Jeff   Pollard

Jeff Pollard

VP, Principal Analyst Serving Security & Risk Professionals

Jeff primarily contributes to Forrester's offerings for security and risk professionals. He leads Forrester’s research on the role of the CISO, specializing in topics related to security strategy, budgets, metrics, business cases, and presenting to the board. His research also includes security services, featuring global coverage of managed security services, professional security services, and security-as-a-service. Jeff also takes an active role in Forrester’s forward-looking research on security innovation, the security market, and security predictions.

Previous Work Experience

Prior to joining Forrester, Jeff served as a global architect at Verizon, Dell SecureWorks, and Mandiant, working with the world's largest organizations in financial services, telecommunications, media, and defense. In those roles he helped clients fuse managed security and professional services engagements in security monitoring, security management, red teams, penetration testing, OSINT, forensics, and application security.

Education

Jeff holds a B.S. in IT management from Western Governors University.

Jeff Pollard

VP, Principal Analyst Serving Security & Risk Professionals

Jeff primarily contributes to Forrester's offerings for security and risk professionals. He leads Forrester’s research on the role of the CISO, specializing in topics related to security strategy, budgets, metrics, business cases, and presenting to the board. His research also includes security services, featuring global coverage of managed security services, professional security services, and security-as-a-service. Jeff also takes an active role in Forrester’s forward-looking research on security innovation, the security market, and security predictions.

Previous Work Experience

Prior to joining Forrester, Jeff served as a global architect at Verizon, Dell SecureWorks, and Mandiant, working with the world's largest organizations in financial services, telecommunications, media, and defense. In those roles he helped clients fuse managed security and professional services engagements in security monitoring, security management, red teams, penetration testing, OSINT, forensics, and application security.

Education

Jeff holds a B.S. in IT management from Western Governors University.

Jeff Pollard's Research

Most RecentMost Popular
  • For CIO Professionals

    REPORT: Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses

    Intermediate Level: Technology Practices For Cybersecurity And Privacy

    September 25, 2018Jeff Pollard, Stephanie Balaouras, Amy DeMartine

    CIOs and technology leaders in the intermediate phase of the journey to cybersecurity and privacy maturity must ensure that security travels with the data and position data security and privacy as competitive differentiators. Firms in this phase must move to proactively protect customers from complex privacy abuses and cybercriminals. This report — the second of three in the technology competency of the cybersecurity and privacy playbook — helps CIOs meet the challenges of the intermediate phase.

  • For CIO Professionals

    REPORT: Drive Growth With Customer Trust And Build Brand Resilience

    Advanced Level: Technology Practices For Cybersecurity And Privacy

    September 25, 2018 Amy DeMartine, Jeff Pollard, Stephanie Balaouras

    When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report — the third of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies CIOs, CISOs, and other technology leaders should prioritize in the advanced phase to leave competitors behind.

  • For CIO Professionals

    REPORT: Lay Your Security Tech Foundation

    Beginner Level: Technology Practices For Cybersecurity And Privacy

    September 25, 2018 Stephanie Balaouras, Amy DeMartine, Jeff Pollard

    This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to move to a data-centric Zero Trust security strategy. This strategy establishes the foundation your firm needs to mature its cybersecurity and privacy efforts, focusing on four key areas: 1) data governance; 2) data security; 3) cloud governance; and 4) technology innovation.

  • For Security & Risk Professionals

    REPORT: Beware The Coming Data Integrity Crisis

    Data Tampering Will Threaten Your Digital Transformation

    September 25, 2018Jeff Pollard, Joseph Blankenship, Trevor Lyness

    Insights-driven businesses are growing at eight times the rate of global GDP and will earn more than $1.8 trillion by 2021. As organizations rush to capitalize on the value of data, security leaders who have historically emphasized data confidentiality will face a new battle over data integrity, where malicious actors tamper with, corrupt, and manipulate the data on which insights-driven businesses depend. This report explains the new investments, capabilities, and roles that security leaders will need so they can give their business colleagues confidence to use and trust the data they collect.

  • For Security & Risk Professionals

    REPORT: Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences

    September 25, 2018 Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to combat: From AI-powered cyber influence campaigns to the viral spread of highly convincing fake videos, adversaries launch, control, and orchestrate attacks from outside of your secured operations — as the military calls it, "outside the wire." Security leaders must help the business protect its most valuable asset — its brand — by extending Zero Trust concepts "outside the wire."

View all of Jeff Pollard's Research

Clients Who Work With Jeff Pollard Also Work With:

View all related analysts