Heidi Shey

Analyst serving Security & Risk PROFESSIONALS

Heidi serves Security & Risk Professionals in solutions for data security and privacy and for security architecture and operations. Her research focus is on data discovery and classification, secure file sharing and collaboration, cybersecurity and privacy topics such as policy and regulatory concerns, biometrics, and consumer security. She also focuses on data-driven topics such as security spending and costs of a data breach. She is a team lead for survey design, methodology development, and data analysis in consulting engagements.

Previous Work Experience

Heidi has been with Forrester since 2006. Her previous focus was on tech sector economics, conducting quantitative analysis and forecasting of B2B technology adoption, and IT spending and budgeting trends for technology vendors. She also supported Forrester's Business Technographics team on survey development and data quality initiatives.

Education

Heidi holds a B.A. in economics and studio art with honors from Wellesley College and an M.S. in cybersecurity policy from the University of Maryland. She is also a Certified Information Systems Security Professional (CISSP).

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

8 results in Reports

  • Heidi Shey
  • Financial Services
  • For CMO Professionals

    Report:Quick Take: Apple Puts Mobile Moments At The Center Of Its Strategy

    With Apple Pay And Apple Watch, The Mobile Style Setter Will Make Payments And Wearables Worth The CMO's Trouble

    Today, Apple announced an integrated set of applications and connected devices — Apple Pay, the Apple Watch, and two iPhone 6 models — that will change how the CMO's team engages with...

    • Downloads: 320
  • For Security & Risk Professionals

    Report:The Cybercriminal's Prize: Your Customer Data And Competitive Advantage

    Business Case: The Data Security And Privacy Playbook

    Protecting customer data such as credit card information, log-in credentials, and other personally identifiable information is one of the top priorities for both security and risk (S&R) leaders and...

    • Downloads: 812
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 587
  • For Security & Risk Professionals

    Report:Quick Take: IBM Buys Trusteer And, With It, Better, More-Intelligent Data-Centric Security

    Prospects Are Good For This Acquisition, Which Matches Complementary Strengths

    On August 15, 2013, IBM announced its acquisition, for an undisclosed sum, of Trusteer, a fraud protection and cybersecurity firm focused primarily on providing services to banking customers. With...

    • Downloads: 194
  • For Security & Risk Professionals

    Report:Simplify Cybersecurity With PCI

    Policy And Procedures US Government Spotlight: The Security Architecture And Operations Playbook

    US federal law, specifically the Federal Information Security Management Act (FISMA), requires US federal government agencies to adhere to National Institute of Standards and Technology (NIST)...

    • Downloads: 398
  • For CIO Professionals

    Report:Smart Computing Solutions Are On The Rise

    A Snapshot Of Adoption From The InformationWeek 500

    Smart Computing, the latest cycle of tech innovation and growth based on new technologies of awareness, analysis, and alternatives, began in 2008. Since then, a growing number of companies have...

    • Downloads: 610
  • For Security & Risk Professionals

    Report:Smart Computing Fuels Biometrics Growth

    How Biometrics Enable Smart Computing Solutions

    Biometrics is already a growing market today in a variety of applications. Smart Computing will help to fuel biometrics growth as smart applications call for a greater level of security and...

    • Downloads: 568
  • For CIO Professionals

    Report:The State Of SMB IT Budgets: 2009

    Business Data Services North America And Europe

    This document provides SMB highlights of an extensive data set collected via Forrester's Enterprise And SMB Global IT Budgets And Spending Survey, Q2 2009. Overall, the global recession has made CIOs...

    • Downloads: 813