Shar VanBoskirk

VP, Principal Analyst serving Marketing Leadership PROFESSIONALS

Shar serves Marketing Leadership professionals. She is a leading expert on how businesses can leverage interactive marketing channels and technologies to drive sales and deepen customer relationships. During her 12 years with Forrester, Shar has been instrumental in the development of many of the company's interactive marketing program evaluation methodologies, training courses, and marketing planning tools and has also been part of Forrester's sales and consulting organizations.

Shar's research focuses on overall interactive marketing strategies; crafting efficient, effective interactive programs; organizing for interactive marketing; and integrating interactive channels into the rest of the marketing mix. Specific subjects addressed in Shar's research include email marketing, online advertising, search engine marketing, ad serving and targeting, interactive budgeting and forecasts, and interactive marketing organizational models.

Previous Work Experience

Shar returned to Forrester in 2004 after several years away working in marketing consulting. Shar served as research director for marketing research boutique, TideWatch, where she led internal strategy efforts and client strategy projects. Shar was also a consultant with Carlson Marketing Group's Business Strategy Consulting team, developing CRM and email programs for clients including British Airways, Buena Vista Home Entertainment, and Home Depot. Shar began her career at Forrester in 1997 during the early days of the Internet and has written research on customer loyalty, ad networks, and marketing measurement and planning.

A popular speaker, Shar has been seen on stage at ad:tech, MITX, DMA, and the Email Service Provider Coalition events, among others. She is on the board of SEMPO — the search engine marketing professionals organization — and is also widely quoted in the press including such media outlets as BusinessWeek, Fortune, The New York Times, and The Wall Street Journal and is a frequent guest on CNBC and National Public Radio.

Education

Shar is a graduate of Harvard University.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

52 results in Reports

  • Heidi Shey
  • For Security & Risk Professionals

    Report:Dissect Data To Gain Actionable INTEL

    Forrester's Data Security And Control Framework

    Forrester segments the problem of securing and controlling data into three areas: 1) defining the data; 2) dissecting and analyzing the data; and 3) defending and protecting the data. We refer to...

    • Downloads: 432
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 829
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: Q2 2013

    From frantic security operations problems to the changing threat landscape, CISOs, senior security leaders, and other IT risk management leaders consistently have trouble keeping up with key trends...

    • Downloads: 933
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 63
  • For Security & Risk Professionals

    Report:Tech Spotlight: Enterprise File Sharing

    The State Of Enterprise File Sharing In 2013 And What It Means For S&R Pros

    Much of the information used in the course of doing business today exists in a digital format, and there comes a point when it's necessary to share this data with other employees or key business...

    • Downloads: 289
  • For Security & Risk Professionals

    Report:Simplify Cybersecurity With PCI

    Policy And Procedures US Government Spotlight: The Security Architecture And Operations Playbook

    US federal law, specifically the Federal Information Security Management Act (FISMA), requires US federal government agencies to adhere to National Institute of Standards and Technology (NIST)...

    • Downloads: 398
  • For Security & Risk Professionals

    Report:Quick Take: Use "Customer-Managed Keys" To Regain Control Of Your Data

    Your Digital Business Can Adopt Cloud Services Without Sacrificing Security Or Privacy

    On February 10, 2015, Box announced a new enterprise key management system for security of content stored in the Box cloud. This new key management offering adds support for external encryption, key...

    • Downloads: 75
  • For Security & Risk Professionals

    Report:Quick Take: IBM Buys Trusteer And, With It, Better, More-Intelligent Data-Centric Security

    Prospects Are Good For This Acquisition, Which Matches Complementary Strengths

    On August 15, 2013, IBM announced its acquisition, for an undisclosed sum, of Trusteer, a fraud protection and cybersecurity firm focused primarily on providing services to banking customers. With...

    • Downloads: 194
  • For Security & Risk Professionals

    Report:Executive Spotlight: The CISO's Guide To Understanding The Chief Privacy Officer

    Join Forces To Enable The Business And Uphold Customer Privacy

    Chief privacy officers (CPOs), data protection officers (DPOs), privacy analysts, and other designated privacy professionals are a growing presence within the enterprise today as organizations seek...

    • Downloads: 143
  • For Security & Risk Professionals

    Report:Understand The State Of Data Security And Privacy: 2014 To 2015

    Benchmarks: Data Security And Privacy Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Business...

    • Downloads: 369
  • For Security & Risk Professionals

    Report:Quick Take: Symantec Splits In Two

    Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

    On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

    • Downloads: 133
  • For Security & Risk Professionals

    Report:Market Trends: Secure File Sharing And Collaboration In The Enterprise, Q1 2014

    What You Need To Know About Workforce Behavior And Available Data Controls

    Whether the organization's interest in file sharing and collaboration solutions comes from BYOD initiatives, workforce demands, or peer and partner collaboration requirements, security and risk (S&R)...

    • Downloads: 505
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2014 To 2015

    Benchmarks: The Security Architecture And Operations Playbook

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and security pros about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 355
  • For Security & Risk Professionals

    Report:Understand The State Of Data Security And Privacy: 2013 To 2014

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Forrsights Security...

    • Downloads: 1663
  • For Security & Risk Professionals

    Report:Brief: FTC Vs. Wyndham Ruling Further Solidifies The FTC's Role In US Data Security

    Firms Find Themselves In The FTC's Crosshairs By Violating Basic Security Principles

    Security and risk (S&R) professionals: If the US Federal Trade Commission (FTC) was not on your radar before, it should be now. Protecting consumers and consumer privacy is one of several mandates...

    • Downloads: 49
  • For Security & Risk Professionals

    Report:Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk

    It's Time For Healthcare CISOs To Close The Faucet Of Data Loss From Endpoints

    Amid a rising tide of compliance pressures, employee mobility, and high black-market values for personally identifiable information (PII) and personal healthcare information (PHI), security and risk...

    • Downloads: 158
  • For Security & Risk Professionals

    Report:Understand The State Of Network Security: 2013 To 2014

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

    • Downloads: 587
  • For Security & Risk Professionals

    Report:Survey Employees To Target Mobility Improvements

    This report outlines the benchmarks of Forrester's solution for security and risk (S&R) executives working on mobile security and operations initiatives. This report provides a benchmark of budgets,...

    • Downloads: 616
  • For Security & Risk Professionals

    Report:The Cybercriminal's Prize: Your Customer Data And Competitive Advantage

    Business Case: The Data Security And Privacy Playbook

    Protecting customer data such as credit card information, log-in credentials, and other personally identifiable information is one of the top priorities for both security and risk (S&R) leaders and...

    • Downloads: 812
  • For Security & Risk Professionals

    Report:Quick Take: Akamai Acquires Prolexic, Doubling Down On DDoS Mitigation Services

    On December 2, 2013, Akamai Technologies announced its acquisition of Prolexic Technologies, a provider (with more than 400 customers) of cloud-based DDoS protection and mitigation services for data...

    • Downloads: 163
  • For Security & Risk Professionals

    Report:Brief: EU Safe Harbor Review Impacts US Privacy Processes

    European Privacy Regulators Play Hardball With US Safe Harbor Rules And Demand Changes

    The EU Data Protection Act (DPA) attempts to ensure consistent protection of EU data by prohibiting the transfer of personal information to non-EU countries unless they meet the "adequacy" standard...

    • Downloads: 75
  • For Security & Risk Professionals

    Report:Use Voiceprint Biometrics To Eliminate Fraud Without Diminishing Customer Experience

    Tools & Technologies: The Identity And Access Management Playbook

    While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

    • Downloads: 146
  • For Security & Risk Professionals

    Report:Quick Take: Android For Work Upends Multiple Markets

    On February 25, 2015, Google publicly announced its latest functionality updates to the Android OS, titled "Android for Work" (AFW). The efficiency and security improvements delivered by AFW will...

    • Downloads: 80
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 587
  • For Security & Risk Professionals

    Report:Understand The Business Impact And Cost Of A Breach

    Business Case: The Security Architecture And Operations Playbook

    We are in the midst of a golden age of hacking. The information security threat landscape is changing rapidly, and security organizations are struggling to keep up with the changing nature,...

    • Downloads: 1284