Kate Leggett

VP, Principal Analyst serving Application Development & Delivery PROFESSIONALS

Kate serves Application Development & Delivery Professionals. She is a leading expert on customer relationship management (CRM) and customer service strategies, maturity, benchmarking, governance, and ROI. She is an accomplished public speaker and frequently presents at industry events such as CRM Evolution. She has been published in The Wall Street Journal, Forbes magazine, and industry publications such as CRM Magazine, KM World, and Destination CRM.

Previous Work Experience

Kate has extensive industry experience, with more than 10 years of leadership at CRM and customer service software companies, where she held senior product marketing and product management roles. She is also a published author on customer service trends and best practices.

Education

Kate earned a Bachelor of Science from the University of Toronto and a Master of Science from the University of Pennsylvania.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

18 results in Everything

  • Ed Ferrara
  • IT Infrastructure & Operations
  • For Security & Risk Professionals

    Charts & Figures:AWS VPC Conceptual Network Architecture

  • For Security & Risk Professionals

    Charts & Figures:AT&T IBM End-To-End Security Service Offering

  • For Security & Risk Professionals

    Charts & Figures:AWS Global Region/Zone/Edge Location

  • For Security & Risk Professionals

    Charts & Figures:AT&T And IBM Alliance Services

  • For Security & Risk Professionals

    Charts & Figures:AWS Data Center Services With Security Implications

  • For Security & Risk Professionals

    Charts & Figures:An Uneven Handshake

  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 393
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 846
  • For Security & Risk Professionals

    Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Landscape: The Data Security And Privacy Playbook

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

    • Downloads: 412
  • For Security & Risk Professionals

    Report:Brief: AT&T And IBM Accelerate The Move To Utility-Based Security

    Reliable And Effective Security Utilities Free Resources So That CISOs Can Focus On Customers

    AT&T and IBM announced in February a strategic alliance to provide a set of comprehensive security services that, if successful, would define the next generation of managed security services...

    • Downloads: 164
  • For Security & Risk Professionals

    Charts & Figures:United Sates Government And Global Security Standards

  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: 2014

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

    • Downloads: 672
  • For CIO Professionals

    Report:PRISM's Impact On The US Cloud Industry

    A Business Technographics Document: Forrester Survey Suggests NSA Spying Has Driven More Use Of Encryption Than Migration

    Since Edward Snowden revealed the US National Security Agency's PRISM spying program, there has been widespread speculation that the announcement would ruin the fates of US cloud, hosting, and...

    • Downloads: 60
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1013
  • For Security & Risk Professionals

    Report:Brokered Cloud Identity Is Scaling New Heights

    Identity Hub Solutions Ease Integration Pain And Offer Flexibility

    We're moving fast into a world of loosely coupled, cloud-based data centers. Cloud infrastructure models complicate the identity and access management (IAM) landscape — and represent...

    • Downloads: 442
  • For CIO Professionals

    Report:Quick Take: CIOs Must Respond To Amazon's Disruptive Cloud

    Amazon's Relentless Pace Continues At re:Invent With Nine New Services

    The Amazon Web Services (AWS) re:Invent 2014 conference is something of an understatement as far as names go. This year's AWS conference was bigger than ever, with more than 13,500 attendees from 63...

    • Downloads: 168
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

    Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?

    Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk...

    • Downloads: 438
  • For Security & Risk Professionals

    Report:AWS Cloud Security

    AWS Takes Important Steps For Securing Cloud Workloads

    Security to and from the cloud is a hot topic. The notion that cloud technologies should not be used by large enterprises due to security concerns is rapidly fading. Security still ranks as the No. 1...

    • Downloads: 675