Peter Sheldon

VP, Principal Analyst serving eBusiness & Channel Strategy PROFESSIONALS

Peter serves eBusiness & Channel Strategy Professionals. He focuses on eCommerce technologies and solutions, including B2C and B2B eCommerce platforms, mobile commerce solutions, digital in-store technologies, and digital commerce. Peter has specific expertise helping eBusiness leaders understand the integration challenges between eCommerce and back-office technologies across channels and touchpoints. His interests focus on mobile and tablet commerce trends, digital in-store experiences, multichannel retail, social commerce, and digital media.

Previous Work Experience

Peter has extensive experience working with an ecosystem of eCommerce technologies, including eCommerce platforms, mobile commerce solutions, content management, web analytics, search engine marketing (SEM), search engine optimization (SEO), digital asset management, payment systems, and social media, to name a few. Peter has more than 13 years of experience in eCommerce and web technologies. Most recently, Peter held both product management and product marketing positions at Elastic Path, a leading eCommerce platform vendor. He also worked as a senior business analyst at JP Morgan and Ford Motor Company, where he started his career in eCommerce developing a direct online channel for new vehicle sales in the UK. Peter's experience spans both business and technology, including business analysis, product management, product marketing, solution architecture, user experience, and online marketing.

Education

Peter holds a BEng in manufacturing systems engineering from the University of Strathclyde in Scotland.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

38 results in Reports

  • Ed Ferrara
  • For Security & Risk Professionals

    Report:Measure The Effectiveness Of Your Data Privacy Program

    Performance Management: The Data Security And Privacy Playbook

    Privacy is one of the most important and emotional issues in information security. Privacy, or the lack thereof, affects a company's management, employees, and most importantly, customers. With the...

    • Downloads: 581
  • For Security & Risk Professionals

    Report:Determine The Value Of Information Security Assets And Liabilities — Information Security Economics 102

    This is the second in a series of reports providing guidance and new methods for the financial management of information security. The CISO's role is rapidly changing. A few years ago the CISO for...

    • Downloads: 445
  • For Security & Risk Professionals

    Report:Understand Cybersecurity And Risk Budgets For 2015

    Benchmarks: The S&R Practice Playbook

    2014 was a watershed year for cybercrime, and companies of all sizes have noticed. Executives are now placing renewed emphasis on cybersecurity, and budgets are increasing accordingly. Chief...

    • Downloads: 313
  • For Security & Risk Professionals

    Report:Determine The Business Value Of An Effective Security Program — Information Security Economics 101

    This report outlines Forrester's approach to helping you financially model information security. In today's seemingly never-ending cycle of new technologies, cyberthreats, and regulations, it's...

    • Downloads: 877
  • For Security & Risk Professionals

    Report:Brokered Cloud Identity Is Scaling New Heights

    Identity Hub Solutions Ease Integration Pain And Offer Flexibility

    We're moving fast into a world of loosely coupled, cloud-based data centers. Cloud infrastructure models complicate the identity and access management (IAM) landscape — and represent...

    • Downloads: 442
  • For Security & Risk Professionals

    Report:Measure The Effectiveness Of Your Security Operations

    Performance Management: The Security Architecture And Operations Playbook

    Information security programs have struggled with legitimacy with senior leaders for a long time. There are many reasons for this, but the root cause is the historical inability of CISOs to explain...

    • Downloads: 955
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Managed Security Services: North America, Q4 2014

    Tools & Technology: The S&R Practice Playbook

    Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to...

    • Downloads: 435
  • For Security & Risk Professionals

    Report:Source Your Security Services

    This report outlines a sourcing strategy and Forrester's decision support solution for security and risk (S&R) executives working to build a high-performance security program and organization. We...

    • Downloads: 736
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 846
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

    Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?

    Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk...

    • Downloads: 430
  • For Security & Risk Professionals

    Report:Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided

    Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage

    Although we are in the early stages of Sony Pictures Entertainment's (SPE's) catastrophically embarrassing intrusion, there are still many lessons that security and risk (S&R) professionals can take...

    • Downloads: 283
  • For Security & Risk Professionals

    Report:Quick Take: BAE Systems Buys SilverSky

    Acquisition Extends BAE's Analytics And Threat Intelligence Into Commercial Markets

    BAE Applied Intelligence — a subsidiary of BAE Systems — has made the next logical step to operationalize its security analytics and threat intelligence offerings by acquiring managed...

    • Downloads: 60
  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 393
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1010
  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires Neohapsis

    Deal Will Expand Cisco's Capabilities In Application, Cloud, And Mobile Security

    Cisco Systems announced this week its intent to acquire closely held Chicago-based Neohapsis, a decision that will substantially broaden Cisco's consulting capabilities. Most notably, the acquisition...

    • Downloads: 38
  • For Security & Risk Professionals

    Report:The Forrester Cost Model For Information Security Effectiveness — Information Security Economics 103: Measuring The Three R's

    Emergency response as a discipline extensively uses the concepts of readiness, response, and recovery — the three R's — to organize and plan efforts. Information security as a similar...

    • Downloads: 44
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013

    Ten Emerging Service Providers That Have The Chops To Be Your Managed Security Service Provider

    In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, we identified the 10 most significant providers in this category — Alert Logic; CompuCom;...

    • Downloads: 1331
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Managed Security Services: North America, Q1 2012

    The Nine Service Providers That Matter Most And How They Stack Up

    In Forrester's 60-criteria evaluation of the North American managed security services market, we identified the nine significant service providers in this category — AT&T, CSC, Dell...

    • Downloads: 1354
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires Mandiant

    FireEye Emerging As A Leader In A New Breed Of Security Companies

    On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

    • Downloads: 198
  • For Security & Risk Professionals

    Report:AWS Cloud Security

    AWS Takes Important Steps For Securing Cloud Workloads

    Security to and from the cloud is a hot topic. The notion that cloud technologies should not be used by large enterprises due to security concerns is rapidly fading. Security still ranks as the No. 1...

    • Downloads: 674
  • For CIO Professionals

    Report:PRISM's Impact On The US Cloud Industry

    A Business Technographics Document: Forrester Survey Suggests NSA Spying Has Driven More Use Of Encryption Than Migration

    Since Edward Snowden revealed the US National Security Agency's PRISM spying program, there has been widespread speculation that the announcement would ruin the fates of US cloud, hosting, and...

    • Downloads: 60
  • For Security & Risk Professionals

    Report:Quick Take: Akamai Acquires Prolexic, Doubling Down On DDoS Mitigation Services

    On December 2, 2013, Akamai Technologies announced its acquisition of Prolexic Technologies, a provider (with more than 400 customers) of cloud-based DDoS protection and mitigation services for data...

    • Downloads: 162
  • For CIO Professionals

    Report:Quick Take: CIOs Must Respond To Amazon's Disruptive Cloud

    Amazon's Relentless Pace Continues At re:Invent With Nine New Services

    The Amazon Web Services (AWS) re:Invent 2014 conference is something of an understatement as far as names go. This year's AWS conference was bigger than ever, with more than 13,500 attendees from 63...

    • Downloads: 168
  • For Security & Risk Professionals

    Report:Brief: AT&T And IBM Accelerate The Move To Utility-Based Security

    Reliable And Effective Security Utilities Free Resources So That CISOs Can Focus On Customers

    AT&T and IBM announced in February a strategic alliance to provide a set of comprehensive security services that, if successful, would define the next generation of managed security services...

    • Downloads: 163
  • For Security & Risk Professionals

    Report:Create A Security Strategy That Builds Real Business Value

    Strategic Plan: The S&R Practice Playbook

    Creating and maintaining a security strategy are fundamental tasks for CISOs; the strategy is a declaration of intent and a foundation for change. Unfortunately, many strategies fail to create...

    • Downloads: 248