Roles We Serve

Marketing & Strategy:

Technology Management:

Technology Industry:

Forrester Research For:

Security & Risk Professionals

Security & Risk Professionals need to evolve from security domain experts to business leaders responsible for managing risk, protecting the brand, and upholding customer trust.

To succeed, you must execute on a business technology agenda focused on delivering superior customer experience to drive growth; manage information risks to operations, profits, IP reputation, and customer trust; and effectively allocate resources while positioning security as an enabler, not inhibitor.

Who this role is for:

Chief Information Security Officer (CISO)
Chief Security Officer (CSO)
Chief Risk Officer (CRO)
IT Risk/Compliance Manager

Vice President and Group Director Laura Koetzle (00:47)

Challenges facing today's Security & Risk leaders:

Earn and retain customer trust.

Develop Identity And Access Management Metrics For Employee And Customer Processes

Maximize success and minimize digital disruption risks.

The Forrester Wave™: Application Security, Q4 2014

Secure mobile experiences.

The Future Of Mobile Security: Securing The Mobile Moment

The Mobile Security Playbook For 2015

Protect data from theft and misuse.

Market Overview: Cloud Data Protection Solutions

The Data Security And Privacy Playbook For 2015

Security & Risk Blog

View more posts

Latest Research For This Role

Report: Brief: Cisco Continues Its Blistering Security Acquisition Pace With The Addition Of Lancope

Cisco's Network Security Portfolio Finally Stands On Its Own Merit

November 19, 2015 | Rick Holland

Cisco Systems recently announced its intent to acquire privately held, Atlanta-based Lancope, a decision that improves Cisco's network security offerings. The acquisition upgrades Cisco's network...

Report: Choose The Right Technologies To Support Your GRC Program

Tools And Technologies: The Governance, Risk, And Compliance Playbook

November 18, 2015 | Renee Murphy

There comes a point in any GRC program when the massive required efforts becomes too cumbersome to manage in separate systems and manual processes. Even if it were possible, there would be no...

View more research

Analysts Serving This Role

  • Martin Whitworth

    Martin Whitworth

    Management & Organization, Vendor Management...

  • Jennifer Torres

    Jennifer Torres

    Vulnerability & Threat Management, Management & Organization...

  • Kelley Mak

    Kelley Mak

    Vulnerability & Threat Management, Content Security...

View more analysts

Upcoming Events For This Role


May 10, 2016 - May 11, 2016

Webinar: Maximize Your Investment In Cyberthreat Intelligence Providers

December 14, 2015

Webinar: Make E-Signature's Implementation Successful Using Your Existing IAM Capabilities

December 17, 2015

View more events