Peter   Cerrato

Peter Cerrato

Principal Consultant Serving Security & Risk Professionals

Peter is a principal consultant serving Security & Risk Professionals. He specializes in security transformation initiatives across industry verticals, with a focus on security strategies for empowering the business to meet the customer-driven challenges of cloud and mobile, identity and access, and automation and analytics.

Previous Work Experience

Prior to joining Forrester, Peter served as a manager in information protection at KPMG Advisory and as an information security architect and senior network engineer at Warner Bros.

Peter has led IAM transformation engagements for numerous clients, including Fortune 50 private equity firms, major dot-coms, and service organizations with over 1 million customers.

Education

Peter holds a Bachelor of Science in computer science and electrical engineering and humanities from Massachusetts Institute of Technology (MIT).

Peter Cerrato

Principal Consultant Serving Security & Risk Professionals

Peter is a principal consultant serving Security & Risk Professionals. He specializes in security transformation initiatives across industry verticals, with a focus on security strategies for empowering the business to meet the customer-driven challenges of cloud and mobile, identity and access, and automation and analytics.

Previous Work Experience

Prior to joining Forrester, Peter served as a manager in information protection at KPMG Advisory and as an information security architect and senior network engineer at Warner Bros.

Peter has led IAM transformation engagements for numerous clients, including Fortune 50 private equity firms, major dot-coms, and service organizations with over 1 million customers.

Education

Peter holds a Bachelor of Science in computer science and electrical engineering and humanities from Massachusetts Institute of Technology (MIT).

Peter Cerrato's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    December 14, 2017 Stephanie Balaouras, Chase Cunningham, Peter Cerrato

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. Zero Trust mandates the creation of microperimeters of control around an enterprise's sensitive data assets and provides visibility into how it uses data across its ecosystem to win, serve, and retain customers. This report provides security leaders with best practices and a five-step process to realize the benefits of a Zero Trust strategy more quickly. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    March 8, 2017 Stephanie Balaouras, Peter Cerrato, John Kindervag

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust practices and technologies. As threat actors continue to rapidly improve their capabilities in 2017, adherence to outdated security practices will only hurt your business and your customers. This report provides a framework with which to evaluate your network security architecture against the Zero Trust principles that matter most.

View all of Peter Cerrato's Research

Clients Who Work With Peter Cerrato Also Work With:

View all related analysts