Bryan Wang

VP & PA Country Manager - China serving CIOs

Bryan serves CIO Professionals and leads a research team that helps Forrester's Business Technology and Marketing & Strategy clients in China as well as the telecom and networking sector for the Asia Pacific region. Bryan offers strategic advice and guidance to clients in the areas of mega trends, emerging technologies, digital consumer trends, digital disruptions, and digital transformation strategies across technology management, marketing, and other business units at client organizations in the Greater China region. He also helps regional clients with their communication services and infrastructure strategies in Asia Pacific.

Bryan is a highly sought-after contributor to the media's coverage of the tech industry and regularly speaks at industry events in China and Asia.

Previous Work Experience

Bryan came to Forrester through its acquisition of Springboard Research, where he has established its China operation. Before joining Springboard, Bryan was the regional managing director for In-Stat's operations in Asia, where he was responsible for all research and consulting business. Prior to In-Stat, Bryan was a program manager for Frost & Sullivan, focusing on networking and telecom services research for the Asia Pacific region.

Education

Bryan graduated with a bachelor's degree in computing from the National University of Singapore.

Refine your results

Date Range

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

107 results in Everything

  • Rick Holland
  • For Security & Risk Professionals

    Blog:Introducing Forrester’s Targeted-Attack Hierarchy Of Needs

    We recently published part 1 of a new series designed to help organizations build resiliency against targeted attacks. In the spirit of Maslow, we designed our Targeted-Attack Hierarchy Of...

    • For Security & Risk Professionals

      Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

      But Only If Cisco Doesn't Strangle Innovation

      On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

      • Downloads: 231
    • For Security & Risk Professionals

      Blog:LG Is Learning An Embarrassing Privacy Lesson In The Age Of The Customer

      In a recent report titled “Technology Management In The Age Of The Customer,” Forrester defines the Age of the Customer as: "A 20-year business cycle in which the most successful...

      • For Security & Risk Professionals

        Blog:Are You Down With CIP (Critical Infrastructure Protection)?

        I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

        • For Security & Risk Professionals

          Charts & Figures:Take Advantage Of Executive Awareness

          Assessment: The Security Architecture And Operations Playbook

        • For Security & Risk Professionals

          Report:Know Your Adversary

          Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

          In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. Then in May 2014, the US...

          • Downloads: 188
        • For Security & Risk Professionals

          Charts & Figures:NAV Considerations, Key Evaluation Criteria, And Solutions

        • For Security & Risk Professionals

          Report:Defend Your Data From Cyberthreats With A Zero Trust Network

          Executive Overview: The Security Architecture And Operations Playbook

          We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

          • Downloads: 817
        • For Security & Risk Professionals

          Report:Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

          When Selecting Security Vendors, Look For Specialized Industry Expertise

          For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

          • Downloads: 159
        • For Security & Risk Professionals

          Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

          Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

          On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

          • Downloads: 112
        • For Security & Risk Professionals

          Blog:The Militarization Of Information Security

          Does something like this sound familiar? "We need to find, fix, finish, exploit, analyze, & disseminate this intrusion set along the kill chain via force multipliers so we can observe, orient,...

          • For Security & Risk Professionals

            Blog:Point Solutions Must Die

            Last year I wrote a blog post titled, “Incident Response Isn’t About Point Solutions; It Is About An Ecosystem."  This concept naturally extends beyond incident response to broader...

            • For Security & Risk Professionals

              Charts & Figures:Intelligence Sources

            • For Security & Risk Professionals

              Charts & Figures:The Targeted-Attack Hierarchy Of Needs

            • For Security & Risk Professionals

              Blog:Observations From Black Hat - More Defense Please

              Last week I had the opportunity to attend the 15th annual Black Hat security conference in Las Vegas. I have attended DEFCON in the past, but never Black Hat. The conference has grown significantly...

              • For Security & Risk Professionals

                Charts & Figures:: Firms Increasingly Prefer Software-As-A-Service For Email Security Management

                The Nine Providers That Matter Most And How They Stack Up

              • For Security & Risk Professionals

                Blog:Counter-Strike?

                On Monday the Wall Street Journal ran a story on hacking back titled, “Support Grows to Let Cybertheft Victims Hack Back.”  The article describes a growing desire to permit the...

                • For Security & Risk Professionals

                  Blog:Kicking off the Forrester Web Content Security Wave

                  We are about to kickoff our next Forrester Wave on web content security.  The inclusion criteria for vendor prequalification will be sent out within the next two weeks. We will be focusing on...

                  • For Security & Risk Professionals

                    Report:Quick Take: BAE Systems Buys SilverSky

                    Acquisition Extends BAE's Analytics And Threat Intelligence Into Commercial Markets

                    BAE Applied Intelligence — a subsidiary of BAE Systems — has made the next logical step to operationalize its security analytics and threat intelligence offerings by acquiring managed...

                    • Downloads: 59
                  • For Security & Risk Professionals

                    Report:Use Actionable Threat Intelligence To Protect Your Digital Business

                    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective

                    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

                    • Downloads: 297
                  • For Security & Risk Professionals

                    Blog:You Should Attend Next Year’s RSA Conference Innovation Sandbox

                    Last week I attended the RSA Conference (RSAC) Innovation Sandbox for the first time.  Not only was I an attendee, but I also was fortunate enough to host a CTO panel during the event. For...

                    • For Security & Risk Professionals

                      Report:Job Description: Security Architect

                      Organization: The Security Architecture And Operations Playbook

                      We designed this report for security and risk (S&R) executives who are rethinking their security architecture and working to improve the effectiveness of their operations, to help them hire one of...

                      • Downloads: 897
                    • For Security & Risk Professionals

                      Blog:Actionable Intelligence, Meet Terry Tate, Office Linebacker

                      sdfasdfaasdfThe #Forrester Security & Risk team is hiring. We are looking for consultants to join our team bit.ly/M9gWS5 #infosecasdfasdasdfasdddsadfas We are now less than two weeks away from our...

                      • For Security & Risk Professionals

                        Report:Planning For Failure

                        An Effective Incident Management Program Is Essential To Help You Stay In Business

                        S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

                        • Downloads: 928