Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Date Range








237 results in Reports

  • Security Program Governance
  • For Security & Risk Professionals

    Report:Evolve To Become The 2018 CISO Or Face Extinction

    Vision: The Security & Risk Practice Playbook

    As the role of technology leadership in the enterprise becomes more about managing third parties, battling complexity, controlling costs, supporting the business technology (BT) agenda, and aligning...

    • Downloads: 396
  • For Security & Risk Professionals

    Report:Detecting Cyberthreats With Fraud-Based Advanced Analytics Technology

    New Security Analytics Capabilities Will Replace Traditional SIEM, And Security Service Providers Will Lead The Adoption

    Security and risk (S&R) professionals know that cyberattacks are often the first step in the complex dance of credit card theft and the fraud that results. Cyberattacks take many forms and affect...

    • Downloads: 115
  • For Security & Risk Professionals

    Report:Brief: AT&T And IBM Accelerate The Move To Utility-Based Security

    Reliable And Effective Security Utilities Free Resources So That CISOs Can Focus On Customers

    AT&T and IBM announced in February a strategic alliance to provide a set of comprehensive security services that, if successful, would define the next generation of managed security services...

    • Downloads: 106
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 495
  • For Security & Risk Professionals

    Report:Extend Compliance And Risk Management To What Really Matters For Your Business

    Landscape: The Governance, Risk, And Compliance Playbook

    Governance, risk management, and compliance (GRC) programs have matured well over time. Unfortunately, this maturity has come mostly in response to new and changing regulations, which has resulted in...

    • Downloads: 130
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 667
  • For Security & Risk Professionals

    Report:Maximize Business Performance With A World-Class GRC Program

    Executive Overview: The Governance, Risk, And Compliance Playbook

    Unexpected events are at best distracting and at worst catastrophic for organizations as they strive to improve their products and increase their customer base. Risk and compliance professionals must...

    • Downloads: 563
  • For Security & Risk Professionals

    Report:Enforce A Just Culture To Fortify The Human Firewall

    Transform Impotent Policies Into The Foundation Of Your Security Program

    In the continually changing landscape of internal and external security threats, S&R professionals must constantly assess the efficacy of their security programs. Although policy is at the core of...

    • Downloads: 102
  • For Security & Risk Professionals

    Report:Market Overview: Managed Security Services, Europe, Q2 2014

    Twenty-One Providers To Consider For Managed Security Services In The European Market

    As security and risk professionals rush to deal with new business complexities and threats, they're turning to third parties to extend their organizations' security capabilities with as much...

    • Downloads: 302
  • For Security & Risk Professionals

    Report:Navigate The Future Of Identity And Access Management

    Future Look: The Identity And Access Management Playbook

    This is an update to the report of the same name originally issued to clients on March 22, 2012; it includes updated charts and new 2013 Business Technographics data and adds a discussion on Zero...

    • Downloads: 2163
  • For Security & Risk Professionals

    Report:Lessons Learned From Early Adopters Of Managed Security Services In Asia Pacific

    Rigorous Evaluation Processes And Business Alignment Are The Keys To Success

    The anatomy of a managed security service provider (MSSP) deal is the same as any other outsourcing engagement: Selecting the right service provider and aligning it with your business objectives are...

    • Downloads: 151
  • For Security & Risk Professionals

    Report:AWS Cloud Security

    AWS Takes Important Steps For Securing Cloud Workloads

    Security to and from the cloud is a hot topic. The notion that cloud technologies should not be used by large enterprises due to security concerns is rapidly fading. Security still ranks as the No. 1...

    • Downloads: 522
  • For Security & Risk Professionals

    Report:Executive Spotlight: Selling Security To The CMO

    An Outline Of CMO Priorities, And The Five Questions Every CISO Should Ask The CMO

    The age of the customer is redefining business challenges for organizations of all types. Rather than paying lip service to "customer care," they now must become "customer-obsessed" to retain market...

    • Downloads: 206
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2013 To 2014

    Benchmarks: The Security Architecture And Operations Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 502
  • For Security & Risk Professionals

    Report:TechRadar™: Enterprise Mobile Security, Q4 2013

    Road Map: The Mobile Security Playbook

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

    • Downloads: 614
  • For Security & Risk Professionals

    Report:Quick Take: Akamai Acquires Prolexic, Doubling Down On DDoS Mitigation Services

    On December 2, 2013, Akamai Technologies announced its acquisition of Prolexic Technologies, a provider (with more than 400 customers) of cloud-based DDoS protection and mitigation services for data...

    • Downloads: 138
  • For Security & Risk Professionals

    Report:Endpoint Security Trends, Q2 2013 To Q4 2014

    New Disruptors For Endpoint Security Through 2014

    Every year, Forrester conducts a number of global surveys of IT security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

    • Downloads: 464
  • For Security & Risk Professionals

    Report:Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook

    For security and risk (S&R) leaders, pursuing continuous improvement in security architecture and operations can mean many things: keeping up with the mutating threat landscape; staying current...

    • Downloads: 279
  • For Security & Risk Professionals

    Report:The CISO's Handbook — Presenting To The Board

    How To Communicate Effectively At The Highest Level

    Your ability to communicate can mean the difference between success and failure in many aspects of your professional life, and it becomes even more important when trying to get the attention of an...

    • Downloads: 926
  • For Security & Risk Professionals

    Report:Understand The State Of Data Security And Privacy: 2013 To 2014

    Benchmarks: Data Security And Privacy Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Forrsights Security...

    • Downloads: 1601
  • For Security & Risk Professionals

    Report:The Forrester Cost Model For Information Security Effectiveness — Information Security Economics 103: Measuring The Three R's

    Emergency response as a discipline extensively uses the concepts of readiness, response, and recovery — the three R's — to organize and plan efforts. Information security as a similar...

    • Downloads: 35
  • For Security & Risk Professionals

    Report:Measure Information Security Effectiveness — Information Security Economics 103

    Analyze Where You Spend Your Money Using The Three R's: Readiness, Response, And Recovery

    This is the third in a series of reports providing new methods and guidance for the financial management of information security. For many companies, security spending and budgeting is a restatement...

    • Downloads: 261
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 595
  • For Security & Risk Professionals

    Report:Create And Manage An Effective Security Governance Board

    Over the past few years, regulation, compliance, and an escalating threat landscape gradually pushed information security to mature into a formal discipline, and these drivers encouraged CISOs to...

    • Downloads: 258
  • For Security & Risk Professionals

    Report:Rescue Your Identity And Access Management Function From Stagnation And Complacency

    Continuous Improvement: The Identity And Access Management Playbook

    How do you avoid a culture of identity and access management (IAM) complacency and mediocrity in your organization? Over time, particularly in large organizations, individuals and teams get into bad...

    • Downloads: 260