Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Four Steps To Create A Strategic Program To Manage The Human Risks
January 13, 2021
-
Search Results
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report Define A Roadmap To Accelerate Your Security Program
Roadmap: The S&R Practice Playbook
Turning strategy into action reveals a CISO's worth. A solid security roadmap is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Report Sell Your Zero Trust Strategy Internally
Gain Advocacy, Support, And Budget For Your Security Vision
June 23, 2020 | Jinan Budge, Chase CunninghamSecurity and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...
-
Report Bust The Zero Trust Myths
Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
June 22, 2020 | Jinan Budge, Chase CunninghamZero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...
-
Report Returning To Work: How To Avoid The 15 Most Critical Risks
The Legal, Regulatory, And Operational Risks Of Pandemic Recovery Everyone Needs To Know
As enterprises plan to reopen office buildings, plants, and other facilities, they will have to develop detailed pandemic management protocols (PMPs) before they can safely ask employees,...
-
Report Fix Toxic Security Culture Before It Kills Your Innovation
How To Deal With A Toxic Security Team Culture
June 4, 2020 | Jinan BudgeSecurity teams must stay focused to serve their primary purpose of protecting customers and employees from malicious attackers. However, because of the pressure and stress that security pros face,...
-
Report Maintain Your Security Edge: Develop And Retain Cybersecurity Talent
Continuous Improvement: The Zero Trust Security Playbook
Complacency, lack of diversity, and a focus on technologies over people are threats to the business. In an environment of competitive hiring and fast-evolving threats, security leaders must invest...
-
Report The Future Of The CISO
Vision: The S&R Practice Playbook
For many security and risk pros, becoming a CISO is challenging, and they find themselves in situations where they're forced to conform, rather than excel. This report outlines types of CISOs,...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020
The 12 Providers That Matter Most And How They Stack Up
In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...
-
Report Build A Security Champions Network
How To Integrate Security Culture Across Your Organization
Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...
-
Report Capturing Innovation In Your Security Program
Security Startups Offer More Flexibility And Innovative Approaches To Securing Your Enterprise
Cybersecurity is one of the hottest areas worldwide for venture capital and private equity investment. There has never been so many cybersecurity startups globally. Unprecedented levels of...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by...
-
Report A CISO's Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
January 9, 2020 | Jinan BudgeCybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...
-
Webinar Predictions 2020: Cybersecurity
In 2020 and beyond, security and risk professionals will discover that cybersecurity decisions have broader societal implications than ever before. Our lives increasingly depend on technology to...
-
Report Research Overview: Security Awareness, Behavior, And Culture
A CISO's Guide To Research About The People Side Of Security
October 30, 2019 | Jinan BudgeThe people element of security has long sat on the back burner as security and risk (S&R) pros buy product after product without first solving fundamental problems. People and culture are central...
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Report The Forrester Wave™: Cybersecurity Consulting Services In Asia Pacific, Q4 2019
The 10 Providers That Matter Most And How They Stack Up
October 30, 2019 | Jinan BudgeIn our 23-criterion evaluation of cybersecurity consulting providers in Asia Pacific (AP), we identified the 10 most significant ones — Accenture, Deloitte, EY, IBM, KPMG, NTT, PwC, Tech Mahindra,...
-
Report Now Tech: Cybersecurity Consulting Services In Asia Pacific, Q4 2019
Forrester's Overview Of 18 Cybersecurity Consulting Service Providers
October 29, 2019 | Jinan BudgeSecurity and risk (S&R) leaders can use cybersecurity consulting services to reduce the time to deliver security projects, accelerate the pace of innovation, and understand diverse business models...
-
Report Security Budgets In Asia Pacific, 2019
Budgets Are Rising As The Region Continues To Play Catch-Up
July 15, 2019 | Jinan BudgeIn 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...
-
Report Forrester's Global Map Of Privacy Rights And Regulations, 2019
S&R pros rate compliance with global privacy regulations a top challenge. To help, we created an interactive global map of privacy rights and regulations, which explains the data protection...
-
Report Executive Spotlight: Top Priorities For Security And Risk Leaders In 2019
The Top Five Priorities That Security And Risk Leaders Are Focusing On
June 7, 2019 | Jinan BudgeForrester's Security & Risk Council is comprised of some of the senior-most security and risk (S&R) executives at companies with $1 billion or more in revenue. Each year, we ask our members about...
-
Report Quick Take: Australia's PayID Breach Demonstrates The Importance Of Customer Trust
This week, a security breach involving the PayID service of Australia's New Payments Platform (NPP) came to light — an incident affecting tens of thousands of bank customers. Malicious actors used...
-
Report Lessons Learned: Managed Security Services, 2019
Critical Insights From Forrester Wave™ Customer References Every Security Leader Should Know
Despite the maturity of the managed security services provider (MSSP) market, security and risk pros and vendors far too often fail to sync up as true, successful partners. This report delves into...
- 1
- 2
Content Type
ApplyFilters
Industry
Topics
- Security Operations & Program Governance (47)
- Information Security (28)
- Employee Experience (16)
- Business & IT Alignment (13)
- Governance Risk & Compliance (GRC) (10)
- IT Services (9)
- Tech Sector Economics (9)
- Data & Information Protection (5)
- Financial Management (5)
- Organization (5)
- Cloud Computing (3)
- Identity & Access Management (IAM) (3)
- Pandemic (3)
- Application Security (2)
- Data Centers & Data Center Networking (2)
- Measurement (2)
- Networking (2)
- Application Management (1)
- Artificial Intelligence (AI) (1)
- Biometrics (1)
- Business Intelligence (1)
- Enterprise Architecture Domains & Practices (1)
- Enterprise Mobility (1)
- Innovation (1)
- Telecommunications Services (1)
Methodology
- Now Tech (14)
- Forrester Wave (8)
- Business Technographics (2)
- Predictions (1)
Region
- Asia Pacific (25)
- Europe (1)
- North America (1)
Vendor
- Accenture (20)
- Deloitte (20)
- IBM (20)
- Wipro (20)
- Tech Mahindra (16)
- Infosys (13)
- Tata Consultancy Services (TCS) (13)
- Symantec (11)
- Verizon Communications (11)
- KPMG (9)
- NTT DATA (9)
- PwC (9)
- AT&T (7)
- Fujitsu (7)
- BAE Systems (6)
- Capgemini (6)
- EY (2)
- Proofpoint (1)