Shar VanBoskirk

VP, Principal Analyst serving Marketing Leadership PROFESSIONALS

Shar serves Marketing Leadership professionals. She is a leading expert on how businesses can leverage interactive marketing channels and technologies to drive sales and deepen customer relationships. During her 12 years with Forrester, Shar has been instrumental in the development of many of the company's interactive marketing program evaluation methodologies, training courses, and marketing planning tools and has also been part of Forrester's sales and consulting organizations.

Shar's research focuses on overall interactive marketing strategies; crafting efficient, effective interactive programs; organizing for interactive marketing; and integrating interactive channels into the rest of the marketing mix. Specific subjects addressed in Shar's research include email marketing, online advertising, search engine marketing, ad serving and targeting, interactive budgeting and forecasts, and interactive marketing organizational models.

Previous Work Experience

Shar returned to Forrester in 2004 after several years away working in marketing consulting. Shar served as research director for marketing research boutique, TideWatch, where she led internal strategy efforts and client strategy projects. Shar was also a consultant with Carlson Marketing Group's Business Strategy Consulting team, developing CRM and email programs for clients including British Airways, Buena Vista Home Entertainment, and Home Depot. Shar began her career at Forrester in 1997 during the early days of the Internet and has written research on customer loyalty, ad networks, and marketing measurement and planning.

A popular speaker, Shar has been seen on stage at ad:tech, MITX, DMA, and the Email Service Provider Coalition events, among others. She is on the board of SEMPO — the search engine marketing professionals organization — and is also widely quoted in the press including such media outlets as BusinessWeek, Fortune, The New York Times, and The Wall Street Journal and is a frequent guest on CNBC and National Public Radio.

Education

Shar is a graduate of Harvard University.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

50 results in Reports

  • Heidi Shey
  • For Security & Risk Professionals

    Report:Understand The State Of Data Security And Privacy: 2013 To 2014

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Forrsights Security...

    • Downloads: 1663
  • For Security & Risk Professionals

    Report:Rethinking Data Discovery And Data Classification

    Strategic Plan: The Data Security And Privacy Playbook

    Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data...

    • Downloads: 694
  • For Security & Risk Professionals

    Report:The Future Of Data Security: A Zero Trust Approach

    Vision: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses, and protecting it from theft, misuse, and abuse is the No. 1 responsibility of every S&R leader. Hacked customer data can erase millions in...

    • Downloads: 2480
  • For Security & Risk Professionals

    Report:Quick Take: Apple's iPhone 5S: The "S" Is For Security

    Biometrics Is Reborn On The Mobile Phone

    Biometrics has always held tremendous promise for better security, but it's never quite gained a solid foothold due to privacy concerns, cost of implementation, and availability of other substitute...

    • Downloads: 222
  • For Security & Risk Professionals

    Report:Know Your Data To Create Actionable Policy

    Policy: The Data Security And Privacy Playbook

    Data defense is the fundamental purpose of information security. To defend your data, there are only four levers you can pull — controlling access, inspecting data usage patterns for abuse,...

    • Downloads: 765
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2012 To 2013

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 748
  • For Security & Risk Professionals

    Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Landscape: The Data Security And Privacy Playbook

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

    • Downloads: 372
  • For Security & Risk Professionals

    Report:Market Overview: Secure File Sharing And Collaboration

    Key Questions For S&R To Ask When Creating A Short List

    User-driven, person-to-person secure file sharing and collaboration is a hot space today with vendors of all shapes and stripes offering solutions to enable these capabilities. These solutions not...

    • Downloads: 609
  • For Security & Risk Professionals

    Report:The Cybercriminal's Prize: Your Customer Data And Competitive Advantage

    Business Case: The Data Security And Privacy Playbook

    Protecting customer data such as credit card information, log-in credentials, and other personally identifiable information is one of the top priorities for both security and risk (S&R) leaders and...

    • Downloads: 804
  • For Security & Risk Professionals

    Report:Market Trends: Secure File Sharing And Collaboration In The Enterprise, Q1 2014

    What You Need To Know About Workforce Behavior And Available Data Controls

    Whether the organization's interest in file sharing and collaboration solutions comes from BYOD initiatives, workforce demands, or peer and partner collaboration requirements, security and risk (S&R)...

    • Downloads: 498
  • For Security & Risk Professionals

    Report:Forrester's 2014 Data Privacy Heat Map

    To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and...

    • Downloads: 1325
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 816
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1002
  • For Security & Risk Professionals

    Report:Job Description: Chief Privacy Officer

    Organization: The Data Security And Privacy Playbook

    Customers around the globe have become highly sensitive to how organizations track, use, and store their personal data. As a result, a plethora of often-conflicting privacy laws has emerged in almost...

    • Downloads: 463
  • For CMO Professionals

    Report:Quick Take: Apple Puts Mobile Moments At The Center Of Its Strategy

    With Apple Pay And Apple Watch, The Mobile Style Setter Will Make Payments And Wearables Worth The CMO's Trouble

    Today, Apple announced an integrated set of applications and connected devices — Apple Pay, the Apple Watch, and two iPhone 6 models — that will change how the CMO's team engages with...

    • Downloads: 307
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 577
  • For Security & Risk Professionals

    Report:Quick Take: IBM Buys Trusteer And, With It, Better, More-Intelligent Data-Centric Security

    Prospects Are Good For This Acquisition, Which Matches Complementary Strengths

    On August 15, 2013, IBM announced its acquisition, for an undisclosed sum, of Trusteer, a fraud protection and cybersecurity firm focused primarily on providing services to banking customers. With...

    • Downloads: 194
  • For Security & Risk Professionals

    Report:Empower The Workforce To Empower The Security Team

    Equip Your Workforce To Augment The Security Team

    When it comes to data security and privacy, Forrester has observed in client interactions time and time again that security teams remain overly fixated on the wrong adversary: their own organization....

    • Downloads: 249
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 61
  • For Security & Risk Professionals

    Report:Survey Employees To Target Mobility Improvements

    This report outlines the benchmarks of Forrester's solution for security and risk (S&R) executives working on mobile security and operations initiatives. This report provides a benchmark of budgets,...

    • Downloads: 616
  • For Security & Risk Professionals

    Report:Brief: EU Safe Harbor Review Impacts US Privacy Processes

    European Privacy Regulators Play Hardball With US Safe Harbor Rules And Demand Changes

    The EU Data Protection Act (DPA) attempts to ensure consistent protection of EU data by prohibiting the transfer of personal information to non-EU countries unless they meet the "adequacy" standard...

    • Downloads: 73
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 804
  • For Security & Risk Professionals

    Report:Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided

    Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage

    Although we are in the early stages of Sony Pictures Entertainment's (SPE's) catastrophically embarrassing intrusion, there are still many lessons that security and risk (S&R) professionals can take...

    • Downloads: 264
  • For Security & Risk Professionals

    Report:Forrester's Data Privacy Heat Map Supplement

    To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and...

    • Downloads: 132
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2014 To 2015

    Benchmarks: The Security Architecture And Operations Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and security pros about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 312