Security & Risk

November 9 – 10  |  Live Virtual Experience

Early Access

Nov 5
  • 12:00 pm – 4:00 pm ETOn-Demand Sessions
  • 12:00 pm – 4:00 pm ETSpotlight Sessions

Early Access

Nov 8
  • 12:00 pm – 4:00 pm ETOn-Demand Sessions
  • 12:00 pm – 4:00 pm ETSpotlight Sessions

Tuesday

Nov 9
  • 12:00 pm – 1:15 pm ETOpening Remarks & Keynote Sessions
  • 1:15 pm – 1:35 pm ETMarketplace Break & Networking
  • 1:35 pm – 1:55 pm ETBreakout Sessions
  • 2:00 pm – 2:20 pm ETCase Study Sessions
  • 2:25 pm – 2:45 pm ETBreakout Sessions
  • 2:50 pm – 3:10 pm ETCase Study Sessions
  • 3:10 pm – 3:30 pm ETMarketplace Break & Networking
  • 3:30 pm – 3:50 pm ETBreakout Sessions
  • 3:55 pm – 4:05 pm ETIntroducing Forrester’s Bold New Research Offerings
  • 4:10 pm – 4:40 pm ETKeynote Sessions
  • 4:30 pm – 5:00 pm ETFacilitated Networking Sessions

Wednesday

Nov 10
  • 12:00 pm – 1:05 pm ETKeynote Sessions
  • 1:05 pm – 1:25 pm ETMarketplace Break & Networking
  • 1:25 pm – 1:45 pm ETCase Study Sessions
  • 1:50 pm – 2:10 pm ETBreakout Sessions
  • 2:15 pm – 2:45 pm ETSponsor Panel
  • 2:50 pm – 3:10 pm ETBreakout Sessions
  • 3:10 pm – 3:30 pm ETMarketplace Break & Networking
  • 3:30 pm – 3:50 pm ETCase Study Sessions
  • 3:55 pm – 4:15 pm ETBreakout Sessions
  • 4:20 pm – 4:50 pm ETKeynote Sessions

Early Access Nov 5

12:00 pm – 4:00 pm ET

Overview Of Early Access Days

We are granting early access to the platform on Friday, November 5 and Monday, November 8 to ensure that attendees are fully prepared for our live event days. At this time, you can begin to build your personalized agenda, create your profile, and watch a handful of sessions that are available for early access viewing.

Attendee Orientation

Join us for the Security & Risk Forum attendee orientation. Our event program manager will take you on a tour of the platform as well as share planning and engagement tips to help you get the most out of the event!

The Value Propositions Of Diversity, Equity, And Inclusion In Tech

Technology can innovate and shape our lives in magnificent ways. Diversity, Equity, and Inclusion can contribute to that innovation in new and exciting ways. Join Jordan Mitchell and Forrester’s Katy Tynan to discuss how finding the value proposition of DEI within your functions can revolutionise results.

Speakers:
Katy Tynan, Principal Analyst, Forrester
Jordan Mitchell, Global DEI Engagement Partner, Sprout Social

Inclusion And The Math Of Equity

What does inclusion mean and what are the implications if we truly want to be an equitable organization? Schindler’s Inclusion Scale explains how inclusion relates to tolerance, equality, empathy and equity. The session reveals the surprisingly radical implications of equity based on a mathematical model.

Speakers:
Eric Way, Global Head of Inclusion, Diversity and CSR, Schindler Group

Technology Won’t Save You From Your Innovation Problem: Why Inclusive Leadership Holds The Key To Unlocking New Connections And Ideas

Innovate or die. That’s the mandate as the global economy has increased pressure across all organizations to find new ways of serving customers, as well as reinventing operating practices for competitive advantage. Many organizations look to technology to help them drive new ideas and find new ways of working but focusing exclusively on tech leaves many businesses blind to the most essential part of the innovation equation: people. As organizations seek to serve an increasingly diverse population of customers and stakeholder, their lack of focus on diversity, equity, and inclusion has created an innovation gap. Inclusive leadership holds the key to closing that gap before it becomes an existential threat.

Speakers:
Katy Tynan, Principal Analyst, Forrester

Spotlight Sessions

See the full list of available Spotlight Sessions here. These sessions offer exposure to leading technology providers with solutions that align to your key initiatives.

Early Access Nov 8

12:00 pm – 4:00 pm ET

Overview Of Early Access Days

We are granting early access to the platform on Friday, November 5 and Monday, November 8 to ensure that attendees are fully prepared for our live event days. At this time, you can begin to build your personalized agenda, create your profile, and watch a handful of sessions that are available for early access viewing.

Attendee Orientation

Join us for the Security & Risk Forum attendee orientation. Our event program manager will take you on a tour of the platform as well as share planning and engagement tips to help you get the most out of the event!

Technology Won’t Save You From Your Innovation Problem: Why Inclusive Leadership Holds The Key To Unlocking New Connections And Ideas

Innovate or die. That’s the mandate as the global economy has increased pressure across all organizations to find new ways of serving customers, as well as reinventing operating practices for competitive advantage. Many organizations look to technology to help them drive new ideas and find new ways of working but focusing exclusively on tech leaves many businesses blind to the most essential part of the innovation equation: people. As organizations seek to serve an increasingly diverse population of customers and stakeholder, their lack of focus on diversity, equity, and inclusion has created an innovation gap. Inclusive leadership holds the key to closing that gap before it becomes an existential threat.

Speakers:
Katy Tynan, Principal Analyst, Forrester

Inclusion And The Math Of Equity

What does inclusion mean and what are the implications if we truly want to be an equitable organization? Schindler’s Inclusion Scale explains how inclusion relates to tolerance, equality, empathy and equity. The session reveals the surprisingly radical implications of equity based on a mathematical model.

Speakers:
Eric Way, Global Head of Inclusion, Diversity and CSR, Schindler Group

The Value Propositions Of Diversity, Equity, And Inclusion In Tech

Technology can innovate and shape our lives in magnificent ways. Diversity, Equity, and Inclusion can contribute to that innovation in new and exciting ways. Join Jordan Mitchell and Forrester’s Katy Tynan to discuss how finding the value proposition of DEI within your functions can revolutionise results.

Speakers:
Katy Tynan, Principal Analyst, Forrester
Jordan Mitchell, Global DEI Engagement Partner, Sprout Social

Spotlight Sessions

See the full list of available Spotlight Sessions here. These sessions offer exposure to leading technology providers with solutions that align to your key initiatives.

Tuesday Nov 9

12:00 pm – 12:40 pm ET

Opening Remarks & Keynote Session

CISOs And The Trust Imperative

The trust imperative represents the greatest opportunity for transformation for CISOs since the creation of their senior roles. For decades, security, risk, and privacy leaders struggled to maintain alignment with the organization, to feel like they meaningfully contributed to the firm’s objectives. Avoided at best, ridiculed and scapegoated at worst, the trust imperative proves all the toil was worth it. This session will help these leaders understand the trust imperative, the levers of trust, and what to do about them. Establishing and preserving trust will move markets, and CISOs are uniquely positioned to contribute and maximize the firm’s chance of success and exponentially amplify the value they bring to their firm during the trust imperative.

Speakers:
Stephanie Balaouras, VP, Group Director, Forrester
Jeff Pollard, VP, Principal Analyst, Forrester

12:45 pm – 1:15 pm ET

The Future Of Privacy

With governments around the world adopting new privacy bills weekly, consumers’ and employees’ privacy expectations on the rise, business partners pressuring companies over their privacy and data protection practices, and technology increasing dramatically the impact of privacy risks on all stakeholders, companies struggle to manage the continuously evolving complexity. A future fit, effective privacy and data protection program starts with a new vision for privacy that leads with trust and value over short-term, transactional wins. Security, risk, and privacy professionals must transform the way they manage their practices and define goals, how they collaborate with internal and external stakeholders, and how they measure outcomes. Join this session to hear what the future of privacy holds and to learn how your peers are preparing for it.

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

1:15 pm – 1:35 pm ET

Marketplace Break & Networking

AFTERWORDS 
Ever wanted the chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In these sessions, delegates will have the opportunity to engage with our Forrester keynoters and delve deeper into the frameworks and thought-leadership just revealed in their presentations. Come with your questions or join as a listener, either way you won’t want to miss it! 

Use Work From Anywhere To Explain Zero Trust. Explain Zero Trust To Accelerate Adoption

This Afterwords session will allow you to hear from Forrester Analysts and your peers about how work from anywhere principles act as a catalyst to accelerate Zero Trust adoption.

• The updated definition of Zero Trust incorporates Work From Anywhere principles

•Use Work From Anywhere to explain Zero Trust to non-technologists

• Enable different work styles to energize employees about Zero Trust

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester
Steve Turner, Analyst, Forrester

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

1:35 pm – 1:55 pm ET

Breakout Sessions

Risk, Privacy, And Compliance Management
The Right Stuff: Better, Faster Decisions With ERM

The key to business success is knowing which risks are worth taking and acting quickly to seize new opportunities or to avoid costly missteps. It’s not rocket science, but few know how to get there. To do this successfully, risk pros must master five competencies of the Forrester enterprise risk management (ERM) success cycle — identify, evaluate, respond, monitor, and communicate. Learn what you can do to help your firm grow, innovate, lead, and disrupt by harnessing ERM.

Speakers:
Amy DeMartine, VP, Research Director, Forrester

READ MORE +READ LESS -
Leadership
Post-Breach Lessons From SolarWinds

You’ve likely read much about the SolarWinds breach since December 2020 — but not like this. This session is the deeper-dive sequel to Laura’s keynote interview of SolarWinds CEO Sudhakar Ramakrishna at RSA Conference 2021. Ron Plesco, partner at DLA Piper and one of the leaders of the SolarWinds investigation team, will join Laura for a fireside chat where they will discuss aspects of the breach and lessons that security and risk leaders can apply.

Speakers:
Laura Koetzle, VP, Group Director, Forrester
Ron Plesco, Partner, DLA Piper

READ MORE +READ LESS -
Zero Trust Security
There Is No Try: Implement Zero Trust, You Must

Zero Trust is the standard for securing your organization. As firms sort through the marketing noise, litany of different frameworks, and publications, more questions than answers emerge about what makes up a proper Zero Trust architecture. In this session, Steve Turner will discuss how Zero Trust has gone from concept to reality, the critical pieces of a Zero Trust architecture, and the transformational changes in culture, skills, and operations you need to implement to be successful.

Speakers:
Steve Turner, Analyst, Forrester

READ MORE +READ LESS -
Products And Applications Security
Secure What You Sell: Becoming A Top-Line CISO

The CISO who takes responsibility for product security moves their organization from cost center to revenue driver. By incorporating security activities at all stages of the product lifecycle, the security team enhances customer trust and accelerates revenue. In this session, we introduce the Forrester What You Sell (SWYS) Model and discuss how to integrate it into your organization’s top-line strategy to help the business sell trusted products.

 

 

Speakers:
Sandy Carielli, Principal Analyst, Forrester

READ MORE +READ LESS -
2:00 pm – 2:20 pm ET

Case Study Sessions

FireMon: Zero Trust Begins by Conquering Network Complexity

Moving from a traditional perimeter-based security architecture to zero trust can be daunting at first, and many organizations struggle with where to start.
There are concrete steps that organizations may take with existing infrastructure that can help both harden security and fulfil core zero trust tenets. Join this presentation to learn how to bridge from today’s perimeter-based network infrastructure to zero trust through agile network security policy management.

Please note, by viewing this sponsor’s session you will be included in the sponsor’s session lead report.

Speakers:
Tim Woods, Vice President of Technology Alliances, FireMon

IBM: Modernizing SOC with Open Security

Today’s security environment has grown too complicated, and clients are challenged with too many tools, too much data, and too few skills. To transform, we must think differently and leverage open & collaborative practices to respond faster & more intelligently. This session will discuss how using an open platform to integrate existing security tools across a hybrid environment can generate more in-depth insights and help analysts respond faster to incidents.

Please note, by viewing this sponsor’s session you will be included in the sponsor’s session lead report.

Speakers:
Dr. Sridhar Muppidi, IBM Fellow and CTO, IBM

VENAFI: Lessons from Venafi Customers for Eliminating Certificate-Based Outages

Certificate-related outages, whether from expired or misconfigured or unknown TLS certificates, are the bane of digital transformation. Perfectly functioning applications and services can be rendered inoperable. Worse still the security controls you rely on, from traffic inspection devices to web application firewalls, can’t protect you when a certificate-related outage shuts them down. In this session, we’ll share approaches Venafi customers have taken to align people, processes and technology to eliminate certificate-based outages for good.

Please note, by viewing this sponsor’s session you will be included in the sponsor’s session lead report.

Speakers:
Diane Garey, Product Marketing Manager, Venafi

2:25 pm – 2:45 pm ET

Breakout Sessions

Risk, Privacy, And Compliance Management
Risky Business: Managing Third-Party Risk Correctly

Third parties are your source of strength or your Achilles’ heel. They account for over 60% of all data breaches and leave firms on the hook financially and reputationally when events lead to negative publicity, business disruption, or impact the customer experience. As dependence on third parties increases, it’s time to “take those old records off the shelf” and improve third-party risk management by thinking like Joel Goodson in the cult classic film, “Risky Business.”

Speakers:
Alla Valente, Senior Analyst, Forrester

READ MORE +READ LESS -
Leadership
Utilizing Cyber Risk Quantification For Effective Boardroom Communication

Cybersecurity remains a board-level concern, but directors are getting tired of handing out budget increases every year. Directors want to know the ROI of security investments and quantify risk exposure. Cyber risk quantification methods and tools can help you reach this state of boardroom nirvana, but the market is currently immature. Join this session to understand your choices for cyber risk quantification and learn how to get started sustainably and avoid pitfalls.

Speakers:
Paul McKay, Principal Analyst, Forrester

READ MORE +READ LESS -
Zero Trust Security
Zero Trust Edge: Networking, Security

The adoption of Zero Trust edge accelerated by the pandemic is here to stay. Hear the analysts behind the Zero Trust edge report demystify the convergence of networking and security, and see how Zero Trust principles will secure enterprises when all networking, security, and SASE capabilities are delivered as a service.

Speakers:
Andre Kindness, Principal Analyst, Forrester
David Holmes, Senior Research Analyst, Forrester

READ MORE +READ LESS -
Products And Applications Security
Designing Products With Security In Mind

Incorporating security-by-design and privacy-by-design principles when building new products and services grows customer trust and loyalty and creates sustained competitive differentiation. In this session, Forrester analysts will discuss how product teams can design and build secure and trusted products and offer some practical real-world examples of how the Forrester Secure What You Sell Model (SWYS) is enabling this approach.

Speakers:
Merritt Maxim, VP, Research Director, Forrester
Lisa Singer, VP, Research Director, Forrester

READ MORE +READ LESS -
2:50 pm – 3:10 pm ET

Case Study Sessions

Google Cloud: The art of the possible with a modern zero trust approach

Have you heard about the benefits of zero trust but don’t know where to start? Curious how peers in your industry are implementing it? Join this session to learn more about how a modern zero trust approach can be applied across different use cases and how to get started leveraging a tool you use everyday: the browser!

Please note, by viewing this sponsor’s session you will be included in the sponsor’s session lead report.

Speakers:
Kiran Nair, Chrome Browser Security Product Manager, Google
Jian Zhen, Product Manager, Google Cloud

Key Resources, Inc.: Mainframe Vulnerability Management

Do you have processes and procedures in place for mitigating and reporting mainframe vulnerabilities?

This presentation will provide you with best practices from someone who has been doing mainframe

vulnerability scanning since 2009.  You will learn:

  1. What would make your mainframe vulnerable?
  2. The ins and outs of mainframe vulnerability scanning, what to expect.
  3. Collecting the vulnerability data and reporting findings to your vendors.
  4. Mitigating and resolving mainframe vulnerabilities.

Speakers:
Hayim Sokolsky, Director, Security Architecture,

KnowBe4: Exploring The Root Causes of Ransomware

Again and again, ransomware tops lists of cybersecurity threats and for good reason. Ransomware has affected tens of thousands of organizations from small to very large. It’s brought down hospitals, pipelines, food production conglomerates, police stations and even entire cities. But the key to mitigating this scourge is understanding that ransomware is not your real problem. It is the outcome of your real problem, which is often related to social engineering and phishing. In this session we’ll explore the root causes of ransomware and how your organization can combat them.

Please note, by viewing this sponsor’s session you will be included in the sponsor’s session lead report.

Speakers:
Roger Grimes, Data-Driven Security Evangelist, KnowBe4

3:10 pm – 3:30 pm ET

Marketplace Break & Networking

Drop-In Discussions

Ever wanted the chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In these sessions, delegates will have the opportunity to engage with our Forrester analysts and delve deeper into the frameworks and thought-leadership just revealed in their sessions. 

Come with your questions or join as a listener, for this analyst-led, low-pressure group format that enables conversations, networking and engagement on popular security & risk topics. You won’t want to miss it!

Speakers:
David Holmes, Senior Research Analyst, Forrester
Andre Kindness, Principal Analyst, Forrester

3:30 pm – 3:50 pm ET

Breakout Sessions

Risk, Privacy, And Compliance Management
The Future Of Data Protection

To protect sensitive data and meet compliance requirements in new data sharing business models, anywhere work scenarios, and the development of anticipatory customer experiences, companies are evaluating and adopting a range of new approaches and technologies. In this roundtable, Forrester analysts will provide their insights on new approaches to data governance and risk management, secure collaboration, and the adoption of emerging privacy preserving technologies.

Speakers:
Stephanie Balaouras, VP, Group Director, Forrester
Cheryl McKinnon, Principal Analyst, Forrester
Michele Goetz, VP, Principal Analyst, Forrester
Enza Iannopollo, Principal Analyst, Forrester

READ MORE +READ LESS -
Leadership
To Err Is Human; To Forgive Builds Trust

Since phishing simulations became common practice, debate has raged as to whether to punish those who repeatedly fail. More recently, this debate has extended to those who fail cybersecurity awareness and training quizzes or fall victim to breaches, such as business email compromise. In extreme cases, this punishment includes termination. In less severe cases, disciplinary action includes warnings or additional mandatory training. In this session, you’ll learn why punishing users and using negative messaging is counterproductive and how, through tips and real-world examples, nurturing better behavior fosters security culture.

Speakers:
Jinan Budge, Principal Analyst, Forrester

READ MORE +READ LESS -
Zero Trust Security
Secure The Anywhere-Work Experience Across All Generations

Each of today’s four workforce generations will increasingly work flexibly, but each generation will come with its own set of expectations for how, when, and why to take advantage of anywhere work. Join this session to learn how CISOs can better understand these expectations and tailor their security strategy to maximize employee engagement across each generation.

Speakers:
Andrew Hewitt, Senior Analyst, Forrester

READ MORE +READ LESS -
Products And Applications Security
Customer Identity And Access Management: It’s More Important Than You Think

Customer identity and access management (CIAM) plays a critical role in ensuring a delightful and secure digital customer journey. When registrations, logins, password resets, and other self-service tasks are unintuitive, slow, or fail altogether, your customers will quickly depart, hurting your organization’s revenue and brand image. This presentation will discuss CIAM best practices in the areas of identity verification, digital onboarding, strong authentication, user self-service, fraud management, and back-office systems integration.

Speakers:
Andras Cser, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Diversity & Inclusion
A New Society Has Arrived. Is Your Firm Ready To Embrace It?

The conversation about race and gender and the imperative for fairness and equality has reached a crescendo. Companies face a new urgency to address these social vectors head-on in the way they do business. To get it right, firms must move beyond knee-jerk action to systemic change. In this session, we will explore the challenges ahead and outline a framework to rethink stakeholder relationships – employees, partners, customers, and the community – in light of the new social reality.

Speakers:
Dipanjan Chatterjee, Vice President, Principal Analyst, Forrester

READ MORE +READ LESS -
Executive Leadership Exchange (ELE)
How To Effectively Communicate The Value Of Risk Management To The Board

This exclusive session for ELE attendees follows on from the “Utilizing Cyber Risk Quantification For Effective Boardroom Communication” session in the Leadership track, diving into a fireside chat with a Chief CyberRisk Officer to hear exactly how their organization established confidence and unwavering support of an enterprise risk management program from the board.

Speakers:
Renee Murphy, Principal Analyst, Forrester
Cody Scott, Chief Cyber Risk Officer, NASA

READ MORE +READ LESS -
3:55 pm – 4:05 pm ET

Introducing Forrester’s Bold New Research Offerings

Gain insights into current and future markets. Make decisions with confidence. Accelerate progress on your most pressing priorities. Join us for a deep dive session on Forrester’s new research offerings — to be unveiled at Security & Risk — that help you do all of these things and more.

Speakers:
Carrie Johnson, Chief Research Officer, Forrester

4:10 pm – 4:40 pm ET

Featured Performer: Jewel

Join us for a special performance from Jewel!

Jewel went from a girl who grew up with no running water on an Alaskan homestead, to a homeless teenager in San Diego, to an award winning, Multi-Platinum Recording Artist who released one of the best-selling debuts of all time.

Through her career Jewel has sold over 30 million albums worldwide, earned 26 Music Award nominations, including The Grammys, American Music Awards, MTV Awards, VH1 Awards, Billboard Music Awards, and Country Music Awards, winning 8 times. Jewel has been featured on the cover of TIME Magazine, Rolling Stone, performed on Saturday Night Live, at the Super Bowl, the NBA Finals, for The Pope and The President Of The United States. She has experimented with several genres over her career with top hits in Folk, Pop, Club, Country, Standards, Children’s and Holiday music.

Mental health and mindfulness has been a lifelong passion of Jewel’s. She offers free mindfulness exercises and an online mental health community at JewelNeverBroken.com.

2020 marked a momentous year for Jewel — she celebrated the 25th anniversary of her multi-platinum debut album, “Pieces of You” with an exclusive Anniversary package of the album released on Craft Recordings. It gives listeners a vivid insider’s look at how this album came to be, collecting all relevant rarities and previously unissued tracks in one place. To celebrate, Jewel performed for the first time, the full album in sequence from front to back in a live streamed concert. In addition, Jewel has been hard at work on a new studio album and a forthcoming book.

4:30 pm – 5:00 pm ET

Facilitated Networking

Drop-In Discussions

Ever wanted the chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In these sessions, delegates will have the opportunity to engage with our Forrester analysts and delve deeper into the frameworks and thought-leadership just revealed in their sessions. 

Come with your questions or join as a listener, for this analyst-led, low-pressure group format that enables conversations, networking and engagement on popular security & risk topics. You won’t want to miss it!

Ensuring A Safe And Secure Return To Office

During this session, you will hear from peers on how they are approaching the return to office from a safety and security perspective. Below are the topics we’ll explore during the session:

• The key safety and security challenges organizations will face with the return to work

• Incorporating new technologies into your return to office strategy that maximize health, safety, and security alongside employee experience

Speakers:
Andrew Hewitt, Senior Analyst, Forrester
Michele Pelino, Principal Analyst, Forrester

Comprehensive Identity and Access Management (IAM)

IAM represents the new access perimeter, a core pillar of regulatory compliance, automation, employee and customer trust and experience. Join Andras Cser and Sean Ryan to share best practices, lessons learned and vendor selection gotchas in the areas of employee IAM, business partner IAM and customer IAM.

Speakers:
Andras Cser, VP, Principal Analyst, Forrester
Sean Ryan, Senior Analyst, Forrester

Wednesday Nov 10

11:00 am – 11:50 am ET

ELE Exclusive – Predictions 2022: Security, Risk, and Privacy

Join us for an ELE exclusive live session reviewing our Security, Risk, and Privacy predictions for 2022. The Analysts will walk through this year’s five predictions, overarching themes we identified in the predictions, why each one matters and most importantly what security leaders should do about them. Attendees will learn about how the next twelve months will bring shake ups to: remote work and employee experience, third party risk management and cyberinsurance, cybersecurity staffing challenges, and overexuberant vendor market. This session will also include a live question and answer session with the authors of the report: Jeff Pollard, Sandy Carielli, Enza Iannopollo, Alla Valente, Jess Burn, Allie Mellen, Steve Turner where ELE attendees can ask the authors any questions they have about the predictions.

 

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

12:00 pm – 12:30 pm ET

Set The SOC Free: Upending The Security Operations Model For A New Era

“To change something, build a new model that makes the existing model obsolete.” — Buckminster Fuller
Security operations has fought the same way for 30 years, leading to high costs, burnout, and continued breaches. To change for the future, it’s essential that we reimagine the fundamentals of security operations to benefit us instead of attackers. In this talk, we explore a new, adaptable way of thinking about security operations and a pragmatic path to get there.

 

Speakers:
Allie Mellen, Analyst, Forrester

12:35 pm – 1:05 pm ET

Panel Discussion: Empower Your Firm To Go To Market On Trust

CISOs, their strategies, and their teams provide the springboard from which firms go to market with trust. In this panel discussion, you’ll hear from security leaders about how they ensure security is the easy choice for employees at all levels of the organization. They’ll share how they’ve armed employees to champion the cause of security within their own functions, moving the trusted business beyond marketing messages to consistently lived and demonstrated principles.

Speakers:
Jess Burn, Senior Analyst, Forrester
Puneet Thapliyal, Chief Information Security Officer, Ginger
Jason Lee, Chief Information Security Officer, Zoom

1:05 pm – 1:25 pm ET

Marketplace Break & Networking

AFTERWORDS 
Ever wanted the chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In these sessions, delegates will have the opportunity to engage with our Forrester keynoters and delve deeper into the frameworks and thought-leadership just revealed in their presentations. Come with your questions or join as a listener, either way you won’t want to miss it! 

That’s Your Job! How to Find a Constructive Division of Labor Between SecOps and IT Ops

This networking session will give you unfettered access to Forrester Analysts and your peers for an animated discussion on how and where to establish boundaries between IT operations and security operations.

  • A deeper look at the two-way relationship between SecOps and ITOps
  • Differentiation between roles and responsibilities
  • How to offload the appropriate tasks to IT Ops

Speakers:
Allie Mellen, Analyst, Forrester
Charles Betz, Principal Analyst, Forrester

Gain Influence And Instill A Security Culture One Conversation At A Time

This networking session will give you unfettered access to Forrester Analysts and your peers for an animated discussion on how to create a security culture requiring CISOs to obtain buy-in or engagement from key executives and other stakeholders. To increase your visibility and influence, marketing security must become a priority. How do you make connections with business leaders, regardless of your tenure, and begin the influence work needed to create a strong security culture?

Speakers:
Jess Burn, Senior Analyst, Forrester
Jinan Budge, Principal Analyst, Forrester
Joe Stanhope, VP, Principal Analyst, Forrester

1:25 pm – 1:45 pm ET

Case Study Sessions

Code42: Protect Data During the Great Resignation: FinancialForce Success Story

The WSJ decreed 2021 the year of the Great Resignation – when 40% of knowledge workers are expected to change jobs. Companies must define their data risk tolerance and run an Insider Risk Management program to ensure that the Great Resignation doesn’t become the Great Data Exfiltration. Learn how FinancialForce’s progressive IRM program mitigates risks, saves time, decreases alert fatigue, speeds response, and protects critical data from walking out the door as employees turn over.

Please note, by viewing this sponsor’s session you will be included in the sponsor’s session lead report.

Microsoft: Lessons from the Zero Trust Journey

76% of enterprise organizations are already implementing a Zero Trust strategy to meet today’s expanded threat landscape and hybrid workplace reality. What have we learned? Find out what best practices Microsoft customers have applied in their Zero Trust implementations, and get insights on emerging trends in identity and access management.

Speakers:
Alex Simons, Corporate Vice President of Program Management, Microsoft Identity Division
Nupur Goyal, Product Marketing Manager, Microsoft

OneTrust: How a Fortune 500 Automotive Aftermarket Retailer Manages Third-Party Risk with OneTrust

In this case study, we’ll share how a Fortune 500 Automotive Aftermarket Retailer implemented OneTrust’s third-party risk management platform to supported regulatory compliance and decrease risk surrounding third-party data privacy and security. You’ll hear about the challenges the company faced, how TPRM operations are business differentiator, and takeaway guidance for implementing a centralized technology platform.

Please note, by viewing this sponsor’s session you will be included in the sponsor’s session lead report.

Speakers:
Jaymin Desai, CIPP/E, CIPM, Third-Party Risk Offering Manager, OneTrust

1:50 pm – 2:10 pm ET

Breakout Sessions

Risk, Privacy, And Compliance Management
Meet Your New Transformational Chief Risk Officer

Traditional chief risk officers focus on costs and avoiding risk. But it’s the hidden risks, with dependencies all over the organization, that pose the real threats. A transformational chief risk officer tells you that strategy is the real threat to the business, has a business-appropriate risk appetite, and looks for opportunities. Learn how to evaluate the real risks to the customer-obsessed organization and take your first steps to becoming a transformational risk officer.

Speakers:
Renee Murphy, Principal Analyst, Forrester
Alla Valente, Senior Analyst, Forrester

READ MORE +READ LESS -
Leadership
Security Matters — Now What? Aligning CISOs With Tech Execs

In a not-so-distant past, tech execs and their teams actively avoided CISOs for fear they would delay or derail their initiatives. But as devastating breaches continue unabated, supply chains remain under siege, ransomware shuts down entire companies, and customer trust takes center stage, everyone understands why security matters. There’s no avoiding it — so when and how do tech execs engage with the CISO and their team? This session helps CISOs understand the demands they will encounter, how to plug into various business initiatives, and how to harness security’s critical importance to the organization.

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Zero Trust Security
Everything Everyone Gets Wrong About Threat Intel

Threat intel’s continuum has gone from sexy to a commoditized “just buy a feed” in the interim to today’s more correct usage of it as a way to inform your defense posture — all at lightning speed. Standing by the side while all of that happened were the … actual threat intel practitioners. They were displeased, to say the least. This session will provide insights on what everyone still gets wrong about threat intel, why it matters, what benefits you gain when you do finally get it right, and the value it will create for you as a leader, other executives, and your board of directors.

Speakers:
Brian Kime, Senior Analyst, Forrester

READ MORE +READ LESS -
Products And Applications Security
Securing The Smart Enterprise

Modern enterprises rely on network-connected internet-of-things and employee devices to aid employee productivity, automate business operations, maintain safe working environments, and serve their customers. These devices sit at evolving network edges (engagement, operations, provider, and enterprise), which security leaders must account for in their device security strategy. In this session, we will discuss the operational and security challenges at each edge environment. Attendees will learn how to identify and prepare for evolving device security requirements.

Speakers:
Michele Pelino, Principal Analyst, Forrester
Merritt Maxim, VP, Research Director, Forrester

READ MORE +READ LESS -
2:15 pm – 2:45 pm ET

Revolutionize Security’s Role In The Transformational Enterprise

Security plays an essential role in today’s enterprise, allowing businesses to safely transform, embrace emerging technologies, and build trust with stakeholders. But how can security revolutionize itself, as it moves from being a technology afterthought to a strategic part of the business? Join moderator Joseph Blankenship, VP and Research Director for Forrester and panelists Dr. Sridhar Muppidi, IBM Fellow and CTO for IBM Security and Adam Vincent, CEO of Threat Connect as they discuss the transformational role security must play and how security leaders can revolutionize their security programs.

Speakers:
Joseph Blankenship, VP, Research Director, Forrester
Adam Vincent, Co-Founder and CEO, ThreatConnect Inc.

2:50 pm – 3:10 pm ET

Breakout Sessions

Risk, Privacy, And Compliance Management
Navigating Cloud Compliance? You’re On Your Own

Whether you’re lifting and shifting current workloads to the cloud or building entirely new cloud-native infrastructure and applications, you must modernize your approach to compliance. Unfortunately, current frameworks will only take you so far, and cloud provider features create the perfect storm your firm could easily fall victim to. This session explores how controls created for data centers can be adapted to public and hybrid cloud computing — and when they must be superseded by new ones.

Speakers:
Lee Sustar, Principal Analyst, Forrester

READ MORE +READ LESS -
Leadership
Succession Planning Is A Business Resilience Imperative

Employees are on the move. As security leaders plan to manage hybrid teams, they should also plan to lose and replace key talent. Attrition and the increasing amount of time needed to find a replacement leaves security programs vulnerable. Implementing a formal succession planning process mitigates risk and increases employee satisfaction and retention. This session details best practices for succession planning and the resources you’ll need to make the next generation of security talent homegrown.

Speakers:
Jess Burn, Senior Analyst, Forrester

READ MORE +READ LESS -
Zero Trust Security
The Forever Breach: Avoiding The Ever-Present Scourge Of Ransomware

Ransomware is like a television character: If they never found the body, the character is not dead. Ransomware has the strongest plot armor available, rising to become cybersecurity’s number one villain. Businesses have more technologies and processes than they can manage to combat this and similar threats. This talk will cover ransomware strategy and introduce a toolkit — standing out as the MacGuffin that security and risk pros desperately need for their final battle — with tactical recommendations on how to detect, prevent, respond, and limit exposure to ransomware and other threats.

Speakers:
Allie Mellen, Analyst, Forrester
Steve Turner, Analyst, Forrester

READ MORE +READ LESS -
Products And Applications Security
A Conversation On Securing The Software Supply Chain

To protect the software supply chain, organizations must be more transparent about components and processes. SolarWinds became the poster child for supply chain attacks, but numerous other incidents in 2021 have highlighted the legal and security challenges of knowing what’s in your software. This panel will discuss the challenges of managing third-party components and the impact of software bill of materials (SBOM) requirements and review best practices for protecting the software supply chain.

Speakers:
Sandy Carielli, Principal Analyst, Forrester
Christopher Condo, Principal Analyst, Forrester
Alla Valente, Senior Analyst, Forrester

READ MORE +READ LESS -
3:10 pm – 3:30 pm ET

Marketplace Break & Networking

Drop-In Discussions

Ever wanted the chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In these sessions, delegates will have the opportunity to engage with our Forrester analysts and delve deeper into the frameworks and thought-leadership just revealed in their sessions. 

Come with your questions or join as a listener, for this analyst-led, low-pressure group format that enables conversations, networking and engagement on popular security & risk topics. You won’t want to miss it!

Risk is from Venus, Security is from Mars!!

This drop-in session will give you unfettered access to Forrester Analysts and your peers for an animated discussion on the priorities involving your security risk initiatives.

  • Taking on a risk-based approach to security
  • Risk is not Fear Uncertainty and Doubt (FUD)
  • Security context matters to risk management

Speakers:
Renee Murphy, Principal Analyst, Forrester

Securing The Software Supply Chain

During this drop-in session, you will learn from your peers how they are approaching software supply chain security. Below are the topics we’ll explore during our conversation.

  • Managing open-source software and software bill of materials (SBOM)
  • Incorporating software supply chain in third-party risk management (TPRM) initiatives
  • Securing the CI/CD pipeline

Speakers:
Sandy Carielli, Principal Analyst, Forrester
Christopher Condo, Principal Analyst, Forrester
Alla Valente, Senior Analyst, Forrester

3:30 pm – 3:50 pm ET

Case Study Sessions

HP Wolf Security: The Value of Isolation Technology with a Fortune 100 Customer

This session will cover an example of how HP’s Sure Click Enterprise solution helped a customer to eliminate endpoint breaches through a unique isolation and containment solution, rooted in zero trust architecture. HP partnered with this customer to deploy the solution across 125K devices. By leveraging HP’s solution, this customer has been able to protect 125K end users by containing unknown threats, examining the kill chain analysis, utilize AI to strengthen defenses, and dispose of threats without ever exposing the endpoint.

Speakers:
Terry van Roekel, Security Specialist, HP Wolf Security

3:55 pm – 4:15 pm ET

Breakout Sessions

Risk, Privacy, And Compliance Management
A Practical Guide To Navigate Privacy Management Technology

From spreadsheets and manual tools to sophisticated and fully automated approaches, there are plenty of technology options to deliver on your privacy and data protection mandate. What’s the best fit for your privacy and data protection program, your needs, and your goals? This session will guide security, risk, and privacy professionals through the privacy tech market, including privacy and consent management software, and share real-life lessons from companies that have already implemented these technologies.

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

READ MORE +READ LESS -
Leadership
CISOs And CMOs: Partnering With The Frenemy

More than ever, CMOs need guidance on appropriate collection and use of personal data. But they see CISOs and CPOs as “gatekeepers,” so they often look to external resources for that guidance. In this session, you’ll learn how to become a trusted advisor to the CMO, how to have hard conversations about the risks that marketing creates and how to mitigate them, and how to identify opportunities for collaboration on key customer-facing initiatives.

Speakers:
Joe Stanhope, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Zero Trust Security
A Traveler’s Guide To A Passwordless Enterprise

Passwords are terrible. The promised benefits of passwordless (better security and improved user experience) are well-known. Yet, we’re still early days in adoption/maturity. What are the obstacles to adoption, and how can you overcome those? What are the pitfalls to watch out for when selecting solutions, implementing them, and setting up processes? How can you avoid mistakes? We will explore each of these destinations by way of a passwordless travelogue.

Speakers:
Sean Ryan, Senior Analyst, Forrester

READ MORE +READ LESS -
Products And Applications Security
API Management Vs. Service Mesh: What’s The Difference?

API management and service mesh are similar at first glance, but the problems they solve and their security approach are very different. Attendees will learn what these products do at a high level, the business challenges they solve, and how they differ in their security approach.

Speakers:
David Mooter, Senior Analyst, Forrester

READ MORE +READ LESS -
4:20 pm – 4:50 pm ET

Black Swans Might Be Turkeys After All

Emerging risks exist everywhere in the organization, but risk managers combat it with surveys and the dreaded “What keeps you up at night?” question. Join Renee Murphy for what keeps her up at night: the emerging technology risks that you fail to mitigate. Using the latest emerging technologies, learn how to anticipate, communicate, remediate, and track mitigation of your emerging technology strategy. Don’t lose sleep; instead, manage your emerging risk.

Speakers:
Renee Murphy, Principal Analyst, Forrester

Download Agenda

Times subject to change.

Security & Risk · November 9 – 10 · Live Virtual Experience

Use discount code 2FORR1SR21 to take advantage of our team discount – receive 2 tickets for the price of 1 in one transaction.

Group 2 Top