Pascal Matzke

Vice President, Research Director serving CIOs

Pascal is a member of Forrester's Business Technology Futures team, which serves CIOs and their business partners by predicting the long-term business impact of information technology. His research focus is on as-a-service business models and tech-driven business transformation, analyzing the shifting and consolidating IT services and outsourcing market, as well as underlying IT market dynamics. His research examines new constituencies of buyers and suppliers that are currently reshaping and recasting the IT services market.

In addition, Pascal regularly advises end user clients on their IT services and sourcing strategies, with a particular emphasis on outsourcing decision issues, RFP creation, and vendor selection and vendor management. His research spans the business strategies, operational processes, and portfolio elements required to achieve and sustain market leadership. For example, he co-authored Forrester's Big Idea on "Converged Service Delivery: The Missing Link In Achieving Business Flexibility." Pascal is a frequent public speaker and is regularly quoted by leading business newspapers and IT magazines, such as CIO Magazine, Computing, The Economist, the Financial Times, Handelsblatt, InformationWeek, and the International Herald Tribune.

Previous Work Experience

Pascal joined Forrester in 2005 from META Group, where he was a European lead analyst and consulting director responsible for IT services and vendor strategy issues. Previously, Pascal came from Giga Information Group, where he was a senior analyst and solution program manager covering IT services and outsourcing topics, as well as the relevant vendor evaluation methodologies. Prior to joining Giga Information Group in 1997, Pascal was involved in management consulting projects at a Munich-based consulting company, mainly in the telecommunications and IT services area.

Education

Pascal earned an M.A. in political science, economics, and modern history from the Ludwig-Maximilians-University in Munich, Germany.

Refine your results

Date Range

30 results in Blogs

  • Rick Holland
  • For Security & Risk Professionals

    Blog:Shoulder Surfing The Friendly Skies

    FAIL at 30,000ish feet  When you fly nearly every week, you can get pretty bored on a plane.  When I am sick of working, playing games, or watching movies, my latest distraction is checking...

    • For Security & Risk Professionals

      Blog:Introducing Forrester's Cyber Threat Intelligence Research

      We have started a new report series on Cyber Threat Intelligence.  The first report, "Five Steps To Build An Effective Threat Intelligence Capability," is designed to help organizations...

      • For Security & Risk Professionals

        Blog:The Forrester Wave: Email Content Security

        It is with great pleasure that I announce the completion of my first Forrester Wave™: Email Content Security, Q4 2012. I’d like to thank the research associates (Jessica McKee and...

        • For Security & Risk Professionals

          Blog:Are You Down With CIP (Critical Infrastructure Protection)?

          I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

          • For Security & Risk Professionals

            Blog:Hackers Vs. Executives Is Back

            Our next installment of "Hackers vs. Executives" is just weeks away.  Join us at the Forrester Security Forum and sit in on one of the most popular sessions of the event each year. We have a...

            • For Security & Risk Professionals

              Blog:Choose Your Own Adventure With The 2014 Verizon DBIR

              In a world where every single security vendor has their own annual threat report, the Verizon Databreach Investigations Report (DBIR) is the gold standard, and this year is no different. Last year I...

              • For Security & Risk Professionals

                Blog:LG Is Learning An Embarrassing Privacy Lesson In The Age Of The Customer

                In a recent report titled “Technology Management In The Age Of The Customer,” Forrester defines the Age of the Customer as: "A 20-year business cycle in which the most successful...

                • For Security & Risk Professionals

                  Blog:Bit9’s Operational Oversight Is Probably Your Operational Reality

                  You are now no doubt aware that Boston-based security firm Bit9 suffered an alarming compromise, which resulted in attackers gaining access to code-signing certificates that were then used to sign...

                  • For Security & Risk Professionals

                    Blog:got STIX?

                    The sharing of threat intelligence is a hot topic these days. When I do conference speeches, I typically ask how many organizations see value in sharing, and most in the room will raise their hand....

                    • For Security & Risk Professionals

                      Blog:Actionable Intelligence, Meet Terry Tate, Office Linebacker

                      sdfasdfaasdfThe #Forrester Security & Risk team is hiring. We are looking for consultants to join our team bit.ly/M9gWS5 #infosecasdfasdasdfasdddsadfas We are now less than two weeks away from our...

                      • For Security & Risk Professionals

                        Blog:Target Breach: Vendors, You're Not Wrestlers, And This Isn't The WWE

                        Yesterday, Bloomberg Businessweek ran a story providing some alarming details on the Target breach.  The article, “Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew...

                        • For Security & Risk Professionals

                          Blog:My Threat Intelligence Can Beat Up Your Threat Intelligence

                          Have you ever been in a vendor meeting and heard the vendor extol the greatness of their threat intelligence?  You may have even seen a slide that looks similar to this: The vendor probably...

                          • For Security & Risk Professionals

                            Blog:Introducing Forrester’s Targeted-Attack Hierarchy Of Needs

                            We recently published part 1 of a new series designed to help organizations build resiliency against targeted attacks. In the spirit of Maslow, we designed our Targeted-Attack Hierarchy Of...

                            • For Security & Risk Professionals

                              Blog:Counter-Strike?

                              On Monday the Wall Street Journal ran a story on hacking back titled, “Support Grows to Let Cybertheft Victims Hack Back.”  The article describes a growing desire to permit the...

                              • For Security & Risk Professionals

                                Blog:The Millennium Falcon And Breach Responsibility

                                Do you remember the scene from The Empire Strikes Back where the Millennium Falcon is trying to escape an Imperial Star Destroyer? Han Solo says, “Let’s get out of here, ready for...

                                • For Security & Risk Professionals

                                  Blog:Kicking Off Forrester's "Targeted Attack Hierarchy Of Needs" Research

                                  I am about to kick off my next Forrester research on targeted attacks.  Here is the short abstract: "The threat landscape has evolved but organizations haven't. Leveraging concepts of Zero...

                                  • For Security & Risk Professionals

                                    Blog:Avoid The Information Security Squirrel

                                    "My master made me this collar. He is a good and smart master and he made me this collar so that I may speak. Squirrel!"   In the Pixar film Up, squirrels frequently distract Dug the talking...

                                    • For Security & Risk Professionals

                                      Blog:Kicking off the Forrester Web Content Security Wave

                                      We are about to kickoff our next Forrester Wave on web content security.  The inclusion criteria for vendor prequalification will be sent out within the next two weeks. We will be focusing on...

                                      • For Security & Risk Professionals

                                        Blog:New Research: Know Your Adversary

                                        Mandiant's APT1 report changed the threat intelligence marketing game, and you would be hard pressed to find a cybersecurity company that doesn't have a research/intelligence team that...

                                        • For Security & Risk Professionals

                                          Blog:Kim Kardashian And APTs

                                          On Wednesday, American footwear company Skechers agreed to pay the US Federal Trade Commission $40 million. This settlement resulted from a series of commercials that deceived consumers claiming that...

                                          • For Security & Risk Professionals

                                            Blog:Observations on the 2013 Verizon Data Breach Investigations Report

                                            I was very excited to finally get a copy of the much-anticipated 2013 Verizon Data Breach Investigations Report (DBIR.)  I have found the report to be valuable year after year.  This is the...

                                            • For Security & Risk Professionals

                                              Blog:Crowdsourcing my RSA panels

                                              The San Francisco RSA conference is now less than two weeks away, and this year I am moderating two great panels. I thought I'd reach out and solicit suggestions for discussion.  ...

                                              • For Security & Risk Professionals

                                                Blog:The Militarization Of Information Security

                                                Does something like this sound familiar? "We need to find, fix, finish, exploit, analyze, & disseminate this intrusion set along the kill chain via force multipliers so we can observe, orient,...

                                                • For Security & Risk Professionals

                                                  Blog:If Everything Is Threat Intelligence, Then Nothing Is Threat Intelligence

                                                  The hype surrounding threat intelligence has continued to build since I wrote the blog "My Threat Intel Can Beat Up Your Threat Intel” in mid-2012.  S&R pros are responding to both the...

                                                  • For Security & Risk Professionals

                                                    Blog:Say “Small Footprint” Again. I Dare You, I Double Dare You.

                                                    During the past 18 months or so, we have seen the emergence of innovative endpoint security solutions. The list is long; it is hard to keep track of all the solutions in the space. In no particular...