Chase   Cunningham

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham

Principal Analyst Serving Security & Risk Professionals

Dr. Chase Cunningham primarily contributes to Forrester's offerings for Security & Risk Professionals. His research guides client initiatives related to security operations center (SOC) planning and optimization, counter-threat operations, encryption, network security, and Zero Trust concepts and implementation. He helps senior technology executives with their plans to leverage comprehensive security controls and the use of a variety of standards, frameworks, and tools to enable secure business operations. His research focuses on integrating security into operations; leveraging advanced security solutions; empowering operations through artificial intelligence and machine learning; and planning for future growth within secure systems.

Previous Work Experience

Prior to joining Forrester, Chase served as a director of cyber threat intelligence operations at Armor. He was the computer network exploitation lead for Telecommunication Systems and the chief of cyber analytics for Decisive Analytics. Dr. Cunningham is a retired U.S. Navy chief with more than 19 years’ experience in cyberforensic and cyberanalytic operations. He has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI, and other government agencies. In those roles, he helped clients operationalize security controls; install and leverage encryption and analytic systems; and grow and optimize their security operations command systems and centers.

Education

Chase holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace.

Chase Cunningham's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Use Advanced Encryption For Data Security

    Landscape: The Data Security And Privacy Playbook

    January 30, 2019Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders can't be completely risk averse; they must instead secure their data with the right tools for the right circumstances. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.

  • For Security & Risk Professionals

    REPORT: The Zero Trust eXtended Ecosystem: Networks

    Strategic Plan: The Security Architecture And Operations Playbook

    January 2, 2019Chase Cunningham

    Anywhere packets pass is a place that can offer cybercriminals command and control of critical network assets, but it can also enable better security and ultimately help to build a Zero Trust infrastructure. This report will break down the specific network tooling and packet level controls that security pros should consider as they move their organizations closer to a Zero Trust system.

  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018

    Tools And Technology: The Security Architecture And Operations Playbook

    November 8, 2018Chase Cunningham

    In our 15-criterion evaluation of Zero Trust eXtended ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Centrify, Cisco, Cyxtera Technologies, Forcepoint, Fortinet, Illumio, Microsoft, Okta, Palo Alto Networks, Sophos, Symantec, Trend Micro, and VMware — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.

  • For Security & Risk Professionals

    REPORT: Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    October 1, 2018 Stephanie Balaouras, Chase Cunningham, Peter Cerrato

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. ZT mandates that enterprises create microperimeters of control around their sensitive data assets to gain visibility into how they use data across their ecosystem to win, serve, and retain customers. This report gives security and risk (S&R) leaders best practices and a five-step road map to realize the benefits of a Zero Trust strategy more quickly.

  • For Security & Risk Professionals

    REPORT: Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences

    September 25, 2018Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to combat: From AI-powered cyber influence campaigns to the viral spread of highly convincing fake videos, adversaries launch, control, and orchestrate attacks from outside of your secured operations — as the military calls it, "outside the wire." Security leaders must help the business protect its most valuable asset — its brand — by extending Zero Trust concepts "outside the wire."

View all of Chase Cunningham's Research

Clients Who Work With Chase Cunningham Also Work With:

View all related analysts