Analyst Bio

Michael is the Senior Analyst at Osterman Research, with broad interests in cybersecurity, data protection and information governance. Michael prepares survey reports and white papers for new projects, coordinating their completion through to publication.
Michael is the author of seven books on collaboration and user adoption, including Re-Imagining Productive Work with Office 365, User Adoption Strategies (2nd Edition), and Collaboration Roadmap.
Michael holds a Master of Commerce with first-class honours in telecommunications-based IT from the University of Canterbury in New Zealand. Several times a week you will find Michael putting in lengths at the local swimming pool–it’s a great place to think.
Michael works from the New Zealand office of Osterman Research.
Recent Research Agenda Reports
Michael was the lead analyst on the following projects from Osterman’s Research Agenda:
- Ransomware Attacks: Strategies for Prevention and Recovery (October 2022)
- Privacy Compliance in the United States: Status and Progress in 2022 (April 2022)
- Cybersecurity in Financial Services: Viewpoint 2022 (March 2022)
- How to Deal with Business Email Compromise (January 2022)
- How to Comply with the CPRA (December 2021)
- Why Zero Trust is Important (November 2021)
- Cybersecurity in Government: Viewpoint 2021 (September 2021)
- Archiving and Data Protection with Microsoft Teams (May 2021)
- How to Reduce the Risk of Phishing and Ransomware (March 2021)
- Cybersecurity in Education (March 2021)
Recent Commissioned Research Reports
Michael was the lead analyst on the following commissioned research projects:
- The Business Cost of Phishing (October 2022 / IRONSCALES)
- Application Security in a Multi-Cloud World 2022 (September 2022 / Radware)
- Improve Machine Learning Model Training with Collaborative Secure Learning (August 2022 / Duality Technologies)
- State of Cloud Security Maturity 2022 (August 2022 / Ermetic)
- The State of Mobile App Security (July 2022 / Approov)
- Email Security Solutions to Reduce Human Activated Risk – Buyers Guide (July 2022 / Egress)
- COVID Hangover: Employee Perceptions on Application Choice post-COVID-19 (June 2022 / Cerby)
- The Rush to MDR Services (June 2022 / LogicHub)
- State of Multi-Cloud Identity Report 2022 (May 2022 / Strata Identity)
- Phishing, BEC, and Ransomware Threats for Microsoft 365 Users (April 2022 / Cyren)
- Achieving the Operational Resilience Agenda in Financial Services (November 2021 / Nutanix)
- eDiscovery and Information Governance for Microsoft Teams (October 2021 / Onna)
- Preventing Data Exfiltration: Introducing Anti-Data Exfiltration (October 2021 / BlackFog)
- Managing Risk from Subsidiaries: Goals, Friction, and Failure (September 2021 / CyCognito)
- Sensitive Data Discovery Rises as a Top Concern for Organizations (September 2021 / ActiveNav)
- Uncovering the Presence of Vulnerable Open-Source Components in Commercial Software (August 2021 / GrammaTech)
- The Case for Policy-Based Enterprise Endpoint Backup (July 2021 / Micro Focus)
- Evaluating Advanced Email Security: A Guide for MSPs (July 2021 / Acronis)
- Does a Microsoft-Only Approach Make Sense? (April 2021 / IPRO)