By using this site, you agree to the IDC Privacy Policy

Sean Pike

Program Vice President, Security Products

C. Sean Pike is Program Vice President for IDC's Security Products group. In this role, Mr. Pike leads IDC's Security Products, Data Security, Information Governance & eDiscovery, and Identity & Access Management research programs. 

Mr. Pike provides competitive intelligence, strategic advisory, and thought leadership for security, data protection, governance, risk, compliance, and legal discovery technology and solutions.  He examines the implications of emerging technology, legal and regulatory developments, and the threat landscape on organizations’ risk and compliance programs, information governance and data privacy initiatives, and legal discovery efforts. He also tracks the convergence of information management, storage, security, and IT operations technologies and the impact on various governance and discovery use cases.

BACKGROUND

Mr. Pike joined IDC in 2014 with 17 years of experience blending operational security, audit, and risk functions with the demands of regulatory and compliance programs within highly regulated industry. As both a hands on practitioner and attorney, he is uniquely positioned to interpret the legal and regulatory landscape providing insight on products and services designed to meet evolving security and discovery requirements.

EDUCATION/INDSUTRY ACCOMPLISHMENTS

  • J.D. from the Syracuse University College of Law
  • Attorney licensed in the State of Maryland
  • M.S. in Telecommunications from the School of Information Studies at Syracuse University
  • Certificate of Advanced Study (CAS) in National Security and Counterterrorism Law from the Syracuse University College of Law
  • Certified Information Privacy Professional (CIPP/US)
  • Certified Ethical Hacker (CEH)
Cyber breaches happen all the time whether by accident or by the skilled hand of a sophisticated attacker. The recent Olympic Destroyer hack reminds us that motivation for various attacks may not always be about gain. The sole motivation fo...
The CPU chips of nearly two dozen widely used manufacturers are vulnerable to the Spectre and Meltdown attacks, which can be used by a highly sophisticated attacker to expose sensitive information such as passwords or secret keys on PCs, vi...
More results
This IDC study examines the market share of security and vulnerability management vendors in 2016 as well as the market forces that influenced their performances and the adoption of security and vulnerability management products."The effect...
This IDC study presents IDC's taxonomy of the security products market. It provides definitions of security products across four major platforms: software licenses, virtualization, appliances, and software as a service. It is the foundation...
More results