Best Practice Report

Twelve Recommendations For Your 2010 Information Security Strategy

January 11th, 2010
Khalid Kark, null
Khalid Kark
With contributors:
Stephanie Balaouras , Margaret Ryan , Lindsey Coit , Nick Hayes

Summary

As we enter 2010 and look ahead, the challenges we face are very familiar. The technology has been changing as usual, the business has been demanding more and more from security professionals as expected, and we continue to outsource some of our responsibilities. What will be different in 2010 is that the sheer intensity of these changes will increase to the point where we will have no choice but to take them on. Forrester interviewed 40 chief information security officers (CISOs) to identify some of the changes they are seeing and how they plan to address these changes. This document provides a road map for your 2010 security strategy.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.