Skip to main content
Home Home
  • Podcasts
  • Tech Articles
  • Top 10s
  • Content
    Topics
    • AI
    • Data
    • Emerging Technologies
    • Infrastructure Management
    • Security
    • In The News
    Media
    • Tech Articles
    • Podcasts
    • Top 10s
    • Whitepapers
    • Press Releases
    • Video Resources
  • Solution Providers
  • Industry Leaders
  • Sign In
  • Join the community
Home
Get Started
  • Access expert IT resources for free
  • Discover actionable insights from industry experts
  • Network with IT professionals and grow your network
  • Unlock exclusive analyst-led content
  • Share your thoughts with our global IT community
Coming Soon...
  • Access free expert IT resources
  • Network with professionals and industry leaders
  • Gain exclusive insights from a global IT community

Or

Sign up with LinkedIn
Sign up with Github
Sign up with Google
Signup as business
Already have account?
Privacy Policy
Contact us
Showing results for
  • Content
  • Industry experts
  • Solution providers
  • Events
No matches found
Explore by topics
Explore by type
No matches found
No matches found
Explore by topics
No matches found
Explore by topics
No result found for
Podcasts
Tech articles
Top 10s
  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security
  • In the news
  • Press release
  • Video resources
  • Whitepapers
Industry Leaders
Media partners
Solution Providers
Events
  • About us
  • Contact us
  • FAQs
em360tech image
Guru

Richard
Stiennon

Chief Research Analyst at IT-Harvest
20 followers
0 following
Message
Follow

Work experience

IT-Harvest
Chief Research Analyst
( Nov 2017 - Present )
saf ai Inc
Advisory Board Member
( Mar 2022 - Aug 2023 )
..see more
Quick Heal
Board Member
( Sep 2021 - Present )
Anitian
Member of Board of Directors
( May 2019 - Present )
Phosphorus Cybersecurity
Member of Advisory Board
( Feb 2019 - Present )

Areas of Expertise

  • Security

About

United States
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2025 was published by Wiley in April, 2025.

...see more

Social media links

Analysts with similar expertise

Ken Buckler
em360tech image

Ken Buckler

Research Director at Enterprise Management Associates
Alejandro Leal
em360tech image

Alejandro Leal

Senior Analyst at KuppingerCole Analysts
Aparna Sundararajan
em360tech image

Aparna Sundararajan

Strategic Advisor - Secure AI at Rain Consulting Services
View more
Read The Human Factor in Cybersecurity: Behavioural Interventions That Work
Podcast host Richard Stiennon in conversation with Nicole Jiang-Gibson, discussing behavioural interventions and the human factor in cybersecurity on Security Strategist.
Security
The Human Factor in Cybersecurity: Behavioural Interventions That Work
27 min
Read Securing AI-Driven Development in Modern Enterprises
Richard Stiennon, host of the Security Strategist podcast, in conversation with Gadi Bashvitz, CEO of Bright Security, discussing AI-driven code, application vulnerabilities, and dynamic security testing.
Security
Securing AI-Driven Development in Modern Enterprises
24 min
Read How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?
In the recent episode of The Security Strategist Podcast, Abhi Sharma, Co-Founder and CEO of Relyance, speaks to Host Richard Stiennon, Chief Research Analyst at IT-Harvest.
AI Security
How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?
16 min
Read How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?
In the recent episode of The Security Strategist Podcast, Abhi Sharma, Co-Founder and CEO of Relyance, speaks to Host Richard Stiennon, Chief Research Analyst at IT-Harvest.
AI Security
How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?
16 min
Read How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?
Cybersecurity has traditionally focused on strengthening corporate networks, cloud systems, and devices. However, in the recent episode of The Security Strategist podcast, Dr. Chris Pierson, Founder and CEO of BlackCloak, and host Richard Stiennon, Chief Research Analyst at IT-Harvest, argue that the most significant vulnerabilities are now outside the office perimeter.
Security
How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?
18 min
Read Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?
In the recent episode of The Security Strategist podcast, Raz Rotenberg, CEO and Co-Founder of Fabrix Security, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest about identity security and how ai intelligence is fixing it.
Security
Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?
14 min
Read Human-Led, AI-Driven: The Next Chapter of Security Operations
On this episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, spoke with Daniel Martin, Director of Product Management at Rapid7. They discussed how modern Security Operations Centres (SOCs) are evolving, where AI truly adds value, and why outcomes—not features—should guide cybersecurity teams.
Security
Human-Led, AI-Driven: The Next Chapter of Security Operations
15 min
Read What Happens to API Security When AI Agents Go Autonomous?
In the recent episode of The Security Strategist podcast, Eric Schwake, Director of Cybersecurity Strategy at Salt Security, joined analyst Richard Stiennon to discuss why APIs, which have long been the backbone of modern applications, have become essential for AI-driven businesses.
Security
What Happens to API Security When AI Agents Go Autonomous?
15 min
Read Is Your Holiday Traffic Human—or AI-Driven and Under Attack?
In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sits down with Pascal Geenens, VP of Threat Intelligence at Radware, to discuss why CISOs need to rethink their long-held beliefs about attackers, users, and what “web traffic” really means in an AI-driven world.
Security
Is Your Holiday Traffic Human—or AI-Driven and Under Attack?
24 min
Read What If We Could Fix Vulnerabilities Faster Than We Find Them?
In the recent episode of The Security Strategist Podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sat down with John Amaral, Co-Founder and CTO of Root. They discussed how automation, AI agents, and a new approach called “Shift Out” are changing vulnerability management.
Security
What If We Could Fix Vulnerabilities Faster Than We Find Them?
20 min
Read Can Identity Security Close the AI Governance Gap?
Art Gilliland and Richard Stiennon discussing identity security, AI governance, and shadow AI on the Security Strategist Podcast.
Security
Can Identity Security Close the AI Governance Gap?
21 min
Read How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?
In the latest episode of The Security Strategist Podcast, Ory’s Head of Customer Engineering, Jeffrey Hickman, speaks to host Richard Stiennon, the Chief Research Analyst at IT-Harvest. They discuss a pressing challenge for businesses adopting AI: managing permissions and identity as autonomous agents start making their own decisions.
Security
How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?
24 min
  • Load more
The Compliance Conundrum in the Cloud Era: Governance and Adapting to Regulatory Volatility
em360tech image
Whitepaper
Security

The Compliance Conundrum in the Cloud Era: Governance and Adapting to Regulatory Volatility

by Megan Leanda Berry
4 min

Automate compliance. Strengthen resilience.

Get the new EM360Tech report on cloud and hybrid compliance. Learn how to replace manual audits with continuous assurance, automate evidence collection, and govern controls with confidence in a volatile regulatory landscape.

  • Why manual compliance can’t keep up
  • How automation transforms assurance and reporting
  • Practical governance models for automated controls
  • Managing data sovereignty across jurisdictions
  • Strategies for adapting to regulatory change
Get The Report
EM360Tech Homepage em360tech.com

Access the latest analyst-led podcasts, tech articles, and industry resources as you connect with some of the brightest minds in enterprise tech.

  • x.com
  • LinkedIn
  • YouTube

Topics

  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security

Resources

  • Articles
  • Podcasts
  • Top 10s
  • Videos
  • Whitepapers

Collaborators

  • Events
  • Experts
  • Media Partners
  • Solution Providers

Company

  • About
  • Blogs
  • FAQ
  • Our Services

Subscribe to our Newsletter

  • Contact Us
  • Our Services
  • Blogs
  • Privacy Policy
  • Editorial Policy
  • GDPR Policy
  • Sitemap

All rights reserved. ©2026

Enterprise Management 360