection: Only 13% have full ICS Cyber Kill Chain visibility. 49% use some ICS/OT-specific detection, but just 26% rate it “highly effective.” Cloud monitoring is patchy (only 13% fully integrated). Future Threat Outlook: Respondents see rising risks to edge/IoT devices (60%), legacy systems (54%), and cloud-connected OT (53%). Ransomware targeting OT is the #1 scenario considered in planning (72%). Purdue Model Gaps: Detection is strongest at higher levels (Level 4/3); visibility drops sharply at Level 2, Level 1, and especially remote/field sites. Resilience & Culture: Cybersecurity is still only partially integrated into business continuity/disaster recovery plans for most organizations. Stronger culture (IT–OT–leadership alignment) is clearly linked to having an ICS-specific IR plan. Who’s Ahead? Fully prepared organizations (the top 14%) share traits: full Kill Chain visibility, advanced remote-access controls, active information sharing, and heavy involvement of field technicians/engineers in exercises. https://www.sans.org
5
-
Upa Campbell
Accurics • 3K followers
⚠️ Exposure Management is a critical aspect of any strong security program, but simply having a list of vulnerabilities isn't enough. That’s because attackers aren’t just looking for a single vulnerability. They’re looking for "toxic combinations," which are recipes for exploitation. Claroty xDome’s Exposure Scenarios provides an attacker's view of your environment, eliminating toxic combinations and delivering actionable risk reduction recommendations. Find out more: https://gag.gl/2QbFEJ #ExposureManagement #Claroty #xDome
3
-
Adam Shnider
Coalfire • 3K followers
✴️ 10 years. That’s the offline retention requirement CMS is now pointing to for business audit records, tied to 45 CFR §155.1210 guidance. This isn’t just “keep logs longer.” It’s “design your environment to retain, protect, and produce records on demand.” Ian Walters Principal at Coalfire explains the v1.04 updates and how to get ahead of them. 👉 Read now: https://ow.ly/hXzZ50XVCiw #Healthcare #RegulatoryCompliance #GRC #Cybersecurity #Audit
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Jon Clay in United States
-
Jon Clay
Omaha Metropolitan Area -
Jon Clay
Orange County, CA -
Jon Clay
Bossier City, LA -
Jon Clay
New York, NY
119 others named Jon Clay in United States are on LinkedIn
See others named Jon Clay