Roles We Serve

Marketing & Strategy:

Technology Management:

Technology Industry:

Forrester Research For:

Security & Risk Professionals

Security & Risk Professionals need to evolve from security domain experts to business leaders responsible for managing risk, protecting the brand, and upholding customer trust.

To succeed, you must execute on a business technology agenda focused on delivering superior customer experience to drive growth; manage information risks to operations, profits, IP reputation, and customer trust; and effectively allocate resources while positioning security as an enabler, not inhibitor.

Who this role is for:

Chief Information Security Officer (CISO)
Chief Security Officer (CSO)
Chief Risk Officer (CRO)
IT Risk/Compliance Manager

Vice President and Group Director Laura Koetzle (00:47)

Challenges facing today's Security & Risk leaders:

Earn and retain customer trust.

Four Quick Wins To Improve Security Without Detracting From Customer Experience

The Identity And Access Management Playbook For 2016

Maximize success and minimize digital disruption risks.

Seven Steps To Protect Your eCommerce Website In 2016

Secure mobile experiences.

Secure IoT As It Advances Through Maturity Phases

The Mobile Security Playbook

Protect data from theft and misuse.

Lessons Learned From The World's Biggest Customer Data Breaches And Privacy Incidents, 2015

The Data Security And Privacy Playbook

Security & Risk Blog

View more posts

Latest Research For This Role

Report: Five Steps To A Zero Trust Network

Strategic Plan: The Security Architecture And Operations Playbook

July 27, 2016 | John Kindervag

A Zero Trust (ZT) network abolishes the idea of a trusted network inside the corporate perimeter. A ZT network creates microperimeters of control around an enterprise's sensitive data assets and...

Report: Hunting Insider Threats

Forrester's Model For Establishing An Insider Threat Team

July 20, 2016 | Joseph Blankenship

Insider threats are a real risk to business because they threaten both customer and employee trust. Accidental or malicious misuse of the firm's most sensitive and valuable data can result in...

View more research

Analysts Serving This Role

  • Josh Zelonis

    Josh Zelonis

    Vulnerability & Threat Management, Architecture & Technology Strategy...

  • Amy DeMartine

    Amy DeMartine

    Vulnerability & Threat Management, Infrastructure Security...

  • Nick Hayes

    Nick Hayes

    Social Intelligence, Risk Management...

View more analysts

Upcoming Events For This Role

Forum: CXDC 2016

September 12, 2016

View more events