Skip to main content

Save or Share this Report

For CIOs

Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses

Intermediate Level: Technology Practices For Cybersecurity And Privacy

January 11, 2021

Playbook icon

This report is part of "Act: Intermediate" in The Cybersecurity And Privacy Playbook.

Why Read This Report

CIOs and technology leaders in the intermediate phase of cybersecurity and privacy maturity must ensure that security always travels with the data and should position data security and privacy as competitive differentiators. Firms in this phase must move to protect customers proactively from complex privacy abuses and cybercriminals. This report — the second of three in the technology competency of the cybersecurity and privacy playbook — helps CIOs meet the challenges of the intermediate maturity phase. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy. We revised this edition to factor in new attack and response trends.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).

Purchase

Table of Contents

  • Proactively Protect Customers From Fraud, Cybercrime, And Abuse
  • Four Technology Areas Are Essential To Cybersecurity And Privacy
  • Related Research Documents

Recommended Research