John Kindervag

Vice President, Principal Analyst serving Security & Risk PROFESSIONALS

John serves Security & Risk Professionals. He is a leading expert on wireless security, network security, security information management, and PCI data security.

Previous Work Experience

With more than 25 years of high tech experience, John is best known for creating the highly influential “Zero Trust” model of information security. He currently advises both public and private sector organizations with the design and building of Zero Trust Networks. He holds, or has held, numerous industry certifications, including QSA, CISSP, CEH, and CCNA. John has a practitioner background, having served as a security consultant, penetration tester, and security architect before joining Forrester. He has particular expertise in the areas of secure network design, wireless security, and voice-over-IP hacking. He has been interviewed and published in numerous publications, including The Wall Street Journal, Forbes, and The New York Times. He has also appeared on television networks such as CNBC, Fox News, PBS, and Bloomberg discussing information security topics. John has spoken at many security conferences and events, including RSA, SXSW, ToorCon, ShmoCon, InfoSec Europe, and InfoSec World.

Education

John has a Bachelor of Arts degree in communications from the University of Iowa.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

81 results in Reports

  • John Kindervag
  • For Application Development & Delivery Professionals

    Report:Big Data Security Strategies For Hadoop Enterprise Data Lakes

    Apply Zero Trust To Your Big Data Security Strategy

    The crown jewels must be protected. Data stored in Hadoop is no exception. As application development and delivery (AD&D) professionals rush to build data lakes using Hadoop, they often do so without...

    • Downloads: 81
  • For Security & Risk Professionals

    Report:Top 13 Technology Trends S&R Pros Should Watch: 2016

    Security Analytics Abound, And Vendor Marketing Has Lost Its Way

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research projects...

    • Downloads: 211
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

    • Downloads: 153
  • For Security & Risk Professionals

    Report:Rethinking Data Loss Prevention With Forrester's DLP Maturity Grid

    Data loss prevention (DLP) remains a key technology to help prevent the leakage and exfiltration of the firm's most sensitive data. Using client feedback, survey data, and input from security leaders...

    • Downloads: 2039
  • For Security & Risk Professionals

    Report:Rethinking Data Discovery And Data Classification Strategies

    Strategic Plan: The Data Security And Privacy Playbook

    Defining data via data discovery and classification is an often overlooked, but critical, component of data security and privacy. Security and risk (S&R) pros can't expect to adequately protect data...

    • Downloads: 1090
  • For Security & Risk Professionals

    Report:No More Chewy Centers: The Zero Trust Model Of Information Security

    Vision: The Security Architecture And Operations Playbook

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based...

    • Downloads: 2765
  • For Security & Risk Professionals

    Report:TechRadar™: Data Security, Q1 2016

    Road Map: The Data Security And Privacy Playbook

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

    • Downloads: 368
  • For Security & Risk Professionals

    Report:Know Your Data To Create Actionable Policy

    Policy And Procedures: The Data Security And Privacy Playbook

    Too often, security and risk (S&R) leaders create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data...

    • Downloads: 1067
  • For Security & Risk Professionals

    Report:Quick Take: Apple Does The Right Thing To Defend Customer Privacy

    CEO Tim Cook Backs Customers With Fight Over San Bernardino Shooter's Data

    The legal battle continues between those who advocate for employees' and citizens' right to privacy versus those who advocate for stronger law enforcement and government surveillance capabilities....

    • Downloads: 95
  • For Security & Risk Professionals

    Report:Seven Steps To Protect Your eCommerce Website In 2016

    Start Now To Protect Your Site Before The Next Holiday Crunch

    During the busy holidays, there is always news of a website breach or crash. Despite the millions of dollars they generate for their businesses, websites remain vulnerable to cyberattack, performance...

    • Downloads: 122
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires iSight Partners

    Deal Bolsters FireEye But Comes With Certain Customer Caveats

    FireEye announced on January 20 the acquisition of threat intelligence vendor iSight Partners for $200 million, giving the antimalware vendor an entry into the crowded threat intelligence market....

    • Downloads: 76
  • For Security & Risk Professionals

    Report:Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook

    At Forrester, we believe the threat landscape is mutating, not evolving. Highly skilled, well-funded, organized cybercriminals will steal your data — the lifeblood of today's digital business...

    • Downloads: 1228
  • For Security & Risk Professionals

    Report:Welcome To The New Era Of Encryption

    S&R Pros Must Use Encryption As The Technological Keystone Of Privacy

    Talking about encryption is all the rage these days — from revelations about the National Security Agency's (NSA's) surveillance program to a new wave of movies and TV shows featuring hackers...

    • Downloads: 311
  • For Security & Risk Professionals

    Report:The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses. Protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits,...

    • Downloads: 3163
  • For Security & Risk Professionals

    Report:Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses, but for economic and even political gain, highly skilled cybercriminals and malicious insiders are determined to steal it. Meanwhile, customers...

    • Downloads: 1288
  • For Security & Risk Professionals

    Report:Quick Take: 12 Lessons For Security & Risk Pros From The US OPM Breach

    On June 4, the United States Office of Personnel Management (OPM) disclosed a cybersecurity incident affecting at least 4 million individuals, whose personally identifiable information (PII) may have...

    • Downloads: 329
  • For Security & Risk Professionals

    Report:Quick Take: Fifteen Lessons For Security & Risk Pros From The IRS Get Transcript Breach

    Cybercriminals Are Using Customer Intelligence To Commit High-Value Fraud

    On May 27, the US Internal Revenue Service (IRS) disclosed that cybercriminals had gained access to the tax returns of approximately 104,000 individuals. This breach is notable because it...

    • Downloads: 189
  • For Security & Risk Professionals

    Report:Case Study: WestJet Redefines Its Security With Forrester's Zero Trust Model

    WestJet Enables An Agile Architecture And Fortified Security With Zero Trust

    Legacy perimeter-centric approaches to security are ineffectual for today's digital business. Security and risk (S&R) leaders need a new approach, and that approach is Forrester's Zero Trust Model of...

    • Downloads: 207
  • For Security & Risk Professionals

    Report:Three Technical Innovations Will Ignite Zero Trust

    Forrester's Zero Trust Model of information security is gaining worldwide traction. Security and risk (S&R) pros at large enterprises are adopting and implementing Zero Trust networks and discovering...

    • Downloads: 324
  • For Security & Risk Professionals

    Report:Prioritize Tokenization To Secure The Payment Chain

    EMV Is Not A Panacea For Card Payment Vulnerabilities

    Is the credit card as US consumers know it dead? With the recent massive credit card data breaches at retailers such as Target and Home Depot, the payment industry is ripe for change. In this report,...

    • Downloads: 349
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2015

    Political Instability And Cyberterrorism Raise The Security Stakes For Digital Businesses

    Each winter, Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on thousands of client inquiries and interactions,...

    • Downloads: 764
  • For Security & Risk Professionals

    Report:Planning For Failure

    Processes: The Security Architecture And Operations Playbook

    S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

    • Downloads: 1303
  • For Security & Risk Professionals

    Report:TechRadar™: Zero Trust Network Threat Mitigation Technology, Q1 2015

    Road Map: The Security Architecture And Operations Playbook

    Not a week goes by without news of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Digital businesses lose millions in...

    • Downloads: 647
  • For Security & Risk Professionals

    Report:Five Steps To A Zero Trust Network

    Strategic Plan: The Security Architecture And Operations Playbook

    A Zero Trust network abolishes the quaint idea of a "trusted" internal network demarcated by a corporate perimeter. Instead, it recognizes that today's digital businesses must win, serve, and retain...

    • Downloads: 396
  • For Security & Risk Professionals

    Report:Quick Take: The State Of Privacy In The Union

    President Obama Introduces Privacy Initiatives With High Merit But Low Potential

    United States President Barack Obama introduced several proposed privacy initiatives in his 2015 State of the Union address and in preview comments he made to the Federal Trade Commission (FTC) the...

    • Downloads: 93