Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Date Range

Role

Methodology

Analyst

Topics

Industry

Region

Vendor

233 results in Reports

  • Security Program Governance
  • For Security & Risk Professionals

    Report:Navigate The Future Of Identity And Access Management

    Future Look: The Identity And Access Management Playbook

    This is an update to the report of the same name originally issued to clients on March 22, 2012; it includes updated charts and new 2013 Business Technographics data and adds a discussion on Zero...

    • Downloads: 1866
    • Rating:
  • For Security & Risk Professionals

    Report:Lessons Learned From Early Adopters Of Managed Security Services In Asia Pacific

    Rigorous Evaluation Processes And Business Alignment Are The Keys To Success

    The anatomy of a managed security service provider (MSSP) deal is the same as any other outsourcing engagement: Selecting the right service provider and aligning it with your business objectives are...

    • Downloads: 104
  • For Security & Risk Professionals

    Report:AWS Cloud Security

    AWS Takes Important Steps For Securing Cloud Workloads

    Security to and from the cloud is a hot topic. The notion that cloud technologies should not be used by large enterprises due to security concerns is rapidly fading. Security still ranks as the No. 1...

    • Downloads: 382
  • For Security & Risk Professionals

    Report:Executive Spotlight: Selling Security To The CMO

    An Outline Of CMO Priorities, And The Five Questions Every CISO Should Ask The CMO

    The age of the customer is redefining business challenges for organizations of all types. Rather than paying lip service to "customer care," they now must become "customer-obsessed" to retain market...

    • Downloads: 163
    • Rating:
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2013 To 2014

    Benchmarks: The Security Architecture And Operations Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 389
    • Rating:
  • For Security & Risk Professionals

    Report:TechRadar™: Enterprise Mobile Security, Q4 2013

    Road Map: The Mobile Security And Operations Playbook

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

    • Downloads: 480
    • Comments: 2
  • For Security & Risk Professionals

    Report:Quick Take: Akamai Acquires Prolexic, Doubling Down On DDoS Mitigation Services

    On December 2, 2013, Akamai Technologies announced its acquisition of Prolexic Technologies, a provider (with more than 400 customers) of cloud-based DDoS protection and mitigation services for data...

    • Downloads: 107
    • Rating:
  • For Security & Risk Professionals

    Report:Endpoint Security Trends, Q2 2013 To Q4 2014

    New Disruptors For Endpoint Security Through 2014

    Every year, Forrester conducts a number of global surveys of IT security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

    • Downloads: 356
  • For Security & Risk Professionals

    Report:Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook

    For security and risk (S&R) leaders, pursuing continuous improvement in security architecture and operations can mean many things: keeping up with the mutating threat landscape; staying current...

    • Downloads: 242
  • For Security & Risk Professionals

    Report:The CISO's Handbook — Presenting To The Board

    How To Communicate Effectively At The Highest Level

    Your ability to communicate can mean the difference between success and failure in many aspects of your professional life, and it becomes even more important when trying to get the attention of an...

    • Downloads: 866
  • For Security & Risk Professionals

    Report:Understand The State Of Data Security And Privacy: 2013 To 2014

    Benchmarks: Data Security And Privacy Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Forrsights Security...

    • Downloads: 1493
    • Comments: 1
    • Rating:
  • For Security & Risk Professionals

    Report:Measure Information Security Effectiveness — Information Security Economics 103

    Analyze Where You Spend Your Money Using The Three R's: Readiness, Response, And Recovery

    This is the third in a series of reports providing new methods and guidance for the financial management of information security. For many companies, security spending and budgeting is a restatement...

    • Downloads: 233
  • For Security & Risk Professionals

    Report:The Forrester Cost Model For Information Security Effectiveness — Information Security Economics 103: Measuring The Three R's

    Emergency response as a discipline extensively uses the concepts of readiness, response, and recovery — the three R's — to organize and plan efforts. Information security as a similar...

    • Downloads: 27
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 505
    • Rating:
  • For Security & Risk Professionals

    Report:Evolve To Become The 2018 CISO Or Face Extinction

    The Progression Of Security Leadership Places Existing CISOs In Peril

    As the role of technology leadership in the enterprise becomes more about managing third parties, battling complexity, controlling costs, and aligning with business strategy, the role of the CISO is...

    • Downloads: 343
    • Rating:
  • For Security & Risk Professionals

    Report:Create And Manage An Effective Security Governance Board

    Over the past few years, regulation, compliance, and an escalating threat landscape gradually pushed information security to mature into a formal discipline, and these drivers encouraged CISOs to...

    • Downloads: 235
  • For Security & Risk Professionals

    Report:Rescue Your Identity And Access Management Function From Stagnation And Complacency

    Continuous Improvement: The Identity And Access Management Playbook

    How do you avoid a culture of identity and access management (IAM) complacency and mediocrity in your organization? Over time, particularly in large organizations, individuals and teams get into bad...

    • Downloads: 226
    • Rating:
  • For Security & Risk Professionals

    Report:Measuring Security Awareness To Enhance The Human Firewall

    How To Measure The Effectiveness Of Your Security Awareness Program

    The importance of the human aspect of information security has long been recognized, and CISOs have reacted by peddling the security message to all who will listen, and many who won't; yet still we...

    • Downloads: 267
    • Rating:
  • For Security & Risk Professionals

    Report:Forrester's Security Awareness Assessment

    The Forrester Security Awareness Assessment Tool was created to accompany the report entitled "Measuring Security Awareness To Enhance The Human Firewall." Recognizing the problems of measuring...

    • Downloads: 40
    • Rating:
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 713
    • Rating:
  • For Security & Risk Professionals

    Report:Empower The Workforce To Empower The Security Team

    Continuous Improvement: The Data Security And Privacy Playbook

    When it comes to data security and privacy, Forrester has observed in client interactions time and time again that security teams remain overly fixated on the wrong adversary: their own organization....

    • Downloads: 213
  • For Security & Risk Professionals

    Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

    But Only If Cisco Doesn't Strangle Innovation

    On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

    • Downloads: 191
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Security And Risk, Q1 To Q4 2012

    Forrester's security and risk (S&R) team fields hundreds of inquiries every month. We use these inquiries as a barometer to track client challenges and to gauge client interest in the various topics...

    • Downloads: 328
    • Rating:
  • For Sales Enablement Professionals

    Report:Buyer Role Profile: VP Of Security

    This report is designed to give professionals in sales enablement an introduction to the VP of security role as well as an overview of the general concerns facing people in that position. The...

    • Downloads: 169
    • Rating:
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 373
    • Rating: