Margo Visitacion

Vice President, Principal Analyst serving Enterprise Architecture PROFESSIONALS

Margo is a vice president and principal analyst serving Enterprise Architecture Professionals. She is a leading expert in software delivery, focusing on the areas of project management, project portfolio management and project management organizations (PMOs), covering both Agile and traditional methodologies. In addition to her work as a Forrester analyst, she speaks frequently at industry events such as Project World and PMI World Congress. For the last three years, Margo has been on the panel of selecting judges for PMO of the Year.

Previous Work Experience

Margo has 25 years of experience in IT, developing and implementing QA, and PMOs. Most recently, she was global industry market manager of the public-sector/aerospace and defense markets for Primavera Systems, a leading provider of project portfolio management tools, where she was responsible for developing an integrated go-to-market strategy for Primavera's suite of products. She was a regular contributor to industry trade magazines such as Contract Manager and spoke at industry conferences such as the Project Management Institute's program management and earned value conferences. Margo was also an assistant vice president at BHC (now FiServ) Securities, where she was responsible for creating project office and quality assurance organizations, which managed the IT portfolio and the implementation and testing of the company's client/server and Internet trading systems. Prior to working for BHC, Margo was manager of quality assurance for ADP-BISG, where she was responsible for developing a new testing methodology for ADP's flagship front-office product, Power Partner, as well as other leading-edge brokerage front-end systems. She also led a testing team that was instrumental in the project rollout of almost 25,000 client desktops. Joining Giga Information Group in 1999 as a senior analyst in the project management and QA markets, prior to Forrester's acquisition of Giga, she rose to the role of research director.

Education

Margo attended Rutgers University in Camden, N.J.

Refine your results

Methodology

Analyst

Topics

Industry

Region

Vendor

24 results in Reports

  • Security & Risk
  • Past 18 months
  • Tech Sector Economics
  • For Security & Risk Professionals

    Report:The 15 Most Important Questions To Ask Your Cloud Identity And Access Management Provider

    During the past three years, cloud-based identity and access management (IAM) solutions have become a viable and cost-effective alternative to on-premises, commercial off-the-shelf (COTS), or...

    • Downloads: 482
    • Comments: 4
    • Rating:
  • For Security & Risk Professionals

    Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

    But Only If Cisco Doesn't Strangle Innovation

    On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

    • Downloads: 191
  • For Security & Risk Professionals

    Report:Mobile Authentication: Is This My App? Is This My User?

    Strategy Deep Dive: The Mobile Security And Operations Playbook

    Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...

    • Downloads: 628
    • Comments: 4
    • Rating:
  • For Security & Risk Professionals

    Report:Measure Information Security Effectiveness — Information Security Economics 103

    Analyze Where You Spend Your Money Using The Three R's: Readiness, Response, And Recovery

    This is the third in a series of reports providing new methods and guidance for the financial management of information security. For many companies, security spending and budgeting is a restatement...

    • Downloads: 233
  • For Security & Risk Professionals

    Report:Five Steps To Build An Effective Threat Intelligence Capability

    Against today's mutating threat landscape and sophisticated cybercriminals, security and risk (S&R) professionals are outgunned and outmatched. The traditional strategy of waiting for an alert and...

    • Downloads: 857
    • Comments: 2
    • Rating:
  • For Security & Risk Professionals

    Report:The State Of Enterprise Mobile Security, Q1 2014: Strategies Shift From Devices To Apps

    Benchmark: The Mobile Security And Operations Playbook

    Even as more and more firms adopt and grow more comfortable with bring-your-own-device (BYOD) strategies, security and risk (S&R) pros remain vigilant — particularly as firms seek to empower...

    • Downloads: 369
  • For Security & Risk Professionals

    Report:Market Trends: Secure File Sharing And Collaboration In The Enterprise, Q1 2014

    What You Need To Know About Workforce Behavior And Available Data Controls

    Whether the organization's interest in file sharing and collaboration solutions comes from BYOD initiatives, workforce demands, or peer and partner collaboration requirements, security and risk (S&R)...

    • Downloads: 279
    • Rating:
  • For Security & Risk Professionals

    Report:Four Best Practices To Maximize The Value Of Using And Sharing Threat Intelligence

    Threat intelligence continues to dominate both the headlines and the attention of security and risk (S&R) professionals looking for viable options in their escalating battle against advanced...

    • Downloads: 268
    • Rating:
  • For Security & Risk Professionals

    Report:The Data Center Services Market In Japan, 2013 To 2016

    Providers Must Address Energy Efficiency And Governance To Thrive

    Over the past 18 months, all of the significant data center players in the Japanese market -- telcos, vendors, service providers, and systems integrators (SIs) -- have been aggressively investing in...

    • Downloads: 194
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

    • Downloads: 412
    • Rating:
  • For Security & Risk Professionals

    Report:Benchmark The Performance Of Your GRC Program

    Benchmarks: The GRC Playbook

    The role of governance, risk, and compliance (GRC) continues to evolve and become more influential and visible within organizations in all industries. Business leaders are placing greater emphasis on...

    • Downloads: 171
    • Rating:
  • For Security & Risk Professionals

    Report:Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook

    For security and risk (S&R) leaders, pursuing continuous improvement in security architecture and operations can mean many things: keeping up with the mutating threat landscape; staying current...

    • Downloads: 242
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires Mandiant

    FireEye Emerging As A Leader In A New Breed Of Security Companies

    On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

    • Downloads: 140
  • For Security & Risk Professionals

    Report:Understand The State Of Identity And Access Management

    Benchmarks: The Identity And Access Management Playbook

    This report provides a spending and technology adoption benchmark for security and risk (S&R) executives looking to develop their organization's identity and access management (IAM) strategy....

    • Downloads: 810
    • Rating:
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 713
    • Rating:
  • For Security & Risk Professionals

    Report:Industry Spotlight: US Healthcare Security Budgets, Priorities, And Challenges

    Healthcare Providers Must Move Beyond Compliance To Improve Security

    Historically, IT security teams within US healthcare providers have had much smaller budgets than counterparts in other industries. As a result, they have struggled to implement advanced security...

    • Downloads: 192
    • Rating:
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

    • Downloads: 429
    • Rating:
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2013 To 2014

    Benchmarks: The Security Architecture And Operations Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 389
    • Rating:
  • For Security & Risk Professionals

    Report:Understand The State Of Data Security And Privacy: 2013 To 2014

    Benchmarks: Data Security And Privacy Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Forrsights Security...

    • Downloads: 1493
    • Comments: 1
    • Rating:
  • For Security & Risk Professionals

    Report:Endpoint Security Trends, Q2 2013 To Q4 2014

    New Disruptors For Endpoint Security Through 2014

    Every year, Forrester conducts a number of global surveys of IT security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

    • Downloads: 356
  • For Security & Risk Professionals

    Report:Show Me The Loot!

    Determine The Right Practices For Your Organization's BYOD Stipends

    In this age of the empowered, tech-savvy worker, more and more employees are bringing their unsecured devices to work and using them for work activities. To prepare for this tide of devices,...

    • Downloads: 200
    • Rating:
  • For Security & Risk Professionals

    Report:Understand Security And Risk Budgeting For 2013

    Benchmarks: The S&R Practice Playbook

    The global downturn has constrained security budgets for several years now, and chief information security officers (CISOs) have become accustomed to taking on more responsibilities without...

    • Downloads: 1063
  • For Security & Risk Professionals

    Report:Apps Everywhere: Understanding The Need For Mobile Application Management

    Integrate Mobile Application Management Into Your Mobility Strategy

    Proactive IT executives are extending their mobility strategies beyond deploying and managing mobile devices and platforms with primarily corporate email access to include a wide range of mobile...

    • Downloads: 715
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 544