Chase   Cunningham

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018

    Tools And Technology: The Security Architecture And Operations Playbook

    November 8, 2018Chase Cunningham

    In our 15-criterion evaluation of Zero Trust eXtended ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Centrify, Cisco, Cyxtera Technologies, Forcepoint, Fortinet, Illumio, Microsoft, Okta, Palo Alto Networks, Sophos, Symantec, Trend Micro, and VMware — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.

  • For Security & Risk Professionals

    REPORT: Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    October 1, 2018 Stephanie Balaouras, Chase Cunningham, Peter Cerrato

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. ZT mandates that enterprises create microperimeters of control around their sensitive data assets to gain visibility into how they use data across their ecosystem to win, serve, and retain customers. This report gives security and risk (S&R) leaders best practices and a five-step road map to realize the benefits of a Zero Trust strategy more quickly.

  • For Security & Risk Professionals

    REPORT: Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences

    September 25, 2018Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to combat: From AI-powered cyber influence campaigns to the viral spread of highly convincing fake videos, adversaries launch, control, and orchestrate attacks from outside of your secured operations — as the military calls it, "outside the wire." Security leaders must help the business protect its most valuable asset — its brand — by extending Zero Trust concepts "outside the wire."

  • For Security & Risk Professionals

    REPORT: The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook

    August 24, 2018Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way to lose sight of your ultimate goal: protecting customers and empowering the business. Zero Trust networks accomplish the dual tasks of deep, continuous data inspection across the network and lean operation and oversight — tasks that seem mutually exclusive in traditional networks. This report highlights the eight most significant ways Zero Trust boosts security and your business.

  • For Security & Risk Professionals

    REPORT: Gauge Your ZTX Security Maturity

    Assessment: The Security Architecture And Operations Playbook

    July 19, 2018Chase Cunningham

    To convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros through Forrester's ZTX maturity assessment so you can gauge where your firm is on its journey and discover which core competencies you need to strengthen or develop.

View all of Chase Cunningham's Research

Clients Who Work With Chase Cunningham Also Work With:

View all related analysts