Johna Till Johnson

About Johna Till Johnson

Johna Till Johnson is CEO and Senior Founding Partner of Nemertes Research, where she sets research direction and works with strategic clients. She has decades of experience in technology design, deployment, and operations. Under her leadership, Nemertes has emerged as a leading trusted advisor to Fortune-50 and other world-class organizations. Her recent work includes: Developing a next-generation network strategy for a Fortune-50 organization Architecting the data-center strategy and roadmap for a leading financial-services firm Developing a global WAN strategy for a pharmaceutical company Optimizing operations for a Global-2000 media firm Researching and writing a groundbreaking report correctly predicting today's Internet challenges A widely regarded expert, Johna regularly speaks at numerous trade shows, conferences, and seminars, including Navigator360, IDG’s IT Roadmap, and Interop. She also writes an incisive column in Network World.

Webinar Replay – Next-Generation Cybersecurity Architecture

By | |Free Report, Webinars, Security and Risk Management|

You've got firewalls, anti-malware, next-generation endpoint security, and NAC. You're rolling out CASB and analytics, and extending protection to cloud, mobile, and IoT resources. But how does it all come together? This webinar reveals what a next-generation security architecture looks like--and which technologies, and vendors, should be part of it. (View below...)

Webinar Replay – Cybersecurity Maturity: How Does Your Financial Firm Stack Up?

By | |Free Report, Webinars, Security and Risk Management|

Like most cybersecurity professionals, you probably think you do a pretty good job. But how good? After viewing this Webinar, you won't need to ask. We share a clear framework and interactive self-assessment that enables you to quickly and accurately score the maturity of your cybersecurity initiative--and compare yourself to other financial services firms. We [...]

Webinar Replay – Building a Risk-Based Business Case for Cybersecurity

By | |Free Report, Webinars, Security and Risk Management|

Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk. But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they can build the case for cybersecurity tools, staffing, and initiatives [...]

Webinar Replay – Top Five Myths About Securing IoT

By | |Free Report, Webinars, Security and Risk Management, Internet of Things (IoT)|

Securing IoT isn't exactly like securing any other aspect of your infrastructure--but neither is it entirely different. Most companies, even leading-edge ones, are just beginning to figure this out, and are still struggling with putting in place an IoT security architecture, best practices, and framework. This webinar separates the myths from the realities of securing [...]

Emerging Technologies 2018

By | January 30th, 2018|Blog|

In January, I was delighted to have the opportunity to moderate a panel session on emerging technologies for the Wall St. Technology Association.  Nemertes does quite a lot of work with the WSTA, which is a networking and educational consortium serving (as you might expect) financial services firms. But this session was special, because the [...]

Webinar Replay – Crafting An Analytics-Based InfoSec Strategy

By | |Free Report, Webinars|

Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity. During this webinar we: Showcase the battle-tested strategies of the most successful information security organizations Survey the landscape of analytics-based security tools and solutions Walk through how to build a strategy based around current (and future) analytics and automation technologies Spotlight the critical security [...]

Webinar Replay – The Next-Generation Security Architecture: Zero-Trust and Defense-in-Depth

By | |Free Report, Webinars|

What is the Zero Trust security model and what should it mean to you? Learn about how leading-edge companies like Google and Amazon have re-invented cybersecurity, and in the process upended our most cherished beliefs about the roles of network access control (NAC), next-generation firewalls (NGFW) and more. You'll come away from this webinar with [...]

Crafting a Cybersecurity Incident Response Policy: Doing it Right

By | September 14th, 2017|Research, Security and Risk Management|

Download Report Executive Summary  Every organization needs a cybersecurity Incident Response Policy (IRP). But understanding what goes into one—even with the assistance of a framework such as that from the National Institute of Standards and Technology—can be a challenge. The best approach is to break down the IRP into discrete components and focus on the [...]

Webinar Replay- Crafting an Effective Incident Response Plan (IRP)

By | |Free Report, Webinars|

In today's cybersecurity environment, it's not if you'll be breached, it's when. Do you know how to respond to minimize damage, maintain brand strength, and shut down the intruders? This interactive Webinar walks participants through a step-by-step process for crafting an effective cybersecurity incident response plan (IRP). Whether your cybersecurity framework is based on NIST, [...]

HBO Hack Spotlights Need for Effective Incident Response Policy

By | July 31st, 2017|Blog|

HBO has confirmed that the company's internal sites have been broken into, and  that proprietary information (including reportedly scripts of upcoming episodes of the hit series "Game of Thrones") have been seized. According to an article in Variety, “HBO recently experienced a cyber incident, which resulted in the compromise of proprietary information,” the network said. [...]