Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
CISOs Still Most Commonly Report To The CIO
February 19, 2014
-
-
Business Perception Of Technology Management Is Not Positive
February 19, 2014
Search Results
-
Report Executive Spotlight: How CISOs Can Meet (And Surpass) The CIO's Expectations
Planning The Journey From Safe Pair Of Hands To Trusted Advisor
February 19, 2014 | Andrew Rose, Alastair BehennaNext-generation CIOs and their teams face the challenge of fulfilling consumer expectations and the demands of digital natives while still meeting appropriate budgetary, governance, and performance...
-
Report Build A Strategic Security Program And Organization
April 12, 2013 | Andrew RoseThis report outlines Forrester's solution for security and risk (S&R) professionals looking to build a high-performance security program and organization. This report is designed to help S&R execs...
-
Report Forrsights: The New IT Security Buyer Landscape
Success Requires Vendors To Change Features, Positioning, And Sales Enablement
Despite the recent spate of high-profile security breaches, many chief information security officers (CISOs) find themselves marginalized by their peers and disconnected from their business's...
-
Report Navigate The Future Of The Security Organization
February 14, 2012 | Stephanie Balaouras, Andrew RoseThis report outlines Forrester's solution for security and risk (S&R) executives working on building a high-performance security program and organization. This report is designed to help you...
-
Report Don't Bore Your Executives — Speak To Them In A Language That They Understand
Seven Critical Executive-Level Metrics For CISOs And The Business
July 18, 2011 | Ed FerraraThe ability to communicate effectively has always been a core competency for any business executive, and today's chief information security officer (CISO) is fast becoming a business executive. The...
-
Report Twelve Recommendations For Your 2011 Security Strategy
Governance, Maturity, And Analytics Are The Major Themes For 2011
December 3, 2010 | Khalid KarkEvery winter Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on hundreds of client inquiries, numerous consulting...
-
Report Securing An Empowered Organization
An Empowered Report: Run At The Threat, Shape The Future Of Your Company
October 29, 2010 | Chenxi WangEmployees are provisioning themselves with consumer and cloud technology. Forrester's study of US information workers reveals that 37% are doing something with technology without permission. And...
-
Report CISO Handbook: Ten Tips For Building A Successful Security Steering Committee
October 4, 2010 | Khalid KarkAs information security matures into a formal discipline, it needs formal governance mechanisms. Over the past 12 months, Forrester has seen increased interest and activity in establishing security...
-
Report The New Threat Landscape: Proceed With Caution
Understand The New Threat Paradigm To Make Your Responses More Effective
August 13, 2010 | Khalid KarkThe information security threat landscape is changing rapidly, and many security organizations are struggling to keep up with the changing nature, complexity, and scale of attacks. Not only is it...
-
Report Security Organization Trends 2010
February 4, 2010 | Khalid Kark, Jonathan PennThe scope of IT security continues to expand, and with it the visibility of the security organization is rising. Most security organizations now regularly engage with executives and business...
-
Report Privacy Policies And Drivers 2008
April 9, 2009 | Christopher McCleanPrivacy programs in North America and Europe typically include policies for protecting corporate intellectual property and sensitive data. Although government regulation is by far the biggest...
-
Report SMBs Struggle To Keep Pace With IT Security
The State Of SMB IT Security: 2008 To 2009
January 29, 2009 | Simon YatesForrester's recent security survey of North American and European SMBs provides some insight into the current state of IT security. We found that the IT security organizations for small and...
-
Report IT Security Remains An Integral Part Of The Enterprise
The State Of Enterprise IT Security: 2008 To 2009
January 29, 2009 | Simon YatesForrester's recent security survey of North American and European enterprises shows hope for the current state of IT security. Thankfully, we found that the IT security organization continues to be...
-
Report 2008 CISO Agenda: Embrace Change
Ten Changes To Existing Practices That Will Guarantee Your Success
March 28, 2008 | Khalid KarkIt's amazing how little progress we see year after year. As we look back to early 2007, or even 2006, not a lot has changed in what's expected of the security organization and what the chief...
-
Report 2008 CISO Priorities: The Right Objectives But The Wrong Focus
March 20, 2008 | Khalid KarkThere is a definite chasm between chief information security officers' (CISOs') priorities and their responsibilities. CISOs understand that their priorities need to align with business objectives,...
-
Report Building A World-Class Security Operations Function
March 19, 2008 | Paul StampTo protect their vital information assets better and be more responsive to business requirements, companies have shifted security programs to gain better visibility into what happens in their...
-
Report Trends 2007: Physical And Logical Security Convergence
August 17, 2007 | Geoffrey TurnerThe integration of enterprise physical security controls and management regimes with enterprise IT security architectures is a nascent trend that has been forecast as imminent for several years....
Content Type
ApplyFilters
Methodology
Region
- United States (5)
Analyst
- Stephanie Balaouras (2)
- Heidi Shey (1)