Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Role

Methodology

Analyst

Topics

Industry

Region

Vendor

8 results in Reports

  • Past 12 months
  • Security, Risk and Compliance
  • Financial Services
  • For Security & Risk Professionals

    Report:CISOs Need To Add Customer Obsession To Their Job Description

    Until recently, consumers haven't been overly concerned with cybersecurity. Credit card laws and policies protect customers from theft and fraud by limiting or negating cardholder liability; similar...

    • Downloads: 31
  • For eBusiness & Channel Strategy Professionals

    Report:2013 UK Bank Secure Website Rankings

    Barclays Offers The Most Extensive Online Banking Functionality

    Digital teams at banks should continuously evaluate their secure websites to look for improvements to content and functionality. These teams need to know how their online banking functionality...

    • Downloads: 146
  • For Application Development & Delivery Professionals

    Report:Key Building Blocks For Financial Risk Management In Banking

    Support Regulatory Compliance With Targeted Or Broad And Rich Risk Management Solutions

    Supervisory regulation has been a key topic for financial services firms for decades. However, it moved to center stage during the 2008 financial crisis, and Forrester surveys show that coping with...

    • Downloads: 155
  • For Sourcing & Vendor Management Professionals

    Report:Demystifying BYOD In Europe

    BYOD Creates Challenges — But There Are Paths To Compliant Productivity

    Much has been written and debated about the rising popularity of bring-your-own-device (BYOD) throughout the world. Whereas BYOD policies in North America have become more mature, the subject of BYOD...

    • Downloads: 202
  • For Security & Risk Professionals

    Report:Big Data In Fraud Management: Variety Leads To Value And Improved Customer Experience

    Forrester defines "big data" as the techniques and technologies that make handling data at extreme scale affordable. The hope is that organizations can mine the huge volume and variety of data they...

    • Downloads: 438
  • For Security & Risk Professionals

    Report:Quick Take: IBM Buys Trusteer And, With It, Better, More-Intelligent Data-Centric Security

    Prospects Are Good For This Acquisition, Which Matches Complementary Strengths

    On August 15, 2013, IBM announced its acquisition, for an undisclosed sum, of Trusteer, a fraud protection and cybersecurity firm focused primarily on providing services to banking customers. With...

    • Downloads: 163
  • For Application Development & Delivery Professionals

    Report:Information Fabric 3.0

    Forrester's Reference Architecture For Enterprise Data Virtualization

    Enterprises face growing challenges in bridging disparate sources of data to fuel analytics, predictive analytics, real-time insights, and applications. The data explosion is also exacerbating...

    • Downloads: 852
    • Comments: 2
    • Rating:
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Security And Risk, Q1 To Q4 2012

    Forrester's security and risk (S&R) team fields hundreds of inquiries every month. We use these inquiries as a barometer to track client challenges and to gauge client interest in the various topics...

    • Downloads: 328
    • Rating: