Chase   Cunningham

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Using AI For Evil

    A Guide To How Cybercriminals Will Weaponize And Exploit AI To Attack Your Business

    April 16, 2018Chase Cunningham, Joseph Blankenship

    The tools of artificial intelligence (AI), from text analytics to facial recognition to machine learning (ML) platforms, are transforming almost every aspect of business from personalized customer engagement to cybersecurity. However, just as businesses can benefit from using AI for a variety of endeavors, malicious actors can use these same technologies for nefarious purposes. S&R pros need to assess the threat of weaponized AI technologies — today. The AI revolution has begun, but don't be fooled into assuming these are tools only the good guys have.

  • For Security & Risk Professionals

    REPORT: The Zero Trust eXtended (ZTX) Ecosystem

    Strategic Plan: The Security Architecture And Operations Playbook

    January 19, 2018Chase Cunningham

    Security pros are still scrambling for new and effective ways to protect their networks and combat the impacts of hacking and exploitation. With Forrester's Zero Trust Model of information security, you can develop robust prevention, detection, and incident response capabilities to protect your company's vital digital business ecosystem. This report will help security pros understand the technologies best suited to empowering and extending their Zero Trust initiatives and will detail how Forrester sees this model and framework growing and evolving.

  • For Security & Risk Professionals

    REPORT: Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    December 14, 2017 Stephanie Balaouras, Chase Cunningham, Peter Cerrato

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. Zero Trust mandates the creation of microperimeters of control around an enterprise's sensitive data assets and provides visibility into how it uses data across its ecosystem to win, serve, and retain customers. This report provides security leaders with best practices and a five-step process to realize the benefits of a Zero Trust strategy more quickly. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: The Zero Trust eXtended (ZTX) Ecosystem: People

    Develop Your Zero Trust Workforce Security Strategy

    December 5, 2017Chase Cunningham

    The concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve Zero Trust: securing your users. Today, most security teams fail to appreciate how much power and trust they grant users. This report will help you enhance your security posture and move your team closer to a complete Zero Trust architecture by guiding you through critical decisions and breaking down the essential strategies and technologies.

  • For Security & Risk Professionals

    REPORT: The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook

    November 1, 2017Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros devote resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way to lose sight of your ultimate goal: protecting customers and empowering the business. Zero Trust networks accomplish the dual tasks of deep, continuous data inspection across the network and lean operation and oversight — tasks that seem mutually exclusive in traditional networks. This report highlights the eight most significant ways Zero Trust boosts security and your business. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

View all of Chase Cunningham's Research

Clients Who Work With Chase Cunningham Also Work With:

View all related analysts