Shar VanBoskirk

VP, Principal Analyst serving Marketing Leadership PROFESSIONALS

Shar serves Marketing Leadership professionals. She is a leading expert on how businesses can leverage interactive marketing channels and technologies to drive sales and deepen customer relationships. During her 12 years with Forrester, Shar has been instrumental in the development of many of the company's interactive marketing program evaluation methodologies, training courses, and marketing planning tools and has also been part of Forrester's sales and consulting organizations.

Shar's research focuses on overall interactive marketing strategies; crafting efficient, effective interactive programs; organizing for interactive marketing; and integrating interactive channels into the rest of the marketing mix. Specific subjects addressed in Shar's research include email marketing, online advertising, search engine marketing, ad serving and targeting, interactive budgeting and forecasts, and interactive marketing organizational models.

Previous Work Experience

Shar returned to Forrester in 2004 after several years away working in marketing consulting. Shar served as research director for marketing research boutique, TideWatch, where she led internal strategy efforts and client strategy projects. Shar was also a consultant with Carlson Marketing Group's Business Strategy Consulting team, developing CRM and email programs for clients including British Airways, Buena Vista Home Entertainment, and Home Depot. Shar began her career at Forrester in 1997 during the early days of the Internet and has written research on customer loyalty, ad networks, and marketing measurement and planning.

A popular speaker, Shar has been seen on stage at ad:tech, MITX, DMA, and the Email Service Provider Coalition events, among others. She is on the board of SEMPO — the search engine marketing professionals organization — and is also widely quoted in the press including such media outlets as BusinessWeek, Fortune, The New York Times, and The Wall Street Journal and is a frequent guest on CNBC and National Public Radio.

Education

Shar is a graduate of Harvard University.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

117 results in Everything

  • Heidi Shey
  • For Security & Risk Professionals

    Report:Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook

    For security and risk (S&R) leaders, pursuing continuous improvement in security architecture and operations can mean many things: keeping on top of the threat landscape; anticipating future...

    • Downloads: 427
  • For Security & Risk Professionals

    Report:The Cybercriminal's Prize: Your Customer Data And Competitive Advantage

    Business Case: The Data Security And Privacy Playbook

    Protecting customer data such as credit card information, log-in credentials, and other personally identifiable information is one of the top priorities for both security and risk (S&R) leaders and...

    • Downloads: 812
  • For Security & Risk Professionals

    Blog:How Do You Maintain Your Security Edge?

    Keeping up with the threat and IT landscape, looking ahead to future technology and disruptive technologies, and keeping up with the regulatory landscape to identify what it means to your...

    • For Security & Risk Professionals

      Report:Executive Spotlight: The CISO's Guide To Understanding The Chief Privacy Officer

      Join Forces To Enable The Business And Uphold Customer Privacy

      Chief privacy officers (CPOs), data protection officers (DPOs), privacy analysts, and other designated privacy professionals are a growing presence within the enterprise today as organizations seek...

      • Downloads: 143
    • For Security & Risk Professionals

      Charts & Figures:Accessibility Is A Top Criteria For Information-Sharing Tools

      What You Need To Know About Workforce Behavior And Available Data Controls

    • For Security & Risk Professionals

      Report:Understand The State Of Network Security: 2012 To 2013

      Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

      • Downloads: 749
    • For Security & Risk Professionals

      Report:Brief: EU Safe Harbor Review Impacts US Privacy Processes

      European Privacy Regulators Play Hardball With US Safe Harbor Rules And Demand Changes

      The EU Data Protection Act (DPA) attempts to ensure consistent protection of EU data by prohibiting the transfer of personal information to non-EU countries unless they meet the "adequacy" standard...

      • Downloads: 75
    • For Security & Risk Professionals

      Charts & Figures:Accidental Data Disclosure And Data Governance Failures Happen

    • For Security & Risk Professionals

      Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

      Landscape: The Data Security And Privacy Playbook

      Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

      • Downloads: 415
    • For Security & Risk Professionals

      Blog:S&R Pros: Use The Mobile Mind Shift And Consumer Tools To Drive The Privacy Discussion

      The mobile mind shift: what is it? Forrester defines the mobile mind shift as the expectation that any desired information or service is available, on any appropriate device, in context, at a...

      • For Security & Risk Professionals

        Report:Understand The State Of Data Security And Privacy: 2014 To 2015

        Benchmarks: Data Security And Privacy Playbook

        Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Business...

        • Downloads: 370
      • For Security & Risk Professionals

        Charts & Figures:Privacy And Regulatory Responsibility Is A Large Part Of Enterprise Security

        Skills And Staffing: The Data Security And Privacy Playbook

      • For Security & Risk Professionals

        Report:Twelve Recommendations For Your Security Program In 2015

        Political Instability And Cyberterrorism Raise The Security Stakes For Digital Businesses

        Each winter, Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on thousands of client inquiries and interactions,...

        • Downloads: 256
      • For Security & Risk Professionals

        Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

        Landscape: The Security Architecture And Operations Playbook

        Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

        • Downloads: 832
      • For Security & Risk Professionals

        Report:Survey Employees To Target Mobility Improvements

        This report outlines the benchmarks of Forrester's solution for security and risk (S&R) executives working on mobile security and operations initiatives. This report provides a benchmark of budgets,...

        • Downloads: 616
      • For Security & Risk Professionals

        Charts & Figures:Tablet Users Use File Sync And Sharing Tools More Frequently

        What You Need To Know About Workforce Behavior And Available Data Controls

      • For Security & Risk Professionals

        Report:Simplify Cybersecurity With PCI

        Policy And Procedures US Government Spotlight: The Security Architecture And Operations Playbook

        US federal law, specifically the Federal Information Security Management Act (FISMA), requires US federal government agencies to adhere to National Institute of Standards and Technology (NIST)...

        • Downloads: 399
      • For Security & Risk Professionals

        Blog:Pet The Unicorns And Think Of Protecting Customer Data As A Corporate Social Responsibility

        In a research world where we collect data on security technology (and services!) adoption, security spending, workforce attitudes about security, and more, there’s one type of data that I get...

        • For Security & Risk Professionals

          Report:Planning For Failure

          An Effective Incident Management Program Is Essential To Help You Stay In Business

          S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

          • Downloads: 999
        • For Security & Risk Professionals

          Report:Brief: Legal Costs In A Customer Data Breach Now Pack A Bigger Punch

          Recent Legal Settlement Raises The Stakes For US Security Practices

          In December of 2009, two laptops containing sensitive information were stolen from the health insurance provider AvMed's corporate headquarters, leading to a breach of 1.2 million customer records....

          • Downloads: 151
        • For Security & Risk Professionals

          Charts & Figures:The Principles Of Privacy

        • For Security & Risk Professionals

          Charts & Figures:Insider And Business Partner Abuse And Inadvertent Misuse Cannot Be Overlooked

          Benchmarks: The Security Architecture And Operations Playbook

        • For Security & Risk Professionals

          Report:TechRadar™: Data Security, Q2 2014

          Road Map: The Data Security And Privacy Playbook

          We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming a...

          • Downloads: 734
        • For Security & Risk Professionals

          Charts & Figures:Security-As-A-Service Adoption: 2012 To 2013

          Benchmarks: The Security Architecture And Operations Playbook

        • For Security & Risk Professionals

          Report:Quick Take: Symantec Splits In Two

          Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

          On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

          • Downloads: 134