Claire   O'Malley

Claire O'Malley

Researcher Serving Security & Risk Professionals

Claire serves Security & Risk (S&R) Professionals. Her research supports governance, risk, and compliance (GRC) initiatives, security program governance, the adoption of security frameworks, and the sourcing of security services. She also helps clients identify and evaluate geopolitical risk and its implications on their cybersecurity posture.

Previous Work Experience

Prior to her role as a researcher, Claire served as senior research associate on the S&R team. During that time, Claire supported analysts with research on GRC, security program governance, and overall security market trends.

Education

Claire earned a B.A. in international relations and political science from The College Of Wooster. She also has a minor in Latin American studies.

Claire O'Malley

Researcher Serving Security & Risk Professionals

Claire serves Security & Risk (S&R) Professionals. Her research supports governance, risk, and compliance (GRC) initiatives, security program governance, the adoption of security frameworks, and the sourcing of security services. She also helps clients identify and evaluate geopolitical risk and its implications on their cybersecurity posture.

Previous Work Experience

Prior to her role as a researcher, Claire served as senior research associate on the S&R team. During that time, Claire supported analysts with research on GRC, security program governance, and overall security market trends.

Education

Claire earned a B.A. in international relations and political science from The College Of Wooster. She also has a minor in Latin American studies.

Claire O'Malley's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Best Practices: Recruiting And Retaining Women In Cybersecurity

    Address Skill Shortages With A More Inclusive Culture

    February 22, 2018Claire O'Malley, Stephanie Balaouras

    Despite its urgent and ever-growing importance, the cybersecurity industry is projecting a staffing shortage of 1.8 million unfilled jobs globally by 2022. Meanwhile, women represent just 11% of cybersecurity professionals worldwide. If chief information security officers (CISOs) hope to address their staff and skill shortage, they will need to actively recruit, retain, and promote women. In this report, we share best practices for security leaders to create a more welcoming culture for women in cybersecurity.

  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Governance, Risk, And Compliance Platforms, Q1 2018

    The 14 Providers That Matter Most And How They Stack Up

    February 15, 2018 Renee Murphy, Claire O'Malley

    In our 23-criteria evaluation of governance, risk, and compliance (GRC) platforms, we identified the 14 most significant ones — ACL, Enablon, IBM, LogicManager, MetricStream, Nasdaq, NAVEX Global, Riskonnect, RSA, Rsam, SAI Global, SAP, ServiceNow, and Thomson Reuters — and researched, analyzed, and scored them. This report shows how each provider measures up and helps risk management professionals make the right choice.

  • For Security & Risk Professionals

    REPORT: Protect Your Executives From Cybercriminals, Fraudsters, And Themselves

    Key Steps To Shield Business Leaders From Cyberattacks, Social Engineering, And Virtual Imposters

    February 6, 2018 Stephanie Balaouras, Claire O'Malley, Heidi Shey

    Business executives are frequent, easy, and attractive targets for cybercriminals. In this report, we explain how cybercriminals and fraudsters target business leaders and how those executives' own activities can magnify the risk and the damage. Next, we outline best practices that security and risk (S&R) teams can use to educate and protect executives against these attacks and scams.

  • For Security & Risk Professionals

    REPORT: Harden Your Human Firewall

    Continuous Improvement: The S&R Practice Playbook

    February 2, 2018 Nick Hayes, Claire O'Malley

    Human mistakes can render even the most sophisticated technical security controls useless. However, you can reduce the inherent vulnerability of your workforce and even turn staff into a strong security asset. This requires more than just training and awareness; your focus should be effecting behavioral change. In this report, we share lessons from CISOs, training firms, and communications experts to describe an approach to reducing security risks with your firm's employees.

  • For Security & Risk Professionals

    REPORT: Best Practices: Mitigating Insider Threats

    Processes: The Security Architecture And Operations Playbook

    November 2, 2017 Joseph Blankenship, Claire O'Malley

    Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data in order to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. This report describes how to build an insider threat program. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

View all of Claire O'Malley's Research

Clients Who Work With Claire O'Malley Also Work With:

View all related analysts