Roles We Serve

Marketing & Strategy:

Technology Management:

Technology Industry:

Forrester Research For:

Security & Risk Professionals

Security & Risk Professionals need to evolve from security domain experts to business leaders responsible for managing risk, protecting the brand, and upholding customer trust.

To succeed, you must execute on a business technology agenda focused on delivering superior customer experience to drive growth; manage information risks to operations, profits, IP reputation, and customer trust; and effectively allocate resources while positioning security as an enabler, not inhibitor.

Who this role is for:

Chief Information Security Officer (CISO)
Chief Security Officer (CSO)
Chief Risk Officer (CRO)
IT Risk/Compliance Manager

Vice President and Group Director Laura Koetzle (00:47)

Challenges facing today's Security & Risk leaders:

Earn and retain customer trust.

Four Quick Wins To Improve Security Without Detracting From Customer Experience

The Identity And Access Management Playbook For 2016

Maximize success and minimize digital disruption risks.

Seven Steps To Protect Your eCommerce Website In 2016

Secure mobile experiences.

Secure IoT As It Advances Through Maturity Phases

The Mobile Security Playbook

Protect data from theft and misuse.

Lessons Learned From The World's Biggest Customer Data Breaches And Privacy Incidents, 2015

The Data Security And Privacy Playbook

Security & Risk Blog

View more posts

Latest Research For This Role

Report: Jump-Start Zero Trust With Forrester's Reference Architecture

A Blueprint For Protecting Customers And Employees With Zero Trust

March 27, 2017 | Laura Koetzle

Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we...

Report: The Top IAM Trends From The RSA Conference 2017

March 24, 2017 | Andras Cser

Although maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access...

View more research

Analysts Serving This Role

  • Chris Sherman

    Chris Sherman

    Enterprise Mobile Devices, Physical Security...

  • Andras Cser

    Andras Cser

    Information Security, Single Sign-On...

  • Claire O'Malley

    Claire O'Malley

    Security Operations & Program Governance, Security Performance Management...

View more analysts

Upcoming Events For This Role

Forum: Privacy And Security Europe 2017

October 5, 2017 - October 6, 2017

Webinar: Build And Execute Your Action Plan For The EU General Data Protection Regulation

April 3, 2017

Webinar: Top IAM Trends From The 2017 RSA Conference

April 10, 2017

View more events