Peter Wannemacher

Sr Analyst serving eBusiness & Channel Strategy PROFESSIONALS

Peter serves eBusiness & Channel Strategy Professionals. He specializes in serving financial services customers through online, mobile, and other remote channels. He has helped banks, brokerages, insurers, and other financial providers improve their online and mobile services, and plan their online and mobile strategies. Peter works with firms to better understand market opportunities and meet client needs. His recent reports include "Mobile Channel Strategy: An Overview." During his four years at Forrester, Peter has worked on projects that sized the market for mobile financial services, improved firms' online banking functionality, segmented existing customers and prospects, and quantified the value of digital services. In addition, Peter co-developed Forrester's mobile banking and mobile investing ROI models.

Previous Work Experience

Prior to becoming an analyst, Peter was a researcher at Forrester. In that role, he developed Forrester's mobile financial services ROI model and was a key contributor to updating, maintaining, and applying the Forrester Website User Experience and Functionality Benchmark (WSB) methodology.


Peter holds dual M.S. degrees in advertising and applied communications research from Boston University, as well as a B.A. from Trinity College in Hartford, Connecticut.

Refine your results

Date Range




Market Imperatives



107 results in Everything

  • Rick Holland
  • For Security & Risk Professionals

    Blog:Introducing Forrester’s Targeted-Attack Hierarchy Of Needs

    We recently published part 1 of a new series designed to help organizations build resiliency against targeted attacks. In the spirit of Maslow, we designed our Targeted-Attack Hierarchy Of...

    • For Security & Risk Professionals

      Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

      But Only If Cisco Doesn't Strangle Innovation

      On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

      • Downloads: 231
    • For Security & Risk Professionals

      Blog:LG Is Learning An Embarrassing Privacy Lesson In The Age Of The Customer

      In a recent report titled “Technology Management In The Age Of The Customer,” Forrester defines the Age of the Customer as: "A 20-year business cycle in which the most successful...

      • For Security & Risk Professionals

        Blog:Are You Down With CIP (Critical Infrastructure Protection)?

        I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

        • For Security & Risk Professionals

          Report:Know Your Adversary

          Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

          In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. Then in May 2014, the US...

          • Downloads: 188
        • For Security & Risk Professionals

          Charts & Figures:The Targeted-Attack Hierarchy Of Needs

        • For Security & Risk Professionals

          Report:Defend Your Data From Cyberthreats With A Zero Trust Network

          Executive Overview: The Security Architecture And Operations Playbook

          We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

          • Downloads: 817
        • For Security & Risk Professionals

          Report:Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

          When Selecting Security Vendors, Look For Specialized Industry Expertise

          For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

          • Downloads: 159
        • For Security & Risk Professionals

          Charts & Figures:: Firms Increasingly Prefer Software-As-A-Service For Email Security Management

          The Nine Providers That Matter Most And How They Stack Up

        • For Security & Risk Professionals

          Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

          Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

          On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

          • Downloads: 112
        • For Security & Risk Professionals

          Blog:The Militarization Of Information Security

          Does something like this sound familiar? "We need to find, fix, finish, exploit, analyze, & disseminate this intrusion set along the kill chain via force multipliers so we can observe, orient,...

          • For Security & Risk Professionals

            Blog:Point Solutions Must Die

            Last year I wrote a blog post titled, “Incident Response Isn’t About Point Solutions; It Is About An Ecosystem."  This concept naturally extends beyond incident response to broader...

            • For Security & Risk Professionals

              Charts & Figures:Security Analytics Considerations, Key Evaluation Criteria, And Solutions

            • For Security & Risk Professionals

              Charts & Figures:Technology Pillars Of Breach Detection

            • For Security & Risk Professionals

              Blog:Observations From Black Hat - More Defense Please

              Last week I had the opportunity to attend the 15th annual Black Hat security conference in Las Vegas. I have attended DEFCON in the past, but never Black Hat. The conference has grown significantly...

              • For Security & Risk Professionals

                Charts & Figures:Evaluated Vendors: Product Information And Selection Criteria

              • For Security & Risk Professionals


                On Monday the Wall Street Journal ran a story on hacking back titled, “Support Grows to Let Cybertheft Victims Hack Back.”  The article describes a growing desire to permit the...

                • For Security & Risk Professionals

                  Blog:Kicking off the Forrester Web Content Security Wave

                  We are about to kickoff our next Forrester Wave on web content security.  The inclusion criteria for vendor prequalification will be sent out within the next two weeks. We will be focusing on...

                  • For Security & Risk Professionals

                    Report:Quick Take: BAE Systems Buys SilverSky

                    Acquisition Extends BAE's Analytics And Threat Intelligence Into Commercial Markets

                    BAE Applied Intelligence — a subsidiary of BAE Systems — has made the next logical step to operationalize its security analytics and threat intelligence offerings by acquiring managed...

                    • Downloads: 59
                  • For Security & Risk Professionals

                    Report:Use Actionable Threat Intelligence To Protect Your Digital Business

                    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective

                    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

                    • Downloads: 297
                  • For Security & Risk Professionals

                    Blog:You Should Attend Next Year’s RSA Conference Innovation Sandbox

                    Last week I attended the RSA Conference (RSAC) Innovation Sandbox for the first time.  Not only was I an attendee, but I also was fortunate enough to host a CTO panel during the event. For...

                    • For Security & Risk Professionals

                      Report:Job Description: Security Architect

                      Organization: The Security Architecture And Operations Playbook

                      We designed this report for security and risk (S&R) executives who are rethinking their security architecture and working to improve the effectiveness of their operations, to help them hire one of...

                      • Downloads: 897
                    • For Security & Risk Professionals

                      Blog:Actionable Intelligence, Meet Terry Tate, Office Linebacker

                      sdfasdfaasdfThe #Forrester Security & Risk team is hiring. We are looking for consultants to join our team #infosecasdfasdasdfasdddsadfas We are now less than two weeks away from our...

                      • For Security & Risk Professionals

                        Report:Planning For Failure

                        An Effective Incident Management Program Is Essential To Help You Stay In Business

                        S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

                        • Downloads: 927