Sandy Carielli,

Sandy Carielli

VP, Principal Analyst

Sandy advises security and risk professionals on application and product security, with a particular emphasis on the collaboration among security and risk, product management, application development, operations, and business teams. Her research covers topics such as application threat modeling, quantum security, protecting modern and emerging application architectures, protecting applications in production environments, and embedding security throughout the product lifecycle.

Research Coverage

Planned Research

What research can you expect from Forrester in the next 12 months? Updated biweekly, our publishing plan will keep you current with market and technology trends. Use the link below to download a list of our upcoming research.

Download Planned Research
March 16th, 2026 3:00 PM - 4:00 PM Webinar

Meet Your Cross Functional Q-Day Team

Quantum security requirements will hit organizations in places you did and didn’t expect — from the security team looking to upgrade its PKI to the development team making sure upcoming releases are quantum safe to the infrastructure team looking at hardware refreshes and legacy IoT devices. Organizations must mobilize across security, infrastructure, development, innovation, risk, and procurement to ensure their systems, data, and customer commitments remain secure in a post quantum world.In this fireside chat, we break down what Q day readiness truly requires, why timelines are shrinking, and how technology leaders can coordinate an effective, enterprisewide migration strategy. Whether you're leading security, infrastructure, product development, or risk governance, this session will help you chart a path toward quantum safe resilience.Key takeaways: Understand why quantum security timelines have accelerated — and what NIST’s deprecation deadlines mean for your organization.Learn the essential roles of your cross‑functional Q‑day team and how to coordinate enterprisewide cryptographic discovery and migration.Gain actionable guidance on preparing infrastructure, identity systems, third‑party ecosystems, and development pipelines for post‑quantum cryptography.Target audience level: beginner