Heidi Shey

Analyst serving Security & Risk PROFESSIONALS

Heidi serves Security & Risk Professionals in solutions for data security and privacy and for security architecture and operations. Her research focus is on intellectual property protection, biometrics, cybersecurity topics such as policy and regulatory concerns, embedded security, and consumer security. She also focuses on data-driven topics such as budgeting, spending, and the economics of security. She is a team lead for survey design, methodology development, data analysis, and building of forecasting models in consulting engagements.

Previous Work Experience

Heidi has been with Forrester since 2006 and has a rich background in conducting primary and secondary research on topics such as green IT, enterprise mobility, unified communications, managed IT services, Web 2.0 technologies, cloud computing, and IT security. Her previous focus was on conducting quantitative analysis of B2B technology adoption and IT spending and budgeting trends for technology vendors. In her previous role, she also worked closely with Forrester's Forrsights team on survey development and data quality initiatives, in addition to leading companywide data use and quantitative analysis training for new research associate hires.

Education

Heidi holds a B.A. in economics and studio art with honors from Wellesley College and an M.S. in cybersecurity policy from the University of Maryland. She has also studied at the Chinese University of Hong Kong.

Refine your results

Date Range

Role

Methodology

Topics

Region

Vendor

13 results in Reports

  • Heidi Shey
  • Security Program Governance
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2013 To 2014

    Benchmarks: The Security Architecture And Operations Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 386
    • Rating:
  • For Security & Risk Professionals

    Report:Quick Take: Akamai Acquires Prolexic, Doubling Down On DDoS Mitigation Services

    On December 2, 2013, Akamai Technologies announced its acquisition of Prolexic Technologies, a provider (with more than 400 customers) of cloud-based DDoS protection and mitigation services for data...

    • Downloads: 107
    • Rating:
  • For Security & Risk Professionals

    Report:Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook

    For security and risk (S&R) leaders, pursuing continuous improvement in security architecture and operations can mean many things: keeping up with the mutating threat landscape; staying current...

    • Downloads: 241
  • For Security & Risk Professionals

    Report:Understand The State Of Data Security And Privacy: 2013 To 2014

    Benchmarks: Data Security And Privacy Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Forrsights Security...

    • Downloads: 1491
    • Comments: 1
    • Rating:
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 505
    • Rating:
  • For Security & Risk Professionals

    Report:Empower The Workforce To Empower The Security Team

    Continuous Improvement: The Data Security And Privacy Playbook

    When it comes to data security and privacy, Forrester has observed in client interactions time and time again that security teams remain overly fixated on the wrong adversary: their own organization....

    • Downloads: 213
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: Q2 2013

    From frantic security operations problems to the changing threat landscape, CISOs, senior security leaders, and other IT risk management leaders consistently have trouble keeping up with key trends...

    • Downloads: 854
    • Rating:
  • For Security & Risk Professionals

    Report:Defend Your Data From Mutating Threats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, on...

    • Downloads: 508
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2012 To 2013

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 725
    • Rating:
  • For Security & Risk Professionals

    Report:Identify And Influence Data Security And Privacy Stakeholders

    Stakeholder Needs: The Data Security And Privacy Playbook

    This report outlines Forrester's solution for security and risk executives seeking to develop a data privacy and protection program and gain stakeholder support. As a security and risk (S&R)...

    • Downloads: 1005
  • For Security & Risk Professionals

    Report:Job Description: Chief Privacy Officer

    Skills And Staffing: The Data Security And Privacy Playbook

    This report discusses skills and staffing implications of Forrester's solution for security and risk (S&R) professionals to act in developing their organization's data security and privacy strategy....

    • Downloads: 322
  • For Security & Risk Professionals

    Report:Forrsights: The New IT Security Buyer Landscape

    Success Requires Vendors To Change Features, Positioning, And Sales Enablement

    Despite the recent spate of high-profile security breaches, many chief information security officers (CISOs) find themselves marginalized by their peers and disconnected from their business's...

    • Downloads: 449
    • Comments: 1
    • Rating:
  • For CIO Professionals

    Report:Services-Led Solutions Reshape The Security Market

    Redefining Your Competition, Partners, And Value Proposition When Everyone's A Security Vendor

    The IT security market is about to undergo a significant transformation toward becoming a services-led market. Several disruptive trends are overwhelming end user IT security practices, and the...

    • Downloads: 879