Shar VanBoskirk

VP, Principal Analyst serving Marketing Leadership PROFESSIONALS

Shar serves Marketing Leadership professionals. She is a leading expert on how businesses can leverage interactive marketing channels and technologies to drive sales and deepen customer relationships. During her 12 years with Forrester, Shar has been instrumental in the development of many of the company's interactive marketing program evaluation methodologies, training courses, and marketing planning tools and has also been part of Forrester's sales and consulting organizations.

Shar's research focuses on overall interactive marketing strategies; crafting efficient, effective interactive programs; organizing for interactive marketing; and integrating interactive channels into the rest of the marketing mix. Specific subjects addressed in Shar's research include email marketing, online advertising, search engine marketing, ad serving and targeting, interactive budgeting and forecasts, and interactive marketing organizational models.

Previous Work Experience

Shar returned to Forrester in 2004 after several years away working in marketing consulting. Shar served as research director for marketing research boutique, TideWatch, where she led internal strategy efforts and client strategy projects. Shar was also a consultant with Carlson Marketing Group's Business Strategy Consulting team, developing CRM and email programs for clients including British Airways, Buena Vista Home Entertainment, and Home Depot. Shar began her career at Forrester in 1997 during the early days of the Internet and has written research on customer loyalty, ad networks, and marketing measurement and planning.

A popular speaker, Shar has been seen on stage at ad:tech, MITX, DMA, and the Email Service Provider Coalition events, among others. She is on the board of SEMPO — the search engine marketing professionals organization — and is also widely quoted in the press including such media outlets as BusinessWeek, Fortune, The New York Times, and The Wall Street Journal and is a frequent guest on CNBC and National Public Radio.

Education

Shar is a graduate of Harvard University.

Refine your results

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

44 results in Everything

  • John Kindervag
  • Past 18 months
  • For Security & Risk Professionals

    Charts & Figures:Network Segmentation Gateway Vendor Comparison

  • For Security & Risk Professionals

    Charts & Figures:In Zero Trust, All Interfaces Are Untrusted

  • For Security & Risk Professionals

    Report:Quick Take: The State Of Privacy In The Union

    President Obama Introduces Privacy Initiatives With High Merit But Low Potential

    United States President Barack Obama introduced several proposed privacy initiatives in his 2015 State of the Union address and in preview comments he made to the Federal Trade Commission (FTC) the...

    • Downloads: 67
  • For Security & Risk Professionals

    Report:Rethinking Data Discovery And Data Classification

    Strategic Plan: The Data Security And Privacy Playbook

    Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data...

    • Downloads: 694
  • For Security & Risk Professionals

    Charts & Figures:Identify And Classify Your Toxic Data

  • For Security & Risk Professionals

    Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

    Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

    On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

    • Downloads: 112
  • For Security & Risk Professionals

    Report:The Future Of Data Security: A Zero Trust Approach

    Vision: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses, and protecting it from theft, misuse, and abuse is the No. 1 responsibility of every S&R leader. Hacked customer data can erase millions in...

    • Downloads: 2480
  • For Security & Risk Professionals

    Report:Know Your Data To Create Actionable Policy

    Policy: The Data Security And Privacy Playbook

    Data defense is the fundamental purpose of information security. To defend your data, there are only four levers you can pull — controlling access, inspecting data usage patterns for abuse,...

    • Downloads: 765
  • For Security & Risk Professionals

    Charts & Figures:Example Data Flow Mapping

  • For Security & Risk Professionals

    Report:Five Steps To A Zero Trust Network

    Strategic Plan: The Security Architecture And Operations Playbook

    A Zero Trust network abolishes the quaint idea of a "trusted" internal network demarcated by a corporate perimeter. Instead, it recognizes that today's digital businesses must win, serve, and retain...

    • Downloads: 114
  • For Security & Risk Professionals

    Charts & Figures:Network Storage And Database Encryption Adoption

  • For Security & Risk Professionals

    Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Landscape: The Data Security And Privacy Playbook

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

    • Downloads: 372
  • For Security & Risk Professionals

    Charts & Figures:The Most Common Breach Vector Is From The Inside

  • For Security & Risk Professionals

    Charts & Figures:Example Database Microcore And Perimeter

  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 816
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1002
  • For Security & Risk Professionals

    Report:Quick Take: Palo Alto Networks Acquires Cyvera

    Palo Alto Extends Its Reach To The Endpoint

    On March 24, 2014, Palo Alto Networks announced an agreement to acquire Cyvera, a privately held endpoint security company, for approximately $200 million. With the acquisition, Palo Alto Networks...

    • Downloads: 96
  • For Security & Risk Professionals

    Report:Introducing Forrester's Prioritized Patching Process (P3)

    Leverage Predictive Threat Modeling And Data Value For A Context-Based Approach To Patch Prioritization

    Criminals want access to your valuable assets, and one of their preferred methods is to exploit vulnerabilities lurking in your software and systems. Typically, these vulnerabilities have available...

    • Downloads: 317
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 577
  • For Security & Risk Professionals

    Report:Rules Of Engagement: A Call To Action To Automate Breach Response

    Processes: The Security Architecture And Operations Playbook

    It seems that not a day goes by that there isn't another massive security breach in the news. Consumers around the globe hear about continual threats to their personal data while name brand retailers...

    • Downloads: 160
  • For Security & Risk Professionals

    Charts & Figures:Centralized Key Management Adoption

  • For Security & Risk Professionals

    Report:Market Overview: Network Segmentation Gateways, Q4 2013

    Because of the increasing demand for Zero Trust networks, Forrester envisions the development of a new product category called a network segmentation gateway, a product category that is much more...

    • Downloads: 429
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 804
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1506
  • For Security & Risk Professionals

    Charts & Figures:All Traffic Is Inspected And Logged