Heidi Shey

Principal Analyst

Forrester Bio

Author Insights

Blog

Cyber Insurance: What The Changing Power Dynamics Mean For You

Heidi Shey April 8, 2022
Cyber insurance is only one component of a bigger enterprise cybersecurity risk management program. However, the cyber insurance market has been on a roller coaster, with skyrocketing premiums, changes in coverage, and a demand for policies that outweighs available supply. After years of affordable and readily available policies, the ubiquity of cyber insurance combined with […]
Blog

So aktualisieren Sie Ihr Risikomanagement angesichts des Krieges in der Ukraine

Alla Valente March 30, 2022
Führende Risikomanagementunternehmen in Europa und weltweit sind bereits vom Krieg in der Ukraine und den gegen russische und weißrussische Akteure verhängten Sanktionen betroffen. Forrester-Analysten geben in diesem Beitrag ihre Einschätzung.
Blog

Neem de volgende stappen om u goed voor te bereiden op het cyberveiligheidseffect van de oorlog in Oekraïne

Paul McKay March 29, 2022
Neem de volgende stappen om u goed voor te bereiden op het cyberveiligheidseffect van de oorlog in Oekraïne
Blog

Mit diesen Schritten können Sie sich auf die Auswirkungen des Krieges in der Ukraine auf die Cybersicherheit vorbereiten und entsprechend handeln

Paul McKay March 29, 2022
11 Schritte, die Sie jetzt tun können, um Ihre Risiken und die Gefährdung durch Cyber-Bedrohungen im Zusammenhang mit dem Krieg zu verringern.
Blog

Comment Mettre À Jour Votre Stratégie De Gestion Des Risques Face À La Guerre En Ukraine

Alla Valente March 28, 2022
Les leaders de la gestion des risques en Europe et dans le monde sont déjà impactés par la guerre en Ukraine et les sanctions imposées aux acteurs russes et biélorusses. Les analystes de Forrester fournissent leurs conseils dans cet article.
Blog

Mesures Pour Vous Préparer Et Gérer Les Effets Sur La Cybersécurité De La Guerre En Ukraine

Paul McKay March 28, 2022
Onze choses que vous pouvez faire maintenant pour réduire vos risques et votre exposition aux cybermenaces liées à la guerre.
Blog

Okta Lapsus$ Compromise: How To Make Sure You’re Protected

Merritt Maxim March 24, 2022
On Tuesday, March 22, 2022, identity-as-a-service (IDaaS) provider Okta announced that it had detected an attempt to compromise the account of a partner in January 2022. The announcement came after the hacking group Lapsus$ posted screenshots of a computer used by one of Okta’s third-party customer support engineers. As one of the largest IDaaS providers with […]
Blog

Fix The Vulnerability Within: Break Gender Bias In Cybersecurity

Jinan Budge March 7, 2022
Forrester predicts that in 2022, one in 10 experienced security pros will exit the industry. This brain drain is the result of a few dynamics colliding: poor financial and advancement incentives; general stress and burnout impacting security teams; and cybersecurity’s dirty little secret, workplace toxicity! And cybersecurity isn’t immune to the hidden epidemic impacting women’s ability […]
Blog

Navigate China’s New Data And AI Regulations

Guannan Lu March 3, 2022
Firms often struggle to identify the appropriate security controls and practices to comply with fast-changing data regulations. Here are three practices firms should adapt to keep pace.
Blog

Here’s How To Update Your Risk Management Posture Given The War In Ukraine

Alla Valente February 28, 2022
Risk management leaders in Europe and worldwide are already being impacted by the war in Ukraine and the sanctions imposed on Russian and Belarusian actors. Forrester analysts provide their guidance in this post.
Blog

Take These Steps To Prepare For And Handle The Cybersecurity Effects Of The War In Ukraine

Paul McKay February 28, 2022
Eleven things you can do now to reduce your risks and exposure to the cyber threats related to the war.
Blog

Rally Your Information Governance Dream Team To Delete Data Confidently

Cheryl McKinnon February 17, 2022
To delete the data or not? Get four tips on developing a successful data governance strategy.
Blog

The Future Of Work: Employee Privacy

Enza Iannopollo January 28, 2022
Privacy has become a priority for virtually every company, regardless of size, vertical, and geography. Privacy regulations have popped up around the world, including Europe, the US, and China. India will soon be added to the list. Rising customers’ and employees’ privacy expectations are also converging to force businesses to prioritize privacy and will keep […]
Blog

The Cyber Insurance Roller Coaster: As Demand Speeds Up, Some Insurers Disembark

Heidi Shey June 28, 2021
The first half of 2021 has been anything but quiet for cyber insurance. Forrester has seen a steady flow of client inquiries on the topic, with questions coming in not just from the private sector but also from the public sector. Some are trying to navigate acquiring a cyber insurance policy for the first time, […]
Blog

Forrester Decisions: How To Embed Cybersecurity And Privacy In Your Company

Heidi Shey May 26, 2021
It’s time to rethink how you approach and think about cybersecurity and privacy. Today, robust practices are necessary to create the culture and conditions required to meet today’s demands and truly differentiate your brand. But how do you accomplish this? Compliance is the bare minimum and not equivalent to creating robust cybersecurity and privacy practices. […]
Blog

Navigating The Struggles Of Data Deletion And Secure Data Disposal

Heidi Shey April 12, 2021
How long does your organization retain customer, employee, and sensitive corporate data, and how do you go about disposing of it? In the absence of explicit regulatory mandates, when and how to delete different types of records and personal data can become a tug-of-war between line-of-business, legal, and security teams. There are consequences of improper deletion and disposal, as well as excessive retention. In Italy, telecommunications company TIM received a fine […]
Blog

National Poetry Month And The Case For Whimsy In Security & Risk

Sandy Carielli April 5, 2021
We all need a bit of whimsy in our lives. This is not just an excuse for a whimsical blog post, though there is that. Whimsy and laughter build bridges. And in the security world, where empathy is a critical resource, whimsy can be a first and recurring step in connecting with the teams outside […]
Blog

Reflections On 2020: Cybersecurity Predictions Versus Reality

Heidi Shey February 8, 2021
You’re probably tired of hearing about 2021 cybersecurity predictions. This is something different. We’re taking a look back to what we predicted would happen in 2020 and grading our predictions. After all, why make predictions in the first place if we’re not going to reflect and assess ourselves afterward? When we make predictions, we aim to identify what is different that we think […]
Blog

Privacy And Security: We Need Both For Communications, And There’s An App For That

Heidi Shey January 29, 2021
Is WhatsApp safe for business use? Principal Analyst Heidi Shey provides insight for CISOs.
Blog

Read This Before Your Next Employee Hits The “Record” Button On An Online Meeting

Cheryl McKinnon December 14, 2020
What do a traveling Canadian Member of Parliament, a cable news legal commentator, and a director of a political organization have in common? They all had to use a meeting app to get their job done in the era of COVID-19 … just like so many of us. Yet as these examples show, with productivity reward […]
More posts