Chase   Cunningham

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Gauge Your ZTX Security Maturity

    Assessment: The Security Architecture And Operations Playbook

    July 19, 2018Chase Cunningham

    To convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros through Forrester's ZTX maturity assessment so you can gauge where your firm is on its journey and discover which core competencies you need to strengthen or develop.

  • For Security & Risk Professionals

    REPORT: The Forrester Tech Tide™: Zero Trust Threat Prevention, Q3 2018

    25 Technologies Underpin Zero Trust Threat Prevention

    July 12, 2018 Amy DeMartine, Chase Cunningham, Joseph Blankenship, Josh Zelonis

    Zero Trust (ZT) threat prevention is increasingly critical to deny malicious attackers' access to enterprise assets. To accelerate their performance in ZT threat prevention, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support ZT threat prevention. Security pros should read this report to shape their firm's investment approach to these technologies.

  • For Infrastructure & Operations Professionals

    REPORT: Reduce Risk And Improve Security Through Infrastructure Automation

    The Bad Guys Use Automation — Fight Fire With Fire

    June 22, 2018 Chris Gardner, Joseph Blankenship, Chase Cunningham

    Today's security initiatives are impossible to execute manually. As infrastructure-as-code (IaC), edge computing, and internet-of-things (IoT) solutions proliferate, organizations must leverage automation to protect their business technology strategies. To do this, the traditionally distinct silos of infrastructure and operations (I&O) and security professionals must fuse their talents to deliver efficient risk management and compliance throughout the entire solution stack — with unprecedented speed, agility, and dependability. This is an update of a previously published report; Forrester reviews and revises it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Secure Government Networks With Forrester's Zero Trust eXtended Framework

    Build Customer Trust With Robust Security And Privacy Practices

    May 31, 2018Chase Cunningham, Heidi Shey, Alexander Spiliotes

    Government networks are under attack from all manner of threats: enemy nations, hackers, rogue assets, malicious insiders, and more. Although governments have done well combatting threats and hardening systems, perimeter-focused security paradigms create avenues of compromise and don't take full advantage of next-generation security technologies. This report helps S&R pros apply Zero Trust concepts and the Zero Trust eXtended (ZTX) framework to significantly increase insight, operational control, and security for government networks.

  • For Security & Risk Professionals

    REPORT: Using AI For Evil

    A Guide To How Cybercriminals Will Weaponize And Exploit AI To Attack Your Business

    April 16, 2018Chase Cunningham, Joseph Blankenship

    The tools of artificial intelligence (AI), from text analytics to facial recognition to machine learning (ML) platforms, are transforming almost every aspect of business from personalized customer engagement to cybersecurity. However, just as businesses can benefit from using AI for a variety of endeavors, malicious actors can use these same technologies for nefarious purposes. S&R pros need to assess the threat of weaponized AI technologies — today. The AI revolution has begun, but don't be fooled into assuming these are tools only the good guys have.

View all of Chase Cunningham's Research

Clients Who Work With Chase Cunningham Also Work With:

View all related analysts