Skip to main content

Save or Share this Report

For Security & Risk Professionals

Securing An Empowered Organization

An Empowered Report: Run At The Threat, Shape The Future Of Your Company

October 29, 2010

Primary author headshot

Authors

  • By Chenxi Wang
  • with Khalid Kark,
  • Ted Schadler,
  • Lindsey Coit

Why Read This Report

Employees are provisioning themselves with consumer and cloud technology. Forrester's study of US information workers reveals that 37% are doing something with technology without permission. And not surprisingly, they're doing it to get their work done better, using breakthrough initiatives like Twitter, customer service and incremental innovations like video training, partner collaboration in the cloud, or Facebook connections with customers. As a result, the enterprise risk landscape has changed and will change further. The question for you is how do you turn this phenomenon into business advantage while protecting the property and good name of your company? It starts with a new mindset and approach to security risk management. Instead of saying, "We shouldn't do that because it's risky," you should ask, "What can I do to make this less risky?" As IT security professionals, you must align your strategies with business initiatives, become more agile in your approach to risk, and develop the right tools to help the business assess and manage risks.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).

Purchase

Tools And Templates

Models and Calculators

calculator icon
  • Many Information Workers Use Do-It-Yourself Technology

Table of Contents

  • The Empowered Phenomenon
  • Empowerment Is A Challenge Worth Tackling
  • Adopt An Empowered Mindset: Be The Fulcrum Of Innovation
  • IT Security's New To-Do List
  • RECOMMENDATIONS

  • Be A HERO To Your Business
  • Supplemental Material
  • Related Research Documents