Trends Report

Rules Of Engagement: A Call To Action To Automate Breach Response

August 3rd, 2016
JK
John Kindervag
With contributors:
Stephanie Balaouras , Glenn O'Donnell , Heidi Shey , Salvatore Schiano , Trevor Lyness , Peggy Dostie

Summary

As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data by cybercriminals and other malicious actors. This report is a call to action for developing more automated threat response processes and a set of cyber rules of engagement. Doing so will empower security professionals to act more quickly and aggressively and stop data breaches before they impact the business. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.