Featured content
The Governance, Risk, And Compliance Playbook For 2021
Take On More Business Risk Using A World-Class GRC Program
Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...
Charts & Figures
-
-
Business Resiliency Requires Seven Pillars
February 8, 2021
-
Automation
February 8, 2021
Search Results
-
Report Business Resiliency Is The Bulwark To A World Defined By Systemic Risk And Chaos
Resiliency Ensures Continuity And The Ability To Pivot To New Opportunities During A Crisis
In times of crisis or sudden risk events, business resiliency practices ensure the uninterrupted delivery of customer products and services, keep employees safe and productive, and minimize the...
-
Report The State Of Environmental Sustainability In The Fortune Global 200
Climate Action As A Risk Management And Growth Strategy Takes Center Stage
In 2020, firms had to adapt to a series of risk events — COVID-19, megawildfires, a devastating hurricane season — engendered or magnified by climate change. Leading Fortune Global 200 firms have...
-
Webinar Improve Your Climate Action Plan With The Right Investments In Sustainability And Climate Risk Technologies
Like coping with the COVID-19 pandemic, how your company responds to the climate crisis reveals its commitment to its values and the extent of its adaptability. Investments in sustainability and...
-
Report Now Tech: Third-Party Risk Management Technology, Q3 2020
Forrester's Overview Of 23 Third-Party Risk Management Providers
August 5, 2020 | Alla ValenteYou can use third-party risk management (TPRM) technology to catalog, classify, and track all third-party relationships, mitigate risks across all states of the third-party lifecycle, and protect...
-
Report The Top Security Technology Trends To Watch, 2020
Ten Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top 10 security technologies to...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report The Forrester Wave™: Risk-Based Authentication, Q2 2020
The Seven Providers That Matter Most And How They Stack Up
May 27, 2020 | Andras CserIn our 33-criterion evaluation of risk-based authentication (RBA) providers, we identified the seven most significant ones — AppGate, IBM, Kount, LexisNexis Risk Solutions, OneSpan, RSA, and...
-
Webinar European Security Market Trends, 2020
May 18, 2020 | Paul McKaySecurity leaders in Europe have had to deal with one of the biggest workforce transformations ever known as workers have moved from office work to homeworking to counter the current COVID-19...
-
Report Video: The Five Pillars Of A Robust And Resilient CIAM Strategy
How Building An Identity Foundation Helps Drive Customer Trust And Loyalty
May 11, 2020 | Andras CserIn a world where online interactions not only augment but replace in-person interactions, robust and resilient customer identity and access management (CIAM) plays a critical role. To help guide...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Webinar Prepare Your Organization For Pandemic Recovery
As the epicenter of the COVID-19 pandemic shifts around the world and each affected region reaches its peak infection rate, firms must prepare now to restart closed plants, reopen retail locations,...
-
Webinar Top Recommendations For Your Security Program, 2020
Security and risk (S&R) pros will need to open the risk aperture to account for the impacts of externalities — those risks that are not under the direct control of the business....
-
Webinar Best Practices: Pandemic Planning And Preparedness
As the current outbreak of coronavirus disease 2019 (COVID-19) continues to spread globally, organizations are quickly updating their pandemic plans or rushing to create plans from scratch. Whether...
-
Report The Forrester Wave™: Governance, Risk, And Compliance Platforms, Q1 2020
Tools And Technology: The Governance, Risk, And Compliance Playbook
In our 22-criterion evaluation of GRC platform providers, we identified the 12 most significant ones — Enablon; Galvanize; IBM; LogicManager; MetricStream; NAVEX Global; Riskonnect; RSA, a Dell...
-
Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020
The 12 Providers That Matter Most And How They Stack Up
In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...
-
Report Prepare Your Organization For A Pandemic
Key Recommendations For How Business And Risk Leaders Build Resiliency In A World Where Disease Outbreaks Are The New Normal
The likelihood and impact of a pandemic are impossible to predict with much accuracy. Regardless, history tells us there's a potential for widespread and costly disruption — especially for those...
-
Report Ignore Geopolitical Risk At Your Peril
Why And How You Must Address Global Cybersecurity Concerns
Failing to formally incorporate geopolitical considerations in your risk management processes could ultimately mean havoc for your international presence, global customer base, third-party...
-
Report Top Cybersecurity Threats In 2020
Landscape: The Zero Trust Security Playbook
January 24, 2020 | Josh Zelonis, Sandy CarielliSecurity and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...
-
Report How To Manage Brexit's Impact: CISO Edition
Focus On Data Protection, Staffing, And Regulatory Alignment
While the recent UK general election has provided certainty that the first stage of Brexit will happen on January 31, the certainty only persists until the end of 2020. It's still possible that a...
-
Report Research Overview: Security Awareness, Behavior, And Culture
A CISO's Guide To Research About The People Side Of Security
October 30, 2019 | Jinan BudgeThe people element of security has long sat on the back burner as security and risk (S&R) pros buy product after product without first solving fundamental problems. People and culture are central...
-
Report The Forrester Tech Tide™: Governance, Risk, And Compliance Management, Q4 2019
Governance, risk, and compliance (GRC) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their business performance and help identify, mitigate,...
-
Report The Forrester Wave™: Vulnerability Risk Management, Q4 2019
The 13 Providers That Matter Most And How They Stack Up
October 17, 2019 | Josh Zelonis, Trevor LynessIn our 14-criterion evaluation of vulnerability risk management providers, we identified the 13 most significant ones — Brinqa, Digital Defense, Expanse, Kenna Security, NopSec, Outpost24, Qualys,...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Report Forrester Analytics: IAM Software Forecast, 2018 To 2023 (Global)
ForecastView Document
Identity and access management (IAM) software tools help digital businesses provide access to employees, partners, and customers without sacrificing security or user experience. This data-driven...
-
Report Video: Protect Your Organization From Business Email Compromise (BEC) Attacks
Watch Our Video To Understand A Real-Life BEC Attack And How To Protect Against These Frauds And Scams
May 8, 2019 | Josh Zelonis, Andrew HoganAlongside other scams, fraudsters and cybercriminals use business email compromise (BEC) attacks to convince unwitting employees to wire money, grant access to payment accounts, or share sensitive...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (3)
- Public Sector (2)
- Healthcare (1)
- Manufacturing (1)
- Retail (1)
Methodology
- Business Technographics (20)
- Forrester Tech Tide (20)
- Forrester Wave (16)
- Now Tech (7)
- ForecastView (6)
Region
- Europe (2)
- Africa (1)
- Middle East (1)
Vendor
- IBM (11)
- Coupa (7)
- Deloitte (7)
- PwC (7)
- ServiceNow (7)
- Rapid7 (5)
- Proofpoint (4)
- RSA (4)
- SAP (4)
Analyst
- Alla Valente (17)
- Andras Cser (9)
- Jeff Pollard (7)
- Paul McKay (7)
- Claire O'Malley (5)
- Jinan Budge (5)
- Stephanie Balaouras (5)
- Merritt Maxim (4)
- Salvatore Schiano (4)
- Sandy Carielli (4)
- Amy DeMartine (3)
- Enza Iannopollo (3)
- Heidi Shey (3)
- Renee Murphy (3)
- Brian Kime (2)
- Sean Ryan (2)
- Andrew Hewitt (1)
- Andrew Hogan (1)
- Jennifer Adams (1)
- Joseph Blankenship (1)
- Naveen Chhabra (1)
- Rob Koplowitz (1)
- Scott Compton (1)