Khalid Kark

Vice President, Research Director serving CIOs

Khalid serves CIOs, leading the team responsible for delivering research and advisory services to IT leaders. He provides strategic guidance and advice to clients in the areas of organization design; governance, risk, and compliance (GRC); and emerging technologies. His research focuses on helping clients mature from an IT-centric role in their organizations to a business-embedded one. Khalid has extensive experience working with the government, healthcare, and financial services sectors.

Khalid has been widely quoted in the press, including such media outlets as MSNBC, The Boston Globe, CIO Magazine, and The Wall Street Journal. Khalid is a frequent keynote speaker at national and international conferences.

Previous Work Experience

Before joining Forrester, Khalid worked for a global insurance company where he provided leadership and direction for the information security program. Prior to this, he worked as a consultant and program manager at a telco, helping clients with IT strategy and architecture.

Education

Khalid holds master's degree in networks and telecommunications management from the University of Pennsylvania and a bachelor's degree in business and economics from the University of Texas at Austin.

Refine your results

Date Range

Role

Methodology

Topics

Industry

Region

Vendor

28 results in Reports

  • Khalid Kark
  • Security Operations
  • For Security & Risk Professionals

    Report:Assess Your Security Program With Forrester's Information Security Maturity Model

    Assessment Framework: The S&R Practice Playbook

    This report outlines the assessment framework associated with Forrester's solution for security and risk (S&R) executives. The report is designed to help CISOs as they continue working their way...

    • Downloads: 2449
    • Comments: 2
    • Rating:
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your 2011 Security Strategy

    Governance, Maturity, And Analytics Are The Major Themes For 2011

    Every winter Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on hundreds of client inquiries, numerous consulting...

    • Downloads: 2134
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your 2010 Information Security Strategy

    As we enter 2010 and look ahead, the challenges we face are very familiar. The technology has been changing as usual, the business has been demanding more and more from security professionals as...

    • Downloads: 2079
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your 2009 Information Security Strategy

    Many security predictions paint a doomsday scenario where a crippling cyberattack will leave us all reeling from its effects or Supervisory Control and Data Acquisition (SCADA) systems...

    • Downloads: 1580
  • For Security & Risk Professionals

    Report:The Forrester Information Security Maturity Model

    The Forrester Information Security Maturity Model is a framework that consists of four main security domains (oversight, technology, process, and people) with 25 functions and 123 low-level...

    • Downloads: 73
    • Comments: 2
    • Rating:
  • For Security & Risk Professionals

    Report:Articulating The Business Value Of Information Security

    Many CISOs struggle to articulate the value of their security programs and justify the security budget to business and executive management. This problem was acutely evident in the current economic...

    • Downloads: 1344
  • For Security & Risk Professionals

    Report:The Evolving Security Organization

    Defining An Appropriate Organizational Structure And Staffing Model For Information Security

    In the past few years, the siloed IT security role has rapidly added to its responsibilities and transformed itself into the cross-functional information risk management role. This has left many...

    • Downloads: 985
  • For Security & Risk Professionals

    Report:Security And Privacy Essentials For IT Outsourcing Deals

    Managing Risk While Ceding Operational Control

    Global spending on IT services and outsourcing was estimated at $488 billion in 2007 and is predicted to rise an additional 9% in 2008. At $120 billion, IT outsourcing constitutes roughly 25% of this...

    • Downloads: 950
  • For Security & Risk Professionals

    Report:Security Organization Trends 2010

    The scope of IT security continues to expand, and with it the visibility of the security organization is rising. Most security organizations now regularly engage with executives and business...

    • Downloads: 41
  • For Security & Risk Professionals

    Report:Defining A High-Level Security Framework

    Putting Basic Security Principles To Work

    A comprehensive security framework boils down to three familiar basic components: people, technology, and process. When correctly assembled, the people, technology, and process elements of your...

    • Downloads: 856
  • For Infrastructure & Operations Professionals

    Report:IT Compliance: From Painful To Pleasant

    With increasing workforce mobility and the extension of the business supply chain globally, organizations are struggling to keep up with increasing corporate and regulatory compliance requirements....

    • Downloads: 775
  • For Security & Risk Professionals

    Report:Healthcare Security: Ready Or Not, Here It Comes

    Applying Five Cardinal Rules Of Information Security To Healthcare Companies

    The US Congress enacted the Health Insurance Portability and Accountability Act (HIPAA) in 1996. The security and privacy rules took effect in 2003, but none of this really improved the overall state...

    • Downloads: 935
  • For Security & Risk Professionals

    Report:CISO Handbook: How To Plan For A Security Breach

    Many chief information security officers (CISOs) are forced to respond to security breaches with little knowledge or planning. Not only is it important to have the tools for responding to security...

    • Downloads: 834
  • For Security & Risk Professionals

    Report:The New Threat Landscape: Proceed With Caution

    Understand The New Threat Paradigm To Make Your Responses More Effective

    The information security threat landscape is changing rapidly, and many security organizations are struggling to keep up with the changing nature, complexity, and scale of attacks. Not only is it...

    • Downloads: 734
  • For Security & Risk Professionals

    Report:Seven Habits Of Effective CISOs

    The chief information security officer (CISO) role in an organization has evolved beyond recognition in the past few years. Today, most CISOs have decreasing responsibility for day-to-day security...

    • Downloads: 732
  • For Security & Risk Professionals

    Report:Real World Example: Eastman Kodak Security Metrics Dashboard

    Includes a real world example of a security metrics dashboard courtesy of Eastman Kodak Company.

    • Downloads: 34
  • For Security & Risk Professionals

    Report:2008 CISO Priorities: The Right Objectives But The Wrong Focus

    There is a definite chasm between chief information security officers' (CISOs') priorities and their responsibilities. CISOs understand that their priorities need to align with business objectives,...

    • Downloads: 612
  • For Security & Risk Professionals

    Report:Security Budgets, Reporting, And Responsibilities Are All Rising In 2009

    Security professionals have been complaining for years about their inability to influence the organization and that information security is a thankless job. Recent conversations with CISOs and data...

    • Downloads: 618
  • For Security & Risk Professionals

    Report:CISO Handbook: Ten Tips For Building A Successful Security Steering Committee

    As information security matures into a formal discipline, it needs formal governance mechanisms. Over the past 12 months, Forrester has seen increased interest and activity in establishing security...

    • Downloads: 700
  • For Security & Risk Professionals

    Report:Case Study: Intel Implements People As The New Perimeter To Mitigate Social Computing Risks

    Intel, a large global technology provider, has more than 86,000 employees worldwide. It's only natural that, working for a technology provider, Intel's employees are generally ahead of the curve in...

    • Downloads: 590
  • For Security & Risk Professionals

    Report:2008 CISO Agenda: Embrace Change

    Ten Changes To Existing Practices That Will Guarantee Your Success

    It's amazing how little progress we see year after year. As we look back to early 2007, or even 2006, not a lot has changed in what's expected of the security organization and what the chief...

    • Downloads: 461
  • For Security & Risk Professionals

    Report:Case Study: Eastman Kodak Company Takes A Tiered-Risk Approach To Security Metrics

    Eastman Kodak's matrixed organizational structure enables its business units to act quickly in response to changing business conditions, but it also creates a decentralized security function....

    • Downloads: 539
  • For Security & Risk Professionals

    Report:Managing The Expansion Of Security Responsibilities During Economic Uncertainty

    In the past few years, the siloed IT security role has rapidly added to its responsibilities and transformed itself into the cross-functional information risk management role. This has left many...

    • Downloads: 4
  • For Security & Risk Professionals

    Report:What President-Elect Obama's Cybersecurity Agenda Means For Security Vendors

    President-elect Barack Obama has acknowledged that leaving America's information systems unprotected could lead to a "crippling blow" to our economy. He has promised to make cybersecurity his top...

    • Downloads: 425
  • For Security & Risk Professionals

    Report:Case Study: DTCC Implements A Process-Based Approach To Security Metrics

    Jim Routh at DTCC took a unique approach in developing his security metrics program. He identified all of the processes that the security team was responsible for and then defined a process owner for...

    • Downloads: 404