This report provides security leaders with recommendations for handling the challenges they will encounter in the next 12 months.
Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
The 2024 edition of our annual top security recommendations advises security leaders to tackle changes in tech, the threat landscape, and potential consequences facing the organization and themselves by acting quickly and marshalling the necessary resources and allies to ensure business growth in 2024. Join us in this webinar to go over highlights from our 2024 recommendations and hear directly from the analysts making these calls.
Key takeaways:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
This report provides security leaders with recommendations for handling the challenges they will encounter in the next 12 months.
This report outlines how security tools are incorporating generative AI and what security and risk pros need to prepare for as this technology evolves.
This report describes the top five cybersecurity threats organizations will face in 2024 and provides strategies to address them.
With a high-performance IT strategy, you’ll tailor your capabilities — technologies, skills, and practices — to continuously improve business outcomes with technology. To start your journey to high-performance IT, assess your business needs, your technology's current styles, and your ability to execute. Use these assessments to identify gaps in your execution and technology capabilities and to plot your investment strategy. Use assessments for annual planning, to respond to a sudden business shift, or to address the needs of a specific business initiative.Key takeaways: Learn how to assess your high-performance IT readiness.Learn how best to identify a dominant business need and the best IT style to achieve it.Discover how, empowered by this analysis, you are ready to pivot your investment budget to the capabilities and operating model that will drive the greatest business impact.Target audience level: intermediate
This webinar was originally scheduled for April 17th, 2024.The specter of attackers going wild with the possibilities of generative AI looms large in cybersecurity-focused media coverage. More importantly, generative AI has the potential to dramatically change the way security practitioners operate. This webinar discusses how security tools are incorporating generative AI and shows security and risk leaders what they need to prepare for as this technology evolves.Key takeaways:Explore the current state of generative AI in security tools.Understand how security tools are leveraging generative AI across domains (detection and response, governance, Zero Trust, identity).Learn actionable next steps to help your team get value out of generative AI.Target audience level: all levels
Have you ever encountered tall poppy syndrome? It’s a social phenomenon that occurs when talented individuals are resented or criticized because their achievements elevate them above their peers. This harmful mindset stifles team growth, damages morale, and creates a culture of mediocrity and conformity.Overcoming tall poppy syndrome requires extraordinary operations leaders to effectively navigate challenges and drive success while creating a positive and productive environment.Key takeaways:Explore the critical operations leadership skills required in today’s dynamic and rapidly changing business environment.Explore delving into four primary leadership skills operations leaders must focus on for success.Learn how to inspire and motivate a team and drive a supportive culture.Target audience level: all levels
Confused about secure access service edge (SASE), Zero Trust edge (ZTE), and security service edge (SSE)? The two most popular analysts of the modern era break down the differences, help you choose a vendor, and finally unite networking and security!Key takeaways:Understand the differences between SASE, ZTE, and SSE.Learn how to choose the architecture and vendor that is right for your organization.Target audience level: intermediateVendors: Broadcom, Cisco Systems, Cloudflare, Forcepoint, Fortinet, iBoss, Lookout, Netskope, Microsoft, Palo Alto Networks, Skyhigh Security, Zscaler
In 2023, the top 35 global data breaches exposed about 1.5 billion records, and the top 35 global privacy abuses led to almost $2.6 billion in fines. What can security leaders learn from these incidents? Join several members of Forrester’s security and risk team for a deep dive into key trends and a robust discussion of lessons learned.Key takeaways: Discover key trends in the top data breaches and privacy abuses of 2023.Use lessons learned from these events to support proposed security initiatives with your executive team.Learn how to justify your team’s involvement in key partnerships and business initiatives and manage your own risk as a security leader.Target audience level: beginner
Forrester's The Future Of Cloud report describes how cloud will become abstracted, intelligent, and composable. But that's not in the far-off future — it's right now. AI is changing the value proposition of cloud. Cloud-native technologies such as Kubernetes already provide a common abstraction layer that spans on-premises and edge computing as well as public cloud providers. Intelligence — the AI embedded within cloud services — provides higher levels of functionality for operators, incorporating infrastructure as code and other automation. All this is enabling cloud customers to begin composing their own clouds in various ways. In this webinar, we discuss why and how cloud customers can shape their own future.Key takeaways: Hear about the various ways in which cloud-native infrastructure is bringing new scale and capacity for innovation to enterprise-class IT.Learn how AI is rapidly reshaping cloud operations.Explore how organizations are composing their own clouds based on public cloud infrastructure through various means, including multicloud container platforms, cloud-based platforms for data, and enterprise apps as well as software as a service (SaaS).Target audience level: all levels