Twelve Recommendations For Your 2010 Information Security Strategy
January 11, 2010
Why Read This Report
As we enter 2010 and look ahead, the challenges we face are very familiar. The technology has been changing as usual, the business has been demanding more and more from security professionals as expected, and we continue to outsource some of our responsibilities. What will be different in 2010 is that the sheer intensity of these changes will increase to the point where we will have no choice but to take them on. Forrester interviewed 40 chief information security officers (CISOs) to identify some of the changes they are seeing and how they plan to address these changes. This document provides a road map for your 2010 security strategy.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- Security And Risk Professionals Face Unprecedented Levels Of Change
- A 12-Step Program To Deal With Change In 2010
WHAT IT MEANS
- Change In Ownership Is The Keystone
- Related Research Documents
Define A Compelling Strategy To Secure And Protect Mobile Moments
February 14, 2017 | Laura Koetzle
Design Mobile Security Metrics With Mobile Moments In Mind
February 13, 2017 | Jeff Pollard
Understand Security And Risk Budgeting For 2013
January 10, 2013 | Andrew Rose