Roxana Strohmenger

Director, Data Insights Innovation serving Customer Insights PROFESSIONALS

In her role, Roxana leads the team responsible for all data innovation efforts at Forrester, where they test and seek to understand which data sources, research methodologies, and frameworks are appropriate to help clients gain an intricate, 360-degree view of the consumer. In addition, her team tracks emerging and innovative research methodologies, such as social market research, mobile research, and neuroscience as well as helping clients understand how to incorporate them into their research mix and combine them with traditional research methods.

Roxana has spoken at numerous Forrester events and market-research-focused conferences, such as the Insights Innovation Exchange, The Future of Consumer Intelligence, Market Research in a Mobile World, and The Market Research Event. Her research has been cited in media sources such as AdAge and the UK's Research.

Previous Work Experience

Since she started at Forrester in 2006, Roxana has specialized in advising research and clients on data collection methodologies and on using advanced analytic tools on our Consumer Technographics® data as well as on custom research projects. Prior to her current role, she was an analyst who focused on technology's impact on the market research industry and on Latin American consumer behavior and technology adoption. In addition, she was a senior survey manager and previously a data advisor with Consumer Technographics. In both roles, she used her expertise to deliver value to clients of all industries, from consumer electronics to advertising and media companies, through customized analysis and application of Consumer Technographics data.


Roxana received her B.S. in psychology from The Florida State University and an M.A. in psychology from The College of William and Mary.

Refine your results




Market Imperatives



54 results in Everything

  • Rick Holland
  • Past 12 months
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 829
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 63
  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires Neohapsis

    Deal Will Expand Cisco's Capabilities In Application, Cloud, And Mobile Security

    Cisco Systems announced this week its intent to acquire closely held Chicago-based Neohapsis, a decision that will substantially broaden Cisco's consulting capabilities. Most notably, the acquisition...

    • Downloads: 39
  • For Security & Risk Professionals

    Report:Brief: S&R Pros Remain Unprepared To Address Virtualization And Cloud Security Risks

    S&R Pros Must Accelerate Their Knowledge, Skills, And Approach To Avoid Failure

    For years, infrastructure and operations (I&O) leaders have embraced virtualization as a means to achieve consolidation and cost savings. Today, virtualization offers more than just cost savings: It...

    • Downloads: 254
  • For Security & Risk Professionals

    Report:Quick Take: Symantec Splits In Two

    Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

    On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

    • Downloads: 133
  • For Security & Risk Professionals

    Charts & Figures:DHS STIX Threat Actor Profile

  • For Security & Risk Professionals

    Blog:Are You Down With CIP (Critical Infrastructure Protection)?

    I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

    • For Security & Risk Professionals

      Report:Quick Take: Cisco Acquires ThreatGrid, Bolstering Advanced Malware Protection

      Cisco Broadens A Strong Portfolio But Still Needs To Better Explain Its Overall Security Product Road Map

      On May 20, 2014, Cisco Systems announced its intention to acquire privately-held dynamic malware analysis company ThreatGrid for an undisclosed amount. This acquisition enhances Cisco Systems'...

      • Downloads: 95
    • For Security & Risk Professionals

      Charts & Figures:Targeted Attacks

    • For Security & Risk Professionals

      Report:Job Description: Security Architect

      Organization: The Security Architecture And Operations Playbook

      We designed this report for security and risk (S&R) executives who are rethinking their security architecture and working to improve the effectiveness of their operations, to help them hire one of...

      • Downloads: 907
    • For Security & Risk Professionals

      Charts & Figures:Example Vendors With OT-Specific Security Solutions

    • For Security & Risk Professionals

      Report:Quick Take: Stem The "Heartbleed"

      How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

      To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

      • Downloads: 393
    • For Security & Risk Professionals

      Blog:Choose Your Own Adventure With The 2014 Verizon DBIR

      In a world where every single security vendor has their own annual threat report, the Verizon Databreach Investigations Report (DBIR) is the gold standard, and this year is no different. Last year I...

      • For Security & Risk Professionals

        Report:Know Your Adversary

        Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

        In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. Then in May 2014, the US...

        • Downloads: 199
      • For Security & Risk Professionals

        Charts & Figures:Role Job Description: Security Architect

      • For Security & Risk Professionals

        Report:Develop A Two-Phased DDoS Mitigation Strategy

        Protect Yourself From Hacktivists And Other Cybercriminals

        Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

        • Downloads: 587
      • For Security & Risk Professionals

        Charts & Figures:The Targeted-Attack Hierarchy Of Needs

      • For Security & Risk Professionals

        Blog:got STIX?

        The sharing of threat intelligence is a hot topic these days. When I do conference speeches, I typically ask how many organizations see value in sharing, and most in the room will raise their hand....

        • For Security & Risk Professionals

          Charts & Figures:Not All Adversaries Are Created Equal

        • For Security & Risk Professionals

          Blog:Introducing Forrester’s Targeted-Attack Hierarchy Of Needs

          We recently published part 1 of a new series designed to help organizations build resiliency against targeted attacks. In the spirit of Maslow, we designed our Targeted-Attack Hierarchy Of...

          • For Security & Risk Professionals

            Report:Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Core Capabilities

            Assessment: The Security Architecture And Operations Playbook

            Targeted attacks continue to plague organizations, and these intrusions damage the brand, customer loyalty, and margins. Preparing for and responding to these attacks requires a focused and resolute...

            • Downloads: 692
          • For Security & Risk Professionals

            Blog:The Millennium Falcon And Breach Responsibility

            Do you remember the scene from The Empire Strikes Back where the Millennium Falcon is trying to escape an Imperial Star Destroyer? Han Solo says, “Let’s get out of here, ready for...

            • For Security & Risk Professionals

              Report:Top 15 Trends S&R Pros Should Watch: 2014

              Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

              • Downloads: 671
            • For Security & Risk Professionals

              Charts & Figures:Tracking Adversaries