Johna Till Johnson

About Johna Till Johnson

Johna Till Johnson is CEO and Senior Founding Partner of Nemertes Research, where she sets research direction and works with strategic clients. She has decades of experience in technology design, deployment, and operations. Under her leadership, Nemertes has emerged as a leading trusted advisor to Fortune-50 and other world-class organizations. Her recent work includes: Developing a next-generation network strategy for a Fortune-50 organization Architecting the data-center strategy and roadmap for a leading financial-services firm Developing a global WAN strategy for a pharmaceutical company Optimizing operations for a Global-2000 media firm Researching and writing a groundbreaking report correctly predicting today's Internet challenges A widely regarded expert, Johna regularly speaks at numerous trade shows, conferences, and seminars, including Navigator360, IDG’s IT Roadmap, and Interop. She also writes an incisive column in Network World.

Upcoming Webinar – Building a Risk-Based Business Case for Cybersecurity

By | |Free Report, Webinars, Security and Risk Management|

July 11, 2018 11am ET Register here Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk. But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they can build the [...]

Webinar Replay – Top Five Myths About Securing IoT

By | |Free Report, Webinars, Security and Risk Management, Internet of Things (IoT)|

Securing IoT isn't exactly like securing any other aspect of your infrastructure--but neither is it entirely different. Most companies, even leading-edge ones, are just beginning to figure this out, and are still struggling with putting in place an IoT security architecture, best practices, and framework. This webinar separates the myths from the realities of securing [...]

Emerging Technologies 2018

By | January 30th, 2018|Blog|

In January, I was delighted to have the opportunity to moderate a panel session on emerging technologies for the Wall St. Technology Association.  Nemertes does quite a lot of work with the WSTA, which is a networking and educational consortium serving (as you might expect) financial services firms. But this session was special, because the [...]

Webinar Replay – Crafting An Analytics-Based InfoSec Strategy

By | |Free Report, Webinars|

Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity. During this webinar we: Showcase the battle-tested strategies of the most successful information security organizations Survey the landscape of analytics-based security tools and solutions Walk through how to build a strategy based around current (and future) analytics and automation technologies Spotlight the critical security [...]

Webinar Replay – The Next-Generation Security Architecture: Zero-Trust and Defense-in-Depth

By | |Free Report, Webinars|

What is the Zero Trust security model and what should it mean to you? Learn about how leading-edge companies like Google and Amazon have re-invented cybersecurity, and in the process upended our most cherished beliefs about the roles of network access control (NAC), next-generation firewalls (NGFW) and more. You'll come away from this webinar with [...]

Crafting a Cybersecurity Incident Response Policy: Doing it Right

By | September 14th, 2017|Research, Security and Risk Management|

Download Report Executive Summary  Every organization needs a cybersecurity Incident Response Policy (IRP). But understanding what goes into one—even with the assistance of a framework such as that from the National Institute of Standards and Technology—can be a challenge. The best approach is to break down the IRP into discrete components and focus on the [...]

Webinar Replay- Crafting an Effective Incident Response Plan (IRP)

By | |Free Report, Webinars|

In today's cybersecurity environment, it's not if you'll be breached, it's when. Do you know how to respond to minimize damage, maintain brand strength, and shut down the intruders? This interactive Webinar walks participants through a step-by-step process for crafting an effective cybersecurity incident response plan (IRP). Whether your cybersecurity framework is based on NIST, [...]

HBO Hack Spotlights Need for Effective Incident Response Policy

By | July 31st, 2017|Blog|

HBO has confirmed that the company's internal sites have been broken into, and  that proprietary information (including reportedly scripts of upcoming episodes of the hit series "Game of Thrones") have been seized. According to an article in Variety, “HBO recently experienced a cyber incident, which resulted in the compromise of proprietary information,” the network said. [...]

Why Amazon Really Bought Whole Foods: Alexa, Make Me Dinner!

By | June 27th, 2017|Blog, Digital Transformation, Next-Generation Endpoints|

There's been a lot of buzz around Amazon's acquisition of Whole Foods. The upshot? Most pundits conclude that Amazon wants to enhance its ability to offer groceries online. That may be true, but we think it's far from the whole story. Our view is that Amazon's purchase is far more disruptive. Amazon's end game isn't [...]

Webinar Replay: Securing the Internet of Things

By | |Webinars, Security and Risk Management|

The Internet of Things (IoT) is one of the foundational technologies enabling Digital Transformation. But if you're like most organizations, you haven't even started to implement effective security for IoT. Find out the current state of IoT security from our hot-off-the presses benchmark and maturity model. And learn about the technologies and best practices that [...]