Security leadership rarely breaks down because teams don’t care, or because they can’t see the risks coming. It breaks down because the environment changes faster than most organisations can adapt. Cloud estates keep expanding. Access spreads across platforms and partners. AI adds new speed, new uncertainty, and new ways for mistakes to scale. Meanwhile, the expectation is still the same: protect the business, keep it moving, and don’t slow anyone down.

That’s a hard line to hold when security is no longer confined to one team, one platform, or one clean perimeter. It now shapes how data is accessed, how people work, how software is deployed, and how trust is maintained across the business. A security decision can affect customer experience, compliance posture, operational resilience, and delivery speed all at once. Which means the pressure is no longer just technical. It’s organisational.

em360tech image

This is where the right analysts still matter. Not because they can hand leaders a neat answer to every messy problem, but because they help make those problems easier to name. They help leaders spot patterns sooner, understand where trade-offs are forming, and see which decisions are likely to create more friction, exposure, or rework later. In a space full of noise, that kind of clarity is still worth paying attention to.

Why Enterprise Security Leaders Still Rely on Analysts

Enterprise leaders don’t turn to analysts to find out that threats exist or that security markets are crowded. They turn to them when the path forward is unclear, the stakes are high, and the decision in front of them cuts across more than one team.

That’s because modern security rarely lives in one place. Identity affects access. Cloud architecture affects visibility. SaaS adoption changes control. AI changes risk. Data governance affects what can be seen, shared, or protected. Endpoint decisions influence resilience. Each domain comes with its own language, tooling, and ownership model, but the consequences don’t stay neatly contained. They spill into each other fast.

That fragmentation is part of the problem. Security, IT, data, compliance, and business teams often carry different responsibilities, different incentives, and different definitions of what “good” looks like. So when something stalls or fails, the root cause is often less dramatic than people assume. It’s not always a bad product choice or a missed alert. Sometimes it’s muddled ownership. Sometimes it’s poor sequencing. Sometimes it’s a control model that made sense in isolation and caused friction everywhere else.

That matters because most security failures in large organisations are not purely technical failures. They’re operating failures. They happen when visibility is uneven, when trade-offs are made too late, or when one part of the business moves ahead without understanding what the rest of the system now has to absorb. The analysts leaders keep returning to are the ones who understand that reality. They don’t just describe what’s changing. They help leaders make decisions that are easier to defend, operationalise, and live with once the slide deck is gone.

How This List Was Curated

Every analyst on this list has built enterprise credibility over time. That credibility comes from the roles they’ve held, the organisations they’ve advised, the research they’ve led, and the consistency of their thinking across a market that changes quickly and rarely gets simpler.

Each one is also closely associated with a clear security problem space. In some cases that’s identity, trust, and access. In others it’s cloud security, exposure management, cyber risk, threat intelligence, governance, or the wider operating pressures shaping security leadership in 2026. The point was not to find people who comment on everything. It was to identify analysts whose work stays useful when a specific security challenge becomes urgent.

Visibility alone wasn’t enough. This list prioritises depth, consistency, and practical relevance over profile. These are analysts whose work shows up in enterprise conversations for a reason. It holds up when the discussion moves past trend-watching and into real decisions about risk, control, resilience, and scale.

The Analysts Enterprise Leaders Should Be Following

The names below are listed alphabetically, not ranked. Each analyst brings a different lens to the security conversation, and that’s the point. Enterprise leaders aren’t looking for ten versions of the same perspective. They’re looking for people whose thinking helps them make better calls in the areas that matter most right now.

Alejandro Leal

Headshot of analyst Alejandro Leal with EM360Tech-branded background and text identifying him as a Senior Analyst specialising in cybersecurity, identity and access management, and AI at KuppingerCole Analysts.

Alejandro Leal is a Senior Analyst at KuppingerCole, where he focuses on cybersecurity with a strong emphasis on identity and access management. His work sits at the intersection of identity, digital trust, and modern security architecture, shaped by advisory work, research, and ongoing engagement with enterprise security leaders.

His core focus is identity as a security control layer, spanning access, authentication, governance, and the growing risk introduced by non-human and autonomous identities. That’s where his thinking tends to resonate most with organisations trying to move beyond fragmented IAM programmes.

What they are known for and why they matter to enterprise security leaders

Leal’s work becomes most relevant when identity starts to break out of its traditional boundaries. That usually happens in environments where access is no longer limited to employees, but extends to partners, customers, workloads, and increasingly AI-driven agents, all operating with different levels of visibility and control.

He consistently reframes identity as a leadership problem rather than a tooling problem. The focus shifts from managing credentials to understanding how access is granted, monitored, and governed across the organisation. His work around Identity Threat Detection and Response (ITDR) reflects that shift, positioning identity as both a primary attack surface and a critical layer for detecting and responding to threats.

That matters because when identity is treated as a disconnected function, control quickly erodes. Policies become inconsistent, visibility drops, and response slows down. Over time, that creates an environment where organisations can’t confidently answer a simple question: who or what has access, and why?

Where their insights are most valuable

Leal’s insights tend to land strongest in organisations dealing with distributed access, hybrid environments, and growing identity complexity. That includes teams working to modernise IAM, strengthen governance, or manage access across cloud, SaaS, and on-prem systems without losing control.

His work often addresses identity as a central control plane, the need for unified visibility across identities, and the security implications of non-human and autonomous actors. He also returns often to the balance between stronger security and practical usability, especially in areas like passwordless authentication and identity verification.

A clear example is the Security Strategist episode “Why AI Agents Demand a New Approach to Identity Security”, where he explores how AI agents introduce a new class of identities that don’t fit existing governance models. It’s one example of a broader pattern in his work, which centres on adapting identity security to match how access actually works today.

His perspective is especially useful for CISOs, IAM leaders, and security architects working to reduce identity silos, improve visibility, and build more consistent access control across complex environments.

Check out Alejandro Leal on LinkedIn

Brad LaPorte

Headshot of Brad LaPorte with EM360Tech-branded background and text describing him as a Gartner veteran, keynote speaker, and advisor to startups, private equity, and venture funds.

Brad LaPorte is Chief Marketing Officer at Morphisec, a Lionfish Tech Advisor and a former Gartner analyst with deep roots in enterprise cybersecurity strategy. His work spans vendor-side leadership, analyst research, and advisory, which gives him a clear view of how security decisions play out both in theory and in real environments.

His core focus is exposure-led security, looking at how organisations reduce risk before attackers can act, rather than relying too heavily on detection and response after the fact.

What they are known for and why they matter to enterprise security leaders

LaPorte’s perspective becomes most relevant when security teams start questioning whether more detection is actually making them safer. Many organisations now have strong visibility and response capabilities, but still find themselves dealing with the same types of incidents, often with little reduction in overall risk.

His work pushes that conversation forward. Instead of asking how quickly threats can be detected, he focuses on how exposure can be reduced earlier in the attack path. That shifts the discussion toward prioritisation, context, and understanding which weaknesses are most likely to be exploited in the first place.

That matters because detection-heavy strategies tend to create operational strain without solving the root problem. Teams deal with high alert volumes, security operations become reactive, and it becomes harder to show that risk is actually being reduced. Over time, that weakens both resilience and confidence in the security programme.

Where their insights are most valuable

LaPorte’s insights are particularly useful in environments where security teams are under pressure to show measurable risk reduction. That includes organisations dealing with alert fatigue, service providers refining their security models, and leadership teams trying to balance prevention, detection, and response more effectively.

A strong example is the EM360Tech article “Detection Alone Is Failing MSSPs, which looks at how managed security providers are reaching the limits of detection-led approaches. While the focus is on MSSPs, the underlying point applies more broadly. If security starts too late, teams end up chasing threats instead of reducing exposure.

That same thinking extends into wider discussions around exposure management, resilience, and the role of prevention in modern security programmes. His perspective is especially useful for CISOs, SOC leaders, and organisations trying to move from reactive operations to a model that reduces risk earlier and more consistently.

Check out Brad LaPorte on LinkedIn

Chris Steffen

Headshot of cybersecurity analyst Chris Steffen with EM360Tech-branded background and text highlighting his role as a Zero Trust advocate, technology evangelist, and analyst at Enterprise Management Associates.

Chris Steffen is Vice President of Research at Enterprise Management Associates (EMA), where he leads research across cybersecurity, risk, and IT operations. His background spans enterprise IT, security operations, and advisory work, which gives his analysis a grounded view of how security decisions play out beyond theory.

His core focus sits around operational security, particularly how organisations turn security controls, data, and tooling into something that actually works at scale.

What they are known for and why they matter to enterprise security leaders

Steffen’s work becomes most relevant when security teams are struggling to connect strategy with execution. Many organisations have the right tools and frameworks in place, but still find that security doesn’t translate cleanly into day-to-day operations.

He focuses on that gap. His work consistently brings attention back to how security operates in practice, whether that’s within the Security Operations Centre (SOC), across IT teams, or in environments where data, infrastructure, and security responsibilities overlap. The question shifts from what should be done to what can realistically be sustained.

That matters because when security is not operationalised properly, even strong strategies start to break down. Controls become inconsistent, visibility gaps grow, and teams spend more time reacting than improving. Over time, that leads to inefficiency, higher risk, and a growing disconnect between leadership expectations and operational reality.

Where their insights are most valuable

Steffen’s insights are especially useful in environments where security, IT operations, and data systems intersect. That includes organisations working with complex infrastructure, distributed devices, or large volumes of operational data that need to be secured, monitored, and made actionable.

A clear example is the Security Strategist episode “From Data to Insight: How Enterprises Are Making IoT Secure and Actionable”, where he explores how organisations can secure Internet of Things (IoT) environments while still extracting value from the data they produce. The discussion moves beyond device-level security and into questions of visibility, data integrity, and how insights are actually used across the business.

That example reflects a broader strength in his work. He focuses on how security fits into real operating environments, where data, systems, and teams are closely connected. His perspective is particularly valuable for CISOs, security operations leaders, and organisations looking to make security more practical, measurable, and aligned with how the business actually runs.

Check out Chris Steffen on LinkedIn

Diana Kelley

Headshot of cybersecurity leader Diana Kelley with EM360Tech-branded background and text outlining her roles as CISO, board member, keynote speaker, and advisor, associated with Noma and Boston College.

Diana Kelley serves on the WiCyS (Women in Cybersecurity) Board of Directors and is CISO at Noma Security. She also sits on several other boards, including the Executive Women’s Forum (EWF), InfoSec World, CyberFuture Foundation, and had a long run of senior security roles across Microsoft, IBM Security, Symantec, Protect AI, and more.

Her core focus is securing emerging technologies, especially AI, in ways that are rigorous, practical, and usable inside real enterprise environments.

What they are known for and why they matter to enterprise security leaders

Kelley’s work becomes especially useful when organisations are trying to adopt AI without losing control of security in the process. Which is a common pressure these days. Teams are being asked to move quickly, but they still need to explain how these systems will be governed, monitored, and defended once they are in production.

What makes her perspective useful is that she strips away the mystique around AI and brings the conversation back to security reality. She has been very consistent on this point: AI is not magical pixie dust. It's software, math, data, models, and runtime behaviour. That framing matters because it gives security teams something solid to work with instead of treating AI as a special case that sits outside normal security practice.

That matters because when AI is treated as too novel or too opaque to secure properly, it often bypasses the controls that would apply elsewhere. Then the organisation is left with weak governance around training data, poor visibility into model risk, and runtime exposure that becomes much harder to manage once those systems are live. Kelley’s value is that she keeps bringing the discussion back to how security can be built in early, not patched on later.

Where their insights are most valuable

Kelley’s insights are especially valuable for organisations working through AI adoption, cloud-scale security, and modern application environments where governance and operational control have to keep pace with technical ambition.

A strong example is her WiCyS 2025 keynote, “Outfoxing the Digital Predators, where she cuts through the fear-heavy narrative around AI and focuses on what security teams can actually defend. She breaks the problem into data, models, and runtime, then connects those areas to familiar security concerns such as data leakage, malicious model files, denial of service, threat modelling, monitoring, and policy enforcement.

What makes that example useful is not just the topic. It's the way she handles it. She doesn’t treat AI security as a separate discipline that needs an entirely separate worldview. She treats it as something security teams can understand, test, and improve using the same discipline they already apply elsewhere, with some adaptation where the technology behaves differently.

Her perspective is especially useful for CISOs, security architects, governance leaders, and organisations trying to embed security into AI from the start without turning the whole thing into theatre.

Check out Diana Kelley on LinkedIn

Evgeniy Kharam

Headshot of cybersecurity leader Evgeniy Kharam with EM360Tech-branded background and overlay text highlighting his roles as CSO, TEDx speaker, podcaster, author, and founder of Discern Security.

Evgeniy Kharam is Chief Strategy Officer at Discern Security and a cybersecurity architect, and advisor with more than two decades of hands-on experience across security architecture and executive strategy. He also founded EK Cyber & Media Consulting and co-hosts the Security Architecture Podcast, where he translates complex security design into decisions teams can actually use.

His core focus is security architecture, especially how organisations design controls, visibility, and decision-making in a way that still holds together once the environment gets messy.

What they are known for and why they matter to enterprise security leaders

Kharam’s work becomes most relevant when organisations start realising that buying more security tools is not the same thing as building a stronger security posture. Plenty of teams have coverage on paper and still struggle with visibility gaps, unclear priorities, and controls that do not work well together once they are under pressure.

That is where his perspective tends to help. He keeps the conversation at the architecture level, which means looking at how security decisions connect across the environment rather than treating each product or control as its own answer. The emphasis is less on isolated capability and more on whether the design makes operational sense.

That matters because weak architecture doesn’t usually fail in one dramatic moment. Visibility becomes uneven, trust boundaries get fuzzy, and teams end up carrying complexity that makes security harder to run, not easier. Over time, that creates exactly the kind of drag most enterprise leaders are trying to reduce.

Where their insights are most valuable

Kharam’s insights are especially useful in organisations dealing with distributed infrastructure, overlapping tools, and growing pressure to show that security decisions are tied to business reality rather than technical fashion. That includes teams working through architecture choices, investment trade-offs, and the constant problem of doing more without making the environment harder to manage.

A clear example is the EM360Tech episode Meeting of the Minds: State Of Cybersecurity in 2025. The discussion does not stay at the level of broad prediction. It gets into the practical tension points security leaders are dealing with right now, including AI as both a security tool and a source of new vulnerability, the risks tied to open-source AI models, the platform versus best-of-breed debate, integration issues after acquisitions, the gap between compliance and real security, and the pressure on CISOs to find quick wins that actually improve posture.

This is a great example of how he’s helping leaders think about complexity, trade-offs, and the difference between security activity and security outcomes. His perspective is especially useful for CISOs, security architects, and teams trying to bring more clarity and structure to how security is designed, prioritised, and explained.

Check out Evgeniy Kharam on LinkedIn.

John Tolbert

Headshot of John Tolbert with EM360Tech-branded background and text identifying him as Director of Cybersecurity Research at KuppingerCole Analysts, based in Seattle, Washington.

John Tolbert is Director of Cybersecurity Research and Lead Analyst at KuppingerCole. He advises enterprises on security architecture, identity, and access management, backed by experience across both large enterprises and technology startups.

His core focus is identity-driven security, particularly how organisations detect, respond to, and reduce risk tied to compromised credentials, sessions, and access pathways.

What they are known for and why they matter to enterprise security leaders

Tolbert’s work becomes most relevant when identity stops being just an access control problem and starts showing up as a primary attack path. That shift is now common. Threats increasingly target sessions, tokens, and recovery processes rather than trying to break through perimeter controls.

He focuses on how organisations respond to that shift in practice. His work connects identity, threat detection, and response, pushing leaders to think beyond authentication and toward what happens when identity is already compromised. That includes how signals are used, how access decisions are adjusted in real time, and how response actions are triggered across systems.

That matters because when identity is treated as static, organisations miss what is actually happening during an attack. Compromised credentials, reused tokens, and session hijacking don’t always trigger traditional controls. Without stronger visibility and response tied to identity, attackers can move laterally while appearing legitimate.

Where their insights are most valuable

Tolbert’s insights are especially useful in environments where identity, access, and threat detection need to work together rather than operate in isolation. That includes organisations dealing with account takeover risk, session-based attacks, and the growing complexity of managing access across SaaS and cloud environments.

A clear example is his piece “What Enterprise Security Can Learn from Consumer Fraud Prevention”, where he looks at how fraud detection in consumer systems can be applied to enterprise identity security. He highlights how signals like unusual behaviour, compromised credentials, and recovery events can be used to trigger active responses, such as session revocation, step-up authentication, and targeted investigation.

The value is in how he reframes the problem. Instead of relying on static controls, he shows how identity security can become more adaptive, using real-time signals to adjust access and reduce exposure while an attack is in progress.

His perspective is particularly useful for CISOs, IAM leaders, and security teams looking to strengthen identity-based detection and response without adding unnecessary complexity.

Check out John Tolbert on LinkedIn

Ken Buckler

Headshot of Ken Buckler with EM360Tech-branded background and text describing him as an author, research director, and cybersecurity leader at Enterprise Management Associates, based in Maryland.

Ken Buckler is a Research Director at Enterprise Management Associates (EMA), specialising in information security, risk, and compliance. His background spans more than 15 years across federal cybersecurity, software development, and security engineering, including work with organisations like the Defense Information Systems Agency (DISA) and other U.S. government bodies.

His expertise sits at the intersection of security operations, compliance frameworks like NIST 800-53, and emerging risk areas such as AI and cryptography.

What they are known for and why they matter to enterprise security leaders

Buckler’s work becomes most relevant when security stops being theoretical and starts being constrained by real-world systems, regulation, and legacy decisions. He operates in the space where security architecture, compliance requirements, and operational reality all collide.

That matters because a lot of organisations still treat compliance and security as loosely connected. On paper, controls are in place. In practice, those controls don’t always translate into resilience. Buckler’s perspective tends to close that gap by grounding security decisions in how systems actually behave, not how frameworks describe them.

There’s also a second layer to this. His background in federal environments means the stakes are higher and the margin for error is smaller. That shows up in how he approaches risk. It’s less about reacting to trends and more about understanding what breaks first, what fails quietly, and what becomes a long-term liability if it’s ignored.

Where their insights are most valuable

Buckler’s insights are especially useful for organisations dealing with regulated environments, long data lifecycles, and security decisions that need to hold up under scrutiny over time. That includes teams navigating compliance-heavy frameworks while still trying to modernise infrastructure and adopt new technologies.

A clear example is Episode 146 – Demystify Quantum Computing, hosted by EM360Tech. The discussion breaks down quantum computing in practical terms, including how qubits differ from classical bits and why that shift matters for encryption.

The more important part is where the conversation goes next. It focuses on “Q-Day” and the “harvest now, decrypt later” risk, where encrypted data is being collected today with the expectation that future quantum systems will be able to break it. That reframes quantum risk from a distant concern into something that already has consequences.

The takeaway isn’t that organisations need to panic. It’s that waiting creates exposure. Cryptographic decisions made today define how vulnerable data becomes later, which is why post-quantum cryptography is already part of the conversation for teams that deal with sensitive, long-lived data.

Are you enjoying the content so far?

Buckler’s perspective is most useful for CISOs, security architects, and compliance-led organisations that need to think beyond immediate threats and start accounting for how today’s security decisions age over time.

Check out Ken Buckler on LinkedIn

Martin Kuppinger

Headshot of Martin Kuppinger with EM360Tech-branded background and text identifying him as Founder and Principal Analyst at KuppingerCole Analysts, based in the Stuttgart region.

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, where he remains one of the most established voices in identity and access management. His authority in this space comes from depth as much as longevity, with decades of work in software architecture, identity, and security research, alongside more than 50 IT-related books and a long-running role as a speaker, moderator, and advisor. 

His core focus is identity-driven security, especially the question of how organisations govern access, trust, and accountability as environments become more distributed and identities become far more complicated than a simple workforce login. 

What they are known for and why they matter to enterprise security leaders

Kuppinger’s work becomes most relevant when identity programmes start to feel harder to govern than they’re to launch. That usually happens when access decisions are spread across too many systems, too many identity types, and too many disconnected tools, leaving leaders with plenty of process but very little clarity.

He keeps bringing the conversation back to the underlying model. Rather than treating identity governance as a collection of separate controls, he frames it as part of a wider security and trust architecture. That includes orchestration, automated governance, and what KuppingerCole calls the Identity Fabric, a concept he’s closely associated with and continues to develop as a way of making modern IAM more coherent at enterprise scale. 

That matters because weak identity governance rarely fails loudly at first. It tends to fail through sprawl, review fatigue, over-entitlement, and access decisions that no one can confidently explain. Over time, that creates exactly the kind of friction and exposure leaders are trying to reduce, especially once partners, customers, non-human identities, and AI agents all start pulling on the same control plane. 

Where their insights are most valuable

Kuppinger’s insights are especially useful in organisations trying to modernise identity governance without adding even more process and overhead. That includes teams dealing with complex access models, identity sprawl, and the growing need to make governance work across human and non-human identities rather than pretending the old model still fits. 

A clear example is “From 100 to Zero: Fixing Access Recertification the Right Way”, where he challenges the way organisations approach access reviews. The point isn’t that recertification should disappear overnight. It’s that most programmes create far too much burden because they’re trying to review bad access models rather than fix them.

That example works because it shows how he handles a problem many teams have quietly accepted as normal. He doesn’t just argue for doing the same process faster. He questions whether the process makes sense in the first place, then ties the answer back to governance design, policy, and architectural discipline.

His perspective is especially useful for CISOs, IAM leaders, security architects, and organisations trying to make identity governance more consistent, scalable, and easier to defend. 

Check out Martin Kuppinger on LinkedIn

Richard Stiennon

Headshot of Richard Stiennon with EM360Tech-branded background and text describing him as Chief Research Analyst at IT-Harvest, speaker, and author, based in Michigan.

Richard Stiennon is Chief Research Analyst at IT-Harvest, the firm he founded to track and analyse the cybersecurity vendor landscape. He’s also a former Gartner analyst and long-time industry author, which gives his work a wider lens than product commentary alone. It sits much closer to market structure, security strategy, and the way systemic weaknesses keep getting repeated. 

His core focus is enterprise cybersecurity at system level, especially the gap between what organisations think they’ve secured and the structural weaknesses that keep making breaches possible.

What they are known for and why they matter to enterprise security leaders

Stiennon’s work becomes most useful when leaders are trying to understand why breaches keep happening in organisations that are not short on budget, tooling, or policy. That question matters because most large security failures do not come from one dramatic mistake. They come from deeper weaknesses in architecture, process, accountability, and control design.

That’s where his perspective tends to cut through the noise. He consistently pushes the conversation away from easy blame and toward the systems underneath it. Instead of treating breaches as proof that one person clicked the wrong thing, he looks at what the environment allowed, what the controls failed to catch, and what the organisation normalised for too long.

That matters because “human error” is often a comfortable explanation. It is also a lazy one. When leaders stop there, the bigger problems stay in place. Weak segmentation, poor visibility, inconsistent governance, and brittle processes do not fix themselves just because someone gets sent for more awareness training. Over time, that creates a false sense of progress while the real exposure remains.

Where their insights are most valuable

Stiennon’s insights are especially useful in organisations trying to understand cybersecurity as a leadership and systems problem rather than a series of isolated incidents. That includes teams dealing with repeated control failures, board-level scrutiny, or pressure to explain why the same categories of breach keep showing up in different forms. (it-harvest.com)

A clear example is the Security Strategist episode Why Do Most Cyber Breaches Stem from System Failures, Not Human Error?” The discussion goes well beyond blaming users. It looks at the structural causes of breaches, including weak system design, poor segmentation, inconsistent enforcement, and the way organisations often misread security failure as an individual issue instead of an operational one. 

That example works because it shows the level he operates at. He is not just commenting on breach headlines. He is pushing leaders to look at the system underneath them and ask harder questions about architecture, resilience, and accountability. His perspective is especially useful for CISOs, security leaders, and organisations trying to move from reactive explanation to meaningful structural improvement.

Check out Richard Stiennon on LinkedIn

William Malik

Headshot of William Malik with EM360Tech-branded background and text highlighting him as a CTO, trusted advisor, and former Gartner analyst, based in Connecticut.

William Malik is an Advisor at Lionfish Tech Advisors and Principal Analyst at Malik Consulting, where he focuses on competitive intelligence, market positioning, and enterprise security strategy. His background spans decades of senior roles across Gartner, IBM, and other major enterprise technology environments, which shows in how he approaches security. He doesn’t treat it as a silo. He treats it as part of how organisations operate, compete, and make decisions.

His core focus sits across security strategy, identity, infrastructure, and business continuity, with a strong emphasis on how technical decisions translate into business impact.

What they are known for and why they matter to enterprise security leaders

Malik’s work becomes most relevant when security leaders are trying to close the gap between theory and execution. A lot of organisations understand concepts like Zero Trust at a high level. Far fewer know how to make them work in environments that are already complex, already stretched, and already full of legacy decisions.

That is where his perspective tends to land. He looks at how security actually functions under pressure, not how it is supposed to work in clean diagrams. That includes how organisations prioritise risk, where controls tend to break down, and how attackers exploit the weakest point in a system rather than the most obvious one.

That matters because most security strategies don’t fail at the centre. They fail at the edges. A single weak control, a poorly understood dependency, or an assumption that holds until it doesn’t can undermine the entire model. Over time, that creates a situation where organisations believe they’re protected, but can’t clearly explain where their exposure really sits.

Where their insights are most valuable

Malik’s insights are especially useful in organisations trying to operationalise security strategy without adding unnecessary complexity. That includes teams working through Zero Trust adoption, identity-driven security, and the ongoing challenge of aligning technical controls with business priorities.

A clear example is the EM360Tech episode “Zero Trust Security: Mastering the Weakest Link”. The discussion doesn’t treat Zero Trust as a checklist. It focuses on how attackers look for the weakest point in a system and how that reality shapes what Zero Trust needs to achieve in practice. The conversation moves through identity as a control point, the importance of understanding dependencies across systems, and why simply layering more controls doesn’t automatically reduce risk.

What makes that useful is how grounded it stays. It doesn’t assume organisations are starting from scratch. It looks at how to strengthen what already exists, how to identify where controls are actually breaking down, and how to prioritise effort where it’ll have the most impact.

His perspective is especially useful for CISOs, security architects, and enterprise leaders who need to translate security strategy into something that holds up in real-world environments, not just on paper.

Check out William Malik on LinkedIn

Final Thoughts: Trusted Security Insight Is a Strategic Advantage

Security in 2026 isn’t just about preventing breaches. It’s about making sure the business can operate safely at speed, with the right balance of trust, visibility, control, and accountability. The organisations getting this right aren’t adding more controls for the sake of it. They’re building systems that hold up under pressure and still make sense to run.

That’s where the right analysts matter. They don’t replace strategy, but they do sharpen decision-making. They help leaders see where things break, question assumptions, and avoid structural mistakes that are expensive to fix later.

The organisations that succeed will be the ones that build defensible systems, not just reactive controls. That’s exactly where EM360Tech adds value, by bringing forward the insight that helps leaders make better calls when it actually counts.