Security & Risk

November 9 – 10, 2021  |  Live Virtual Experience

Networking Opportunities

Connecting with like-minded peers is integral to making the most of your Security & Risk Forum experience. We are excited to offer multiple types of networking experiences for you throughout the conference and beyond.

Meet With Our Analysts

Security & Risk Forum 2021 offers unparalleled opportunities for meetings with our best-in-class analysts & experts. 1-on-1 meetings are 20-minute networking and guidance discussions focused on addressing a specific question or pressing topic you would like to discuss with an aligned analyst.

Registered attendees will be notified by email on how to book. All analyst & expert meetings are subject to change based on availability. Stay tuned for more information. Please email Maddie Beatson at for any questions.

Alla Valente, Analyst
Coverage: Governance Risk & Compliance and Third Party Risk.

Allie Mellen, Analyst
Coverage: Security Analytics, Security Information & Event Management, Security User Behavior Analytics, Security Orchestration, Endpoint Detection & Response, Extended Detection & Response and SOC Metrics.

Amy DeMartine, VP, Research Director 
Coverage: Business Resiliency/Continuity

Andre Kindness, Principal Analyst
Coverage: Network Access Control (NAC), Network Management, Network Security and Networking.

Cheryl McKinnon, Principal Analyst
Coverage: Enterprise content Management (ECM), Content Archiving, Enterprise file sync and share, Document-centric Collaboration, Life-cycle Management, information Governance and File Analytics.

Chris Condo, Principal Analyst
Coverage: Agile Software Services Providers, Application Development & Delivery, Continuous Delivery, DevOps, Software Product Development and Value Stream Management.

David Holmes, Senior Analyst
Coverage: Zero Trust, Firewalls, DDOS, Network Access Control, Network Security Policy, Microsegmentation, IDS/IPS, Automated Malware Analysis and DNS Security.

David Mooter, Senior Analyst
Coverage: APIs & API Management, Application Architecture, Integration Technologies, Microservices, and Event-Driven Architecture.

Enza Iannopollo, Senior Analyst
Coverage: Privacy And Risk, Data Protection, Trust, Digital Identity.

Jeff Pollard, VP, Principal Analyst
Coverage: Role of the CISO, CISO Leadership, Management, and Influence, Cybersecurity Metrics, Cybersecurity and the Board of Directors, Global Cybersecurity Services (MSSP, MDR, and Consulting), Product Security, Securing Emerging Technology, and Emerging Threats to Technology.

Jessica Burn, Senior Analyst 
Coverage: CISO/Security Leader Role & Priorities, Incident Response & Crisis Management, Email Security, Attack Surface Management, Security Staff Training, Certifications, & Education, Board & Executive Security Engagement.

Jinan Budge, Principal Analyst
Coverage: Security Awareness, Behavior, Culture, Strategy, CISO Leadership, Board & Executive Security Engagement, Security Program Management, Security Change Management, Issues Security Team Management and Retention, Fixing Toxic Security Culture, CISO & Security Team Mental Health & Burnout.

Joe Stanhope, VP, Principal Analyst
Coverage: Campaign Management, Customer Data Platform, Customer Intelligence, Direct Marketing, Enterprise Marketing Platforms, Marketing Automation, Marketing Organizational Structure and Online Marketing Technology.

Joseph Blankenship, VP, Research Director
Coverage: Artificial Intelligence (AI), Distributed Denial of Service (DDoS), Email Content Security, Information Security, Security Automation & Orchestration, Security Information & Event Management (SIEM), Security Operations & Program Governance, Technology, and Zero Trust.

Katy Tynan, Principal Analyst
Coverage: Employee Experience, Executive Leadership, Organization, Organizational Structure, Performance & Talent Management & Workforce Management.

Lee Sustar, Principal Analyst
Coverage: Multicloud container development platforms, Public Cloud enterprise Container platforms, and Public Cloud Infrastructure and Development Platforms and Cloud Compliance.

Merritt Maxim, VP, Research Director
Coverage: Authentication, Biometrics, Cloud Security, Encryption, Identity & Access Management (IAM), Information Security, Internet of Things (IoT), Passwords, Physical Security, Single Sign-On (SSO), and User Account Provisioning.

Michele Pelino, Principal Analyst
Coverage: Enterprise IoT use cases, Edge Computing Environments, 5G, Smart office/Smart buildings as firms prepare to return to work and Smart Cities.

Paul McKay, Principal Analyst
Coverage: EMEA Services Providers: Consultancies and Managed Security Services and MDR providers, Cyber Risk Ratings providers, Cyber Risk Quantification providers and consultancies and Zero Trust Implementation and Strategy.

Renee Murphy, Principal Analyst
Coverage: Security Program Governance, Security & Risk Strategy, IT Compliance & Audit, IT Controls, Governance; Risk & Compliance, Regulations, Risk Management, Customer Complaint Management and Customer-Facing Risks.

Sandy Carielli, Principal Analyst 
Coverage: Application Security, API Security, Mobile Application Security, Application Vulnerability Management, Web Application Firewalls, Bot Management, Application Security Testing, Application Penetration Testing, Open Source Security, Secure Software Development Lifecycle (SDLC) and Container Security.

Sean Ryan, Senior Analyst 
Coverage: Identity management and governance, privileged identity management, multi-factor authentication, identity-as-a-service (IDaaS) for enterprise, entitlements, user provisioning, user directory infrastructure and IAM managed services.

Stephanie Balaouras, VP, Group Director
Coverage: Security market trends, Security and risk strategy, Data security & privacy, Risk management, Business continuity & disaster recovery (BC/DR), pandemic planning, Climate change and Climate Risk management & Sustainability.

Steve Turner, Principal Analyst
Coverage: Network Analysis and Visibility, Zero Trust Strategy and Architecture and Security Technologies.

Additional Opportunities

Peer Networking

It’s time to make new connections and expand your network. Our event platform offers several unique features to connect attendees during the event. Whether you are looking for face-to-face chats or a chat based conversation, we have you covered.


Ever wanted the chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In these sessions, delegates will have the opportunity to engage with our Forrester keynoters and delve deeper into the frameworks and thought-leadership just revealed in their presentations.

Drop-In Discussions

Ever wanted the chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In these sessions, delegates will have the opportunity to engage with our Forrester analysts and delve deeper into the frameworks and thought-leadership just revealed in their session presentations.

Sponsor Connections

The platform offers seamless connections between attendees and leading technology providers. These connections provide attendees solutions that align to their roles and key initiatives.


Tuesday, November 9 | 1:15pm-1:30pm

Use Work From Anywhere To Explain Zero Trust. Explain Zero Trust To Accelerate Adoption
This drop in session will allow you to hear from Forrester Analysts and your peers about how Work From Anywhere principles act as a catalyst to accelerate Zero Trust adoption.

Jeff Pollard and Steve Turner, Forrester

Tuesday, November 9 | 1:15pm-1:30pm
Privacy and Data Protection Practices
Enza Iannopollo, Forrester

Wednesday, November 10 | 1:05pm-1:35pm
Security Operation Models – What Should They Look Like?
Allie Mellen, Forrester

Wednesday, November 10 | 1:05pm-1:35pm
Employees Who Advocate For Security First
Jess Burn, Forrester

Drop-In Discussions

Tuesday, November 9 | 3:10pm-3:40pm
Zero Trust Principles

David Holmes and Andre Kindess, Forrester


Tuesday, November 9| 4:30-pm-5:00pm
Ensuring A Safe And Secure Return To Office
During this session, you will hear from peers on how they are approaching the return to office from a safety and security perspective

Andrew Hewitt and Michele Pelino, Forrester

Tuesday, November 9| 4:30-pm-5:00pm
Comprehensive Identity and Access Management (IAM)
IAM represents the new access perimeter, a core pillar of regulatory compliance, automation, employee and customer trust and experience. Join Andras Cser and Sean Ryan to share best practices, lessons learned and vendor selection

Andras Cser, Forrester

Wednesday, November 10| 3:10pm-3:40pm
Securing The Software Supply Chain
During this session, you will learn from your peers how they are approaching software supply chain security. Explore; managing open source software and software bill of materials (SBOM), incorporating software supply chain in third-party risk management (TPRM) initiatives and securing the CI/CD pipeline.

Sandy Carielli, Christopher Condo, and Alla Valente, Forrester

Wednesday, November 10| 3:10pm-3:40pm
Risk is from Venus. Security is from Mars
During this session, you will learn from your peers how to take on a risk based approach to security, risk should not be Fear Uncertainty and Doubt (FUD) and security context matters to risk management.

Renee Murphy, Forrester