Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
-
Four Steps To Create A Strategic Program To Manage The Human Risks
January 13, 2021
Search Results
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Webinar Transform Enterprise Security With The Zero Trust Edge
November 10, 2020 | David HolmesEnterprise security architecture has struggled because we have to interface with the most toxic network ever built — the public internet. It was designed to withstand nuclear attacks and to...
-
Webinar Improve Your Climate Action Plan With The Right Investments In Sustainability And Climate Risk Technologies
Like coping with the COVID-19 pandemic, how your company responds to the climate crisis reveals its commitment to its values and the extent of its adaptability. Investments in sustainability and...
-
Report Build Your Identity And Access Management Strategy
Strategic Plan: The Identity And Access Management Playbook
Your identity and access management (IAM) strategy must establish and explain the business need and value of IAM to technology and business leaders. It must also describe the current state, define...
-
Webinar The Future Of Endpoint Management And Security Is Now
The COVID-19 pandemic has accelerated the shift toward modern endpoint management and security. To improve scalability, business continuity, security, and digital employee experience, organizations...
-
Report Job Description: Director Of Threat Intelligence
The Infosec Renaissance Pro
July 13, 2020 | Brian KimeSecurity and risk (S&R) professionals frequently struggle to maximize the value of their investments in threat intelligence solutions. Improperly treating threat intelligence as a technical control...
-
Report Sell Your Zero Trust Strategy Internally
Gain Advocacy, Support, And Budget For Your Security Vision
June 23, 2020 | Jinan Budge, Chase CunninghamSecurity and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...
-
Report Bust The Zero Trust Myths
Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
June 22, 2020 | Jinan Budge, Chase CunninghamZero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...
-
Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020
The 12 Providers That Matter Most And How They Stack Up
In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...
-
Report Build A Security Champions Network
How To Integrate Security Culture Across Your Organization
Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...
-
Webinar Kill The Employee Password With Zero Trust
February 6, 2020 | Sean RyanPasswords are easy to hack and expensive to support. So why do so many organizations still rely on them for secure access? S&R pros need to ditch the password and adopt a Zero Trust approach to...
-
Report A CISO's Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
January 9, 2020 | Jinan BudgeCybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...
-
Webinar Top Trends Shaping IAM In 2020
This webinar highlights the top trends influencing identity and access management (IAM) in 2020. We cover enterprise and customer IAM as well as access management and governance.Key...
-
Report Artificial Intelligence Is Transforming Fraud Management
Advances In AI Are Reshaping The Fraud Management Landscape
Artificial intelligence went through a long period of maturation plagued by high rates of false positives and inexplicable decisioning. But AI and machine learning (ML) tools have since become part...
-
Report Research Overview: Security Awareness, Behavior, And Culture
A CISO's Guide To Research About The People Side Of Security
October 30, 2019 | Jinan BudgeThe people element of security has long sat on the back burner as security and risk (S&R) pros buy product after product without first solving fundamental problems. People and culture are central...
-
Report The Forrester Wave™: Cybersecurity Consulting Services In Asia Pacific, Q4 2019
The 10 Providers That Matter Most And How They Stack Up
October 30, 2019 | Jinan BudgeIn our 23-criterion evaluation of cybersecurity consulting providers in Asia Pacific (AP), we identified the 10 most significant ones — Accenture, Deloitte, EY, IBM, KPMG, NTT, PwC, Tech Mahindra,...
-
Report Now Tech: Cybersecurity Consulting Services In Asia Pacific, Q4 2019
Forrester's Overview Of 18 Cybersecurity Consulting Service Providers
October 29, 2019 | Jinan BudgeSecurity and risk (S&R) leaders can use cybersecurity consulting services to reduce the time to deliver security projects, accelerate the pace of innovation, and understand diverse business models...
-
Report Master Your Security Service Catalog
Processes: The S&R Practice Playbook
October 10, 2019 | Paul McKayCISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. But too many CISOs focus only on delivering technical controls, which results in a...
-
Report Get Fighting Fit For EU's NISD
First EU Cybersecurity Regulation Has Mixed Response In First Year Of Operation
September 5, 2019 | Paul McKayIn May 2018, the EU Network Information Security Directive (NISD) came into force. Over the past 12 months, regulators and competent authorities have been working with industry to determine a...
-
Report Security Budgets In Asia Pacific, 2019
Budgets Are Rising As The Region Continues To Play Catch-Up
July 15, 2019 | Jinan BudgeIn 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...
-
Webinar The Beginner's Guide To Regtech And The Digital Transformation Of Compliance
Digital transformation has fundamentally changed how businesses in every industry operate and deliver value to their customers. Now their compliance function must also leverage digital technology...
-
Report Security Outlook 2019: Modest Growth, But Some Sectors Will See Double-Digit Increases
ForecastView Document
June 18, 2019 | Jennifer AdamsHackers are creating new, more sophisticated malware daily. The shift of mission-critical data and applications to the cloud is changing the way companies protect their assets. How are security and...
-
Webinar Cloud Security Gateways — Key Trends And Vendor Landscape
Using The Forrester Wave™
June 12, 2019 | Andras CserCloud security gateways (CSGs) are a key component of protecting data both on-premises and in the cloud. This webinar looks at buyer behaviors and the vendor landscape of CSGs. Key...
-
Report Executive Spotlight: Top Priorities For Security And Risk Leaders In 2019
The Top Five Priorities That Security And Risk Leaders Are Focusing On
June 7, 2019 | Jinan BudgeForrester's Security & Risk Council is comprised of some of the senior-most security and risk (S&R) executives at companies with $1 billion or more in revenue. Each year, we ask our members about...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (4)
- Healthcare (3)
- Retail (3)
- Manufacturing (2)
- Public Sector (2)
Topics
- Information Security (39)
- Security Operations & Program Governance (36)
- Governance Risk & Compliance (GRC) (32)
- Identity & Access Management (IAM) (21)
- Cloud Computing (20)
- Tech Sector Economics (17)
- Business & IT Alignment (16)
- Employee Experience (16)
- Application Security (9)
- Data & Information Protection (9)
- Customer Relationship Management (CRM) (6)
- Financial Management (5)
- IT Services (4)
- Artificial Intelligence (AI) (3)
- Networking (3)
- Strategy Planning & Governance (3)
- Customer Experience Management (1)
- Data Centers & Data Center Networking (1)
- Enterprise Architecture Domains & Practices (1)
- Enterprise Mobility (1)
- Organization (1)
- Pandemic (1)
- User Experience (1)
Methodology
- ForecastView (23)
- Forrester Wave (7)
- Now Tech (7)
- New Tech (1)
Region
- Asia Pacific (9)
- Europe (4)
Vendor
- Accenture (4)
- Deloitte (4)
- IBM (4)
- KPMG (4)
- NTT DATA (4)
- Proofpoint (4)
- PwC (4)
- Tech Mahindra (4)
- Wipro (4)
- BAE Systems (1)
- Capgemini (1)
- Cisco (1)
- Infosys (1)
- Microsoft (1)
- Symantec (1)
- Tata Consultancy Services (TCS) (1)
Analyst
- Jinan Budge (26)
- Andras Cser (13)
- Jennifer Adams (11)
- Brian Kime (6)
- Paul McKay (6)
- Merritt Maxim (3)
- Sean Ryan (3)
- Claire O'Malley (2)
- Alla Valente (1)
- Andrew Hewitt (1)
- Chris Sherman (1)
- Danny Mu (1)
- David Holmes (1)
- Joseph Blankenship (1)
- Meng Liu (1)
- Renee Murphy (1)
- Salvatore Schiano (1)
- Stephanie Balaouras (1)
- Zhi-Ying Barry (1)