Shar VanBoskirk

VP, Principal Analyst serving Marketing Leadership PROFESSIONALS

Shar serves Marketing Leadership professionals. She is a leading expert on how businesses can leverage interactive marketing channels and technologies to drive sales and deepen customer relationships. During her 12 years with Forrester, Shar has been instrumental in the development of many of the company's interactive marketing program evaluation methodologies, training courses, and marketing planning tools and has also been part of Forrester's sales and consulting organizations.

Shar's research focuses on overall interactive marketing strategies; crafting efficient, effective interactive programs; organizing for interactive marketing; and integrating interactive channels into the rest of the marketing mix. Specific subjects addressed in Shar's research include email marketing, online advertising, search engine marketing, ad serving and targeting, interactive budgeting and forecasts, and interactive marketing organizational models.

Previous Work Experience

Shar returned to Forrester in 2004 after several years away working in marketing consulting. Shar served as research director for marketing research boutique, TideWatch, where she led internal strategy efforts and client strategy projects. Shar was also a consultant with Carlson Marketing Group's Business Strategy Consulting team, developing CRM and email programs for clients including British Airways, Buena Vista Home Entertainment, and Home Depot. Shar began her career at Forrester in 1997 during the early days of the Internet and has written research on customer loyalty, ad networks, and marketing measurement and planning.

A popular speaker, Shar has been seen on stage at ad:tech, MITX, DMA, and the Email Service Provider Coalition events, among others. She is on the board of SEMPO — the search engine marketing professionals organization — and is also widely quoted in the press including such media outlets as BusinessWeek, Fortune, The New York Times, and The Wall Street Journal and is a frequent guest on CNBC and National Public Radio.

Education

Shar is a graduate of Harvard University.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

14 results in Everything

  • John Kindervag
  • Tech Sector Economics
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1514
  • For Security & Risk Professionals

    Charts & Figures:Centralized Key Management Adoption

  • For Security & Risk Professionals

    Charts & Figures:File-Level And Full Disk Encryption Adoption

  • For Security & Risk Professionals

    Report:TechRadar™: Data Security, Q2 2014

    Road Map: The Data Security And Privacy Playbook

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming a...

    • Downloads: 734
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1014
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires Mandiant

    FireEye Emerging As A Leader In A New Breed Of Security Companies

    On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

    • Downloads: 198
  • For Security & Risk Professionals

    Charts & Figures:Email Encryption Adoption

  • For Security & Risk Professionals

    Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

    But Only If Cisco Doesn't Strangle Innovation

    On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

    • Downloads: 233
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 587
  • For Security & Risk Professionals

    Report:Rethinking DLP: Introducing The Forrester DLP Maturity Grid

    Assessment Framework: The Data Security And Privacy Playbook

    Data loss prevention or protection (DLP) remains one of the hottest topics and most difficult challenges among S&R executives today. It's a key technology to help prevent the leakage and exfiltration...

    • Downloads: 1637
  • For Security & Risk Professionals

    Charts & Figures:Network Storage And Database Encryption Adoption

  • For Security & Risk Professionals

    Report:Rethinking Data Discovery And Data Classification

    Strategic Plan: The Data Security And Privacy Playbook

    Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data...

    • Downloads: 723
  • For Security & Risk Professionals

    Report:Kill Your Data To Protect It From Cybercriminals

    As cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape...

    • Downloads: 1174
  • For Security & Risk Professionals

    Report:Dissect Data To Gain Actionable INTEL

    Forrester's Data Security And Control Framework

    Forrester segments the problem of securing and controlling data into three areas: 1) defining the data; 2) dissecting and analyzing the data; and 3) defending and protecting the data. We refer to...

    • Downloads: 432