Roles We Serve

Marketing & Strategy:

Technology Management:

Technology Industry:

Forrester Research For:

Security & Risk Professionals

Security & Risk Professionals need to evolve from security domain experts to business leaders responsible for managing risk, protecting the brand, and upholding customer trust.

To succeed, you must execute on a business technology agenda focused on delivering superior customer experience to drive growth; manage information risks to operations, profits, IP reputation, and customer trust; and effectively allocate resources while positioning security as an enabler, not inhibitor.

Who this role is for:

Chief Information Security Officer (CISO)
Chief Security Officer (CSO)
Chief Risk Officer (CRO)
IT Risk/Compliance Manager

Vice President and Group Director Laura Koetzle (00:47)

Challenges facing today's Security & Risk leaders:

Earn and retain customer trust.

Four Quick Wins To Improve Security Without Detracting From Customer Experience

The Identity And Access Management Playbook For 2016

Maximize success and minimize digital disruption risks.

Seven Steps To Protect Your eCommerce Website In 2016

Secure mobile experiences.

Secure IoT As It Advances Through Maturity Phases

The Mobile Security Playbook

Protect data from theft and misuse.

Lessons Learned From The World's Biggest Customer Data Breaches And Privacy Incidents, 2015

The Data Security And Privacy Playbook

Security & Risk Blog

View more posts

Latest Research For This Role

Report: Market Overview: Data Classification For Security And Privacy

Firms That Understand The Value Of Data Classify Their Data

February 24, 2017 | Heidi Shey

Data classification is a core component of defining and understanding data that security and risk (S&R) pros must protect, as well as identifying the way employees should handle it and the types of...

Report: The Forrester Wave™: Software Composition Analysis, Q1 2017

The Six Providers That Matter Most And How They Stack Up

February 23, 2017 | Amy DeMartine

In our 38-criteria evaluation of software composition analysis (SCA) providers, we identified the six most significant ones — Black Duck Software, Flexera Software, Sonatype, Synopsys, Veracode, and...

View more research

Analysts Serving This Role

  • Amy DeMartine

    Amy DeMartine

    Vulnerability & Threat Management, Information Security...

  • Josh Zelonis

    Josh Zelonis

    Vulnerability & Threat Management, Architecture & Technology Strategy...

  • Chris Sherman

    Chris Sherman

    Enterprise Mobile Devices, Physical Security...

View more analysts

Upcoming Events For This Role

Webinar: Top Security Trends From The RSA Conference 2017

February 27, 2017

Webinar: Can Biometrics Replace Passwords?

March 16, 2017

View more events