Best Practice Report

Planning For Failure: How To Survive A Breach

Organization: The Zero Trust Security Playbook

August 19th, 2020
Josh Zelonis, null
Josh Zelonis
With contributors:
Joseph Blankenship , Heidi Shey , Alexis Tatro , Peggy Dostie

Summary

You will likely suffer a security breach; you may even have a breach now. Cybercriminals are using more-sophisticated attacks to steal intellectual property and the personal data of your customers, partners, and employees. With enough time and money, they can breach the security defenses of even the largest enterprises. You can’t stop every cyberattack, but your customers expect you to respond quickly and appropriately. If you contain a breach poorly and botch the incident response, you will pay millions in remediation costs, lost business, and your firm’s reputation. We discuss the regulatory landscape worldwide and guide you on how to establish an ongoing incident management program.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.