Chase   Cunningham

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: The Zero Trust eXtended (ZTX) Ecosystem

    Extending Zero Trust Security Across Your Digital Business

    January 19, 2018Chase Cunningham

    Security pros are still scrambling for new and effective ways to protect their networks and combat the impacts of hacking and exploitation. With Forrester's Zero Trust Model of information security, you can develop robust prevention, detection, and incident response capabilities to protect your company's vital digital business ecosystem. This report will help security pros understand the technologies best suited to empowering and extending their Zero Trust initiatives and will detail how Forrester sees this model and framework growing and evolving.

  • For Security & Risk Professionals

    REPORT: Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    December 14, 2017 Stephanie Balaouras, Chase Cunningham, Peter Cerrato

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. Zero Trust mandates the creation of microperimeters of control around an enterprise's sensitive data assets and provides visibility into how it uses data across its ecosystem to win, serve, and retain customers. This report provides security leaders with best practices and a five-step process to realize the benefits of a Zero Trust strategy more quickly. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Develop Your Zero Trust Workforce Security Strategy

    Strategic Plan: The Security Architecture And Operations Playbook

    December 5, 2017Chase Cunningham

    The concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve Zero Trust: securing your users. Today, most security teams fail to appreciate how much power and trust they grant users. This report will help you enhance your security posture and move your team closer to a complete Zero Trust architecture by guiding you through critical decisions and breaking down the essential strategies and technologies.

  • For Security & Risk Professionals

    REPORT: The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook

    November 1, 2017Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros devote resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way to lose sight of your ultimate goal: protecting customers and empowering the business. Zero Trust networks accomplish the dual tasks of deep, continuous data inspection across the network and lean operation and oversight — tasks that seem mutually exclusive in traditional networks. This report highlights the eight most significant ways Zero Trust boosts security and your business. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Artificial Intelligence Will Revolutionize Cybersecurity

    But Security Leaders Must View All Vendor Claims With Skepticism

    September 14, 2017Chase Cunningham, Joseph Blankenship, Mike Gualtieri

    Security vendors are inundating CISOs with products purporting to use artificial intelligence to dramatically improve the accuracy and speed of both threat detection and response. However, much of this messaging is confusing, even misleading. How do you know fact from fiction from enthusiastic marketing? S&R pros should read this report to understand what is really possible with AI today to take cybersecurity efforts to the next level.

View all of Chase Cunningham's Research

Clients Who Work With Chase Cunningham Also Work With:

View all related analysts