Heidi Shey

Analyst serving Security & Risk PROFESSIONALS

Heidi serves Security & Risk Professionals in solutions for data security and privacy and for security architecture and operations. Her research focus is on data discovery and classification, secure file sharing and collaboration, cybersecurity and privacy topics such as policy and regulatory concerns, biometrics, and consumer security. She also focuses on data-driven topics such as security spending and costs of a data breach. She is a team lead for survey design, methodology development, and data analysis in consulting engagements.

Previous Work Experience

Heidi has been with Forrester since 2006. Her previous focus was on tech sector economics, conducting quantitative analysis and forecasting of B2B technology adoption, and IT spending and budgeting trends for technology vendors. She also supported Forrester's Business Technographics team on survey development and data quality initiatives.

Education

Heidi holds a B.A. in economics and studio art with honors from Wellesley College and an M.S. in cybersecurity policy from the University of Maryland. She is also a Certified Information Systems Security Professional (CISSP).

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

11 results in Reports

  • Heidi Shey
  • Management & Organization
  • For Security & Risk Professionals

    Report:Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook

    For security and risk (S&R) leaders, pursuing continuous improvement in security architecture and operations can mean many things: keeping on top of the threat landscape; anticipating future...

    • Downloads: 426
  • For Security & Risk Professionals

    Report:Job Description: Chief Privacy Officer

    Organization: The Data Security And Privacy Playbook

    Customers around the globe have become highly sensitive to how organizations track, use, and store their personal data. As a result, a plethora of often-conflicting privacy laws has emerged in almost...

    • Downloads: 471
  • For Security & Risk Professionals

    Report:Brief: Legal Costs In A Customer Data Breach Now Pack A Bigger Punch

    Recent Legal Settlement Raises The Stakes For US Security Practices

    In December of 2009, two laptops containing sensitive information were stolen from the health insurance provider AvMed's corporate headquarters, leading to a breach of 1.2 million customer records....

    • Downloads: 150
  • For Security & Risk Professionals

    Report:The Future Of Data Security: A Zero Trust Approach

    Vision: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses, and protecting it from theft, misuse, and abuse is the No. 1 responsibility of every S&R leader. Hacked customer data can erase millions in...

    • Downloads: 2507
  • For Security & Risk Professionals

    Report:Identify And Influence Data Security And Privacy Stakeholders

    As a security and risk (S&R) professional, you're in the direct line of fire when it comes to privacy. The business expects you to: 1) understand the laws, regulations, and standards for both privacy...

    • Downloads: 1072
  • For Security & Risk Professionals

    Report:Forrsights: The New IT Security Buyer Landscape

    Success Requires Vendors To Change Features, Positioning, And Sales Enablement

    Despite the recent spate of high-profile security breaches, many chief information security officers (CISOs) find themselves marginalized by their peers and disconnected from their business's...

    • Downloads: 479
  • For CIO Professionals

    Report:Understanding The Embedded Security Market Ecosystem

    Identifying Dominant Players And Mapping Challenges To Opportunities

    As the number of smart, sensor-rich IP-enabled devices grows, so does the demand and scramble to secure these connected devices. But no one tech or security vendor can do it alone. The variety of...

    • Downloads: 406
  • For CIO Professionals

    Report:Embedded Security For An IP-Enabled World

    We live in a world where an increasing number devices and objects — from medical implantable devices to cars — come with sensors to communicate with each other and transmit information to...

    • Downloads: 391
  • For Security & Risk Professionals

    Report:Forrsights: The Evolution Of IT Security, 2010 To 2011

    Cybersecurity And Services Fuel The Next Phase Of Market Growth

    In Q3 2010, Forrester surveyed 2,058 IT security decision-makers at North American and European small businesses and enterprises to gauge the current state and identify the key trends and future...

    • Downloads: 1817
  • For CIO Professionals

    Report:The State Of SMB IT Budgets: 2009

    Business Data Services North America And Europe

    This document provides SMB highlights of an extensive data set collected via Forrester's Enterprise And SMB Global IT Budgets And Spending Survey, Q2 2009. Overall, the global recession has made CIOs...

    • Downloads: 813
  • For CIO Professionals

    Report:The State Of Enterprise IT Budgets: 2009

    Business Data Services North America And Europe

    This document provides enterprise highlights of an extensive data set collected via Forrester's Enterprise And SMB Global IT Budgets And Spending Survey, Q2 2009. Overall, the global recession has...

    • Downloads: 1304