Roles We Serve

Marketing & Strategy:

Technology Management:

Technology Industry:

Forrester Research For:

Security & Risk Professionals

Security & Risk Professionals need to evolve from security domain experts to business leaders responsible for managing risk, protecting the brand, and upholding customer trust.

To succeed, you must execute on a business technology agenda focused on delivering superior customer experience to drive growth; manage information risks to operations, profits, IP reputation, and customer trust; and effectively allocate resources while positioning security as an enabler, not inhibitor.

Who this role is for:

Chief Information Security Officer (CISO)
Chief Security Officer (CSO)
Chief Risk Officer (CRO)
IT Risk/Compliance Manager

Vice President and Group Director Laura Koetzle (00:47)

Challenges facing today's Security & Risk leaders:

Earn and retain customer trust.

Four Quick Wins To Improve Security Without Detracting From Customer Experience

The Identity And Access Management Playbook For 2016

Maximize success and minimize digital disruption risks.

Seven Steps To Protect Your eCommerce Website In 2016

Secure mobile experiences.

Secure IoT As It Advances Through Maturity Phases

The Mobile Security Playbook

Protect data from theft and misuse.

Lessons Learned From The World's Biggest Customer Data Breaches And Privacy Incidents, 2015

The Data Security And Privacy Playbook

Security & Risk Blog

View more posts

Latest Research For This Role

Report: Identity And Access Management Metrics For Business Value

Performance Management: The Identity And Access Management Playbook

May 27, 2016 | Andras Cser

Most security and risk (S&R) professionals struggle to ensure that identity access management (IAM) receives the attention it deserves. S&R pros who are successful at nurturing their IAM programs...

Report: Brief: Five Pitfalls To Avoid For A Pain-Free Two-Factor Authentication Deployment

Communication, Training, And Documentation Are Essential For Success

May 23, 2016 | Merritt Maxim

In this brief, we examine five pitfalls that security pros should take care to avoid when deploying a two-factor authentication solution. For each pitfall, we provide security pros with actionable...

View more research

Analysts Serving This Role

  • Chris Sherman

    Chris Sherman

    Enterprise Mobile Devices, Physical Security...

  • Nick Hayes

    Nick Hayes

    Social Intelligence, Risk Management...

  • Peter Cerrato

    Peter Cerrato

    Vulnerability & Threat Management, Data & Information Protection...

View more analysts

Upcoming Events For This Role


June 8, 2016 - June 9, 2016

Forum: CXDC 2016

September 12, 2016

View more events