Heidi   Shey

Heidi Shey

Senior Analyst Serving Security & Risk Professionals

Heidi is a senior analyst at Forrester serving security and risk professionals. Her research primarily focuses on data security and privacy strategy, skills development, policies, and related technology controls. She guides clients in applying a Zero Trust, data-centric approach to securing data, advising them in areas like sensitive data discovery and classification, data loss prevention, secure communications, and more. Her research coverage includes breach costs, eDiscovery, cyberinsurance, and customer-facing breach notification and response. She also covers consumer security and SMB security market trends.

Previous Work Experience

Heidi has been with Forrester since 2006. She previously focused on tech sector economics and tech vendor strategy, forecasting B2B technology adoption and spending trends as well as conducting quantitative analysis for B2C security market trends. She also supported Forrester Analytics' Business Technographics team on survey development and data quality initiatives.

Education

Heidi holds a B.A. in economics and studio art with honors from Wellesley College and an M.S. in cybersecurity policy from the University of Maryland. She is also a Certified Information Systems Security Professional (CISSP).

Heidi Shey

Senior Analyst Serving Security & Risk Professionals

Heidi is a senior analyst at Forrester serving security and risk professionals. Her research primarily focuses on data security and privacy strategy, skills development, policies, and related technology controls. She guides clients in applying a Zero Trust, data-centric approach to securing data, advising them in areas like sensitive data discovery and classification, data loss prevention, secure communications, and more. Her research coverage includes breach costs, eDiscovery, cyberinsurance, and customer-facing breach notification and response. She also covers consumer security and SMB security market trends.

Previous Work Experience

Heidi has been with Forrester since 2006. She previously focused on tech sector economics and tech vendor strategy, forecasting B2B technology adoption and spending trends as well as conducting quantitative analysis for B2C security market trends. She also supported Forrester Analytics' Business Technographics team on survey development and data quality initiatives.

Education

Heidi holds a B.A. in economics and studio art with honors from Wellesley College and an M.S. in cybersecurity policy from the University of Maryland. She is also a Certified Information Systems Security Professional (CISSP).

Heidi Shey's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Key Security And Risk Insights From Clients' Top Questions

    Advanced Cybersecurity Techniques And Identity Access Management Are Critical Challenges

    July 17, 2018Heidi Shey, Claire O'Malley

    Forrester's security and risk (S&R) research team fields thousands of inquiries from clients every year. In this report, we're sharing our conclusions from an analysis of more than 3,000 inquiries so that security leaders can learn which areas are most critical for their peers.

  • For Security & Risk Professionals

    REPORT: Rethinking Data Discovery And Classification Strategies

    Strategic Plan: The Data Security And Privacy Playbook

    July 10, 2018Heidi Shey

    Security and risk (S&R) pros can't expect to adequately protect customer, employee, and sensitive corporate data and IP if they don't know what data exists, where it resides, how valuable it is to the firm, and who can use it. In this report, we examine common pitfalls and help S&R pros rethink overly complex and haphazard legacy approaches to data discovery and classification. This is an update of a previously published report. Forrester reviews and revises it periodically for continued relevance and accuracy, most recently doing so to factor in new ideas, tools, and data.

  • For Security & Risk Professionals

    REPORT: Planning For Failure: How To Survive A Breach

    Organization: The Security Architecture And Operations Playbook

    July 6, 2018 Josh Zelonis, Paul McKay, Jinan Budge, Heidi Shey

    Cybercriminals are using more-sophisticated attacks to steal valuable intellectual property and the personal data of your customers, partners, and employees. Their motivations run the gamut from financial to retaliatory. With enough time and money, they can breach the security defenses of even the largest enterprises. You can't stop every cyberattack. However, your customers expect you to respond quickly and appropriately. If you contain a breach poorly and botch the response, you will pay millions in remediation costs and lost business, and it will ruin your firm's reputation. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Your Guide To Cyberinsurance

    Examining The Market And Your Options For Covering Cyber Risk

    June 6, 2018Heidi Shey, Nick Hayes

    Security pros now have access to a robust, necessary, but still nebulous cyberinsurance market. Before you select a policy, you'll have to determine your company's cybervalue at risk and what kind of coverage you'll need. At that point, you may choose from a variety of brokers, captives, carriers, and reinsurers. This report helps you sift through the noise to obtain the right cyberinsurance for your needs.

  • For Security & Risk Professionals

    REPORT: Secure Government Networks With Forrester's Zero Trust eXtended Framework

    Build Customer Trust With Robust Security And Privacy Practices

    May 31, 2018 Chase Cunningham, Heidi Shey, Alexander Spiliotes

    Government networks are under attack from all manner of threats: enemy nations, hackers, rogue assets, malicious insiders, and more. Although governments have done well combatting threats and hardening systems, perimeter-focused security paradigms create avenues of compromise and don't take full advantage of next-generation security technologies. This report helps S&R pros apply Zero Trust concepts and the Zero Trust eXtended (ZTX) framework to significantly increase insight, operational control, and security for government networks.

View all of Heidi Shey's Research

Clients Who Work With Heidi Shey Also Work With:

View all related analysts