Derek Miers

Principal Analyst serving Enterprise Architecture PROFESSIONALS

Derek serves Enterprise Architecture Professionals. He is an internationally recognized expert in business process management (BPM) and organizational transformation. He has worked in this area for more than 20 years, dealing with major brands, governmental organizations, and nongovernmental organizations (NGOs). Derek's research focuses on the methods, approaches, frameworks, tools, techniques, and technologies of business architecture; BPM; business process improvement; business transformation; and organizational change. He places special emphasis on an outcome-based, customer-focused approach.

Previous Work Experience

Derek is a well-known keynote speaker and chair of major EA conferences. As co-chair of BPMI.org, he helped merge the organization with the Object Management Group (OMG).

Education

Derek completed the Early Growth Program at London Business School.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

18 results in Reports

  • IT Infrastructure & Operations
  • John Kindervag
  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 391
  • For Security & Risk Professionals

    Report:Build Security Into Your Network's DNA: The Zero Trust Network Architecture

    One of our goals with Zero Trust is to optimize the security architectures and technologies for future flexibility. As we move toward a data-centric world with shifting threats and perimeters, we...

    • Downloads: 2082
  • For Security & Risk Professionals

    Report:Introducing Forrester's Prioritized Patching Process (P3)

    Leverage Predictive Threat Modeling And Data Value For A Context-Based Approach To Patch Prioritization

    Criminals want access to your valuable assets, and one of their preferred methods is to exploit vulnerabilities lurking in your software and systems. Typically, these vulnerabilities have available...

    • Downloads: 317
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 819
  • For Security & Risk Professionals

    Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

    Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

    On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

    • Downloads: 112
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1006
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: Q2 2013

    From frantic security operations problems to the changing threat landscape, CISOs, senior security leaders, and other IT risk management leaders consistently have trouble keeping up with key trends...

    • Downloads: 931
  • For Security & Risk Professionals

    Report:Dissect Data To Gain Actionable INTEL

    Forrester's Data Security And Control Framework

    Forrester segments the problem of securing and controlling data into three areas: 1) defining the data; 2) dissecting and analyzing the data; and 3) defending and protecting the data. We refer to...

    • Downloads: 431
  • For Security & Risk Professionals

    Report:TechRadar™: Data Security, Q2 2014

    Road Map: The Data Security And Privacy Playbook

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming a...

    • Downloads: 706
  • For Security & Risk Professionals

    Report:Develop Your Road Map For Zero Trust Network Mitigation Technology

    Network Analysis And Visibility Tools Take Center Stage

    This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map for Zero Trust network threat mitigation technologies using Forrester's TechRadar™...

    • Downloads: 1533
  • For Security & Risk Professionals

    Report:No More Chewy Centers: The Zero Trust Model Of Information Security

    Vision: The Security Architecture And Operations Playbook

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For a generation of security and risk (S&R) professionals,...

    • Downloads: 2336
  • For Security & Risk Professionals

    Report:Know Your Data To Create Actionable Policy

    Policy: The Data Security And Privacy Playbook

    Data defense is the fundamental purpose of information security. To defend your data, there are only four levers you can pull — controlling access, inspecting data usage patterns for abuse,...

    • Downloads: 768
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 809
  • For Security & Risk Professionals

    Report:Quick Take: Palo Alto Networks Acquires Cyvera

    Palo Alto Extends Its Reach To The Endpoint

    On March 24, 2014, Palo Alto Networks announced an agreement to acquire Cyvera, a privately held endpoint security company, for approximately $200 million. With the acquisition, Palo Alto Networks...

    • Downloads: 96
  • For Security & Risk Professionals

    Report:TechRadar™: Zero Trust Network Threat Mitigation Technology, Q1 2015

    Road Map: The Security Architecture And Operations Playbook

    Not a week goes by without news of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Digital businesses lose millions in...

    • Downloads: 218
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: 2014

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

    • Downloads: 654
  • For Security & Risk Professionals

    Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Landscape: The Data Security And Privacy Playbook

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

    • Downloads: 376
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1507