Kate Leggett

VP, Principal Analyst serving Application Development & Delivery PROFESSIONALS

Kate serves Application Development & Delivery Professionals. She is a leading expert on customer relationship management (CRM) and customer service strategies, maturity, benchmarking, governance, and ROI. She is an accomplished public speaker and frequently presents at industry events such as CRM Evolution. She has been published in The Wall Street Journal, Forbes magazine, and industry publications such as CRM Magazine, KM World, and Destination CRM.

Previous Work Experience

Kate has extensive industry experience, with more than 10 years of leadership at CRM and customer service software companies, where she held senior product marketing and product management roles. She is also a published author on customer service trends and best practices.

Education

Kate earned a Bachelor of Science from the University of Toronto and a Master of Science from the University of Pennsylvania.

Refine your results

Date Range

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

107 results in Everything

  • Rick Holland
  • For Security & Risk Professionals

    Blog:Introducing Forrester’s Targeted-Attack Hierarchy Of Needs

    We recently published part 1 of a new series designed to help organizations build resiliency against targeted attacks. In the spirit of Maslow, we designed our Targeted-Attack Hierarchy Of...

    • For Security & Risk Professionals

      Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

      But Only If Cisco Doesn't Strangle Innovation

      On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

      • Downloads: 231
    • For Security & Risk Professionals

      Blog:LG Is Learning An Embarrassing Privacy Lesson In The Age Of The Customer

      In a recent report titled “Technology Management In The Age Of The Customer,” Forrester defines the Age of the Customer as: "A 20-year business cycle in which the most successful...

      • For Security & Risk Professionals

        Blog:Are You Down With CIP (Critical Infrastructure Protection)?

        I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

        • For Security & Risk Professionals

          Report:Know Your Adversary

          Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

          In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. Then in May 2014, the US...

          • Downloads: 188
        • For Security & Risk Professionals

          Charts & Figures:The Targeted-Attack Hierarchy Of Needs

        • For Security & Risk Professionals

          Report:Defend Your Data From Cyberthreats With A Zero Trust Network

          Executive Overview: The Security Architecture And Operations Playbook

          We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

          • Downloads: 817
        • For Security & Risk Professionals

          Report:Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

          When Selecting Security Vendors, Look For Specialized Industry Expertise

          For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

          • Downloads: 159
        • For Security & Risk Professionals

          Charts & Figures:: Firms Increasingly Prefer Software-As-A-Service For Email Security Management

          The Nine Providers That Matter Most And How They Stack Up

        • For Security & Risk Professionals

          Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

          Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

          On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

          • Downloads: 112
        • For Security & Risk Professionals

          Blog:The Militarization Of Information Security

          Does something like this sound familiar? "We need to find, fix, finish, exploit, analyze, & disseminate this intrusion set along the kill chain via force multipliers so we can observe, orient,...

          • For Security & Risk Professionals

            Blog:Point Solutions Must Die

            Last year I wrote a blog post titled, “Incident Response Isn’t About Point Solutions; It Is About An Ecosystem."  This concept naturally extends beyond incident response to broader...

            • For Security & Risk Professionals

              Charts & Figures:Security Analytics Considerations, Key Evaluation Criteria, And Solutions

            • For Security & Risk Professionals

              Charts & Figures:Technology Pillars Of Breach Detection

            • For Security & Risk Professionals

              Blog:Observations From Black Hat - More Defense Please

              Last week I had the opportunity to attend the 15th annual Black Hat security conference in Las Vegas. I have attended DEFCON in the past, but never Black Hat. The conference has grown significantly...

              • For Security & Risk Professionals

                Charts & Figures:Evaluated Vendors: Product Information And Selection Criteria

              • For Security & Risk Professionals

                Blog:Counter-Strike?

                On Monday the Wall Street Journal ran a story on hacking back titled, “Support Grows to Let Cybertheft Victims Hack Back.”  The article describes a growing desire to permit the...

                • For Security & Risk Professionals

                  Blog:Kicking off the Forrester Web Content Security Wave

                  We are about to kickoff our next Forrester Wave on web content security.  The inclusion criteria for vendor prequalification will be sent out within the next two weeks. We will be focusing on...

                  • For Security & Risk Professionals

                    Report:Quick Take: BAE Systems Buys SilverSky

                    Acquisition Extends BAE's Analytics And Threat Intelligence Into Commercial Markets

                    BAE Applied Intelligence — a subsidiary of BAE Systems — has made the next logical step to operationalize its security analytics and threat intelligence offerings by acquiring managed...

                    • Downloads: 59
                  • For Security & Risk Professionals

                    Report:Use Actionable Threat Intelligence To Protect Your Digital Business

                    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective

                    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

                    • Downloads: 297
                  • For Security & Risk Professionals

                    Blog:You Should Attend Next Year’s RSA Conference Innovation Sandbox

                    Last week I attended the RSA Conference (RSAC) Innovation Sandbox for the first time.  Not only was I an attendee, but I also was fortunate enough to host a CTO panel during the event. For...

                    • For Security & Risk Professionals

                      Report:Job Description: Security Architect

                      Organization: The Security Architecture And Operations Playbook

                      We designed this report for security and risk (S&R) executives who are rethinking their security architecture and working to improve the effectiveness of their operations, to help them hire one of...

                      • Downloads: 897
                    • For Security & Risk Professionals

                      Blog:Actionable Intelligence, Meet Terry Tate, Office Linebacker

                      sdfasdfaasdfThe #Forrester Security & Risk team is hiring. We are looking for consultants to join our team bit.ly/M9gWS5 #infosecasdfasdasdfasdddsadfas We are now less than two weeks away from our...

                      • For Security & Risk Professionals

                        Report:Planning For Failure

                        An Effective Incident Management Program Is Essential To Help You Stay In Business

                        S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

                        • Downloads: 927