Roles We Serve

Marketing & Strategy:

Technology Management:

Technology Industry:

Forrester Research For:

Security & Risk Professionals

Security & Risk Professionals need to evolve from security domain experts to business leaders responsible for managing risk, protecting the brand, and upholding customer trust.

To succeed, you must execute on a business technology agenda focused on delivering superior customer experience to drive growth; manage information risks to operations, profits, IP reputation, and customer trust; and effectively allocate resources while positioning security as an enabler, not inhibitor.

Who this role is for:

Chief Information Security Officer (CISO)
Chief Security Officer (CSO)
Chief Risk Officer (CRO)
IT Risk/Compliance Manager

Challenges facing today's Security & Risk leaders:

Earn and retain customer trust.

Four Quick Wins To Improve Security Without Detracting From Customer Experience

The Identity And Access Management Playbook For 2016

Maximize success and minimize digital disruption risks.

Seven Steps To Protect Your eCommerce Website In 2016

Secure mobile experiences.

Secure IoT As It Advances Through Maturity Phases

The Mobile Security Playbook

Protect data from theft and misuse.

Lessons Learned From The World's Biggest Customer Data Breaches And Privacy Incidents, 2015

The Data Security And Privacy Playbook

Latest Research For This Role

Report: Top Competencies To Look For In An IAM Systems Integrator

Cloud App Integration, Hosting, And Identity Management And Governance Skills Matter

May 15, 2017 | Andras Cser

Systems integrators (SIs) are a crucial part of identity and access management (IAM) deployments. SIs bring valuable deployment and integration experience, and their vital advice on business process...

Report: Creating Actionable Security And Privacy Policy

Policy: The Data Security And Privacy Playbook

May 3, 2017 | Heidi Shey

Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the missing...

View more research

Analysts Serving This Role

  • Heidi Shey

    Heidi Shey

    Privacy, Data & Information Protection...

  • Peter Cerrato

    Peter Cerrato

    Vulnerability & Threat Management, Data & Information Protection...

  • Renee Murphy

    Renee Murphy

    Privacy, Risk Management...

View more analysts

Upcoming Events For This Role

Forum: Privacy And Security Europe 2017

October 5, 2017 - October 6, 2017

View more events