Trends Report

Twelve Recommendations For Your 2009 Information Security Strategy

January 20th, 2009
Khalid Kark, null
Khalid Kark
With contributors:
Jonathan Penn , Alissa Dill

Summary

Many security predictions paint a doomsday scenario where a crippling cyberattack will leave us all reeling from its effects or Supervisory Control and Data Acquisition (SCADA) systems vulnerabilities will be exploited to play havoc with our national infrastructure. While these threats are real, the probability of such events happening is unknown at worst, and low at best. On the other hand, prudent CISOs around the world are building their 2009 strategy based on the current economic climate, changes in the technology landscape, and most importantly, to meet and exceed the business expectations.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.