Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
Search Results
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Webinar Privacy Predictions 2021
Elevate Customer And Employee Privacy As A Strategic Business And Societal Imperative
With values-based consumers watching companies closely and employee privacy posed to become a priority for companies and regulators, 2021 will bring a great deal of change and new risks to...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report A Five-Step Strategy For Data Discovery And Classification
Strategic Plan: The Data Security And Privacy Playbook
June 26, 2020 | Heidi SheyTo protect data and support data governance, security and risk (S&R) pros need to understand what data exists, where it resides, how valuable it is to the firm, and who can use it. This report...
-
Report Returning To Work: How To Avoid The 15 Most Critical Risks
The Legal, Regulatory, And Operational Risks Of Pandemic Recovery Everyone Needs To Know
As enterprises plan to reopen office buildings, plants, and other facilities, they will have to develop detailed pandemic management protocols (PMPs) before they can safely ask employees,...
-
Report Maintain Your Security Edge: Develop And Retain Cybersecurity Talent
Continuous Improvement: The Zero Trust Security Playbook
Complacency, lack of diversity, and a focus on technologies over people are threats to the business. In an environment of competitive hiring and fast-evolving threats, security leaders must invest...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Webinar How To Rebuild Customer Trust After A Data Breach
April 16, 2020 | Heidi SheyHow you respond and communicate to customers about a breach and other disruptive events like ransomware sets the tone for recovery. Breach notification is more than just a regulatory requirement;...
-
Webinar Top Recommendations For Your Security Program, 2020
Security and risk (S&R) pros will need to open the risk aperture to account for the impacts of externalities — those risks that are not under the direct control of the business....
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report The Breach Notification Opportunity
Continuous Improvement: The Data Security And Privacy Playbook
March 3, 2020 | Heidi SheyBreach notification is much more than a regulatory requirement. How you respond and communicate to customers about a breach and other disruptive events like ransomware sets the tone for recovery....
-
Report The State Of Data Security And Privacy, 2020
Benchmarks: The Data Security And Privacy Playbook
February 27, 2020 | Heidi SheyThis data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...
-
Report Capturing Innovation In Your Security Program
Security Startups Offer More Flexibility And Innovative Approaches To Securing Your Enterprise
Cybersecurity is one of the hottest areas worldwide for venture capital and private equity investment. There has never been so many cybersecurity startups globally. Unprecedented levels of...
-
Report The Business Case For Data Security And Privacy
Business Case: The Data Security And Privacy Playbook
January 23, 2020 | Heidi SheyBusinesses recognize that the consequences of breach, data misuse, or privacy mishaps can be costly. For security, risk, and privacy professionals, building a business case based on the importance...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by...
-
Report Demystifying De-Identification, Anonymization, And Pseudonymization
How To Reduce Privacy Compliance Risk, Unlock The Value Of Data, And Improve Customer Experience
Privacy regulations such as the California Consumer Privacy Act (CCPA) and the EU General Data Protection Regulation (GDPR) have spurred interest in key technologies and approaches to support...
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
Data is the lifeblood of digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every security and privacy leader. Security and privacy pros must ensure that...
-
Report Now Tech: eDiscovery Service Providers, Q3 2019
Forrester's Overview Of 35 eDiscovery Service Providers
September 4, 2019 | Heidi SheyYou can use eDiscovery service providers to boost expertise, speed, and scale of eDiscovery-related operations, benefit from best-fit technologies for your requirements, and optimize overall...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Report The Forrester Tech Tide™: Data Security And Privacy, Q3 2019
20 Technologies Underpin Data Security And Privacy
Data security and privacy is critical to firms' ability to win, serve, and retain their customers. To protect sensitive data, meet compliance, and continue to mature their practices for data...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (6)
- Retail (4)
- Energy & Utilities (3)
- Healthcare (3)
- Manufacturing (3)
- Public Sector (2)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Topics
- Data & Information Protection (39)
- Security Operations & Program Governance (39)
- Governance Risk & Compliance (GRC) (19)
- Information Security (19)
- Organization (8)
- Tech Sector Economics (8)
- Cloud Computing (7)
- Financial Management (7)
- Identity & Access Management (IAM) (7)
- Measurement (7)
- Application Security (4)
- Employee Experience (4)
- Pandemic (4)
- Networking (3)
- Business & IT Alignment (2)
- Data Centers & Data Center Networking (2)
- Biometrics (1)
- Business Intelligence (1)
- Customer Experience Management (1)
- eCommerce (1)
- Enterprise Mobility (1)
- Innovation (1)
- Internet of Things (IoT) (1)
- Program & Project Management (1)
- Telecommunications Services (1)
Methodology
- Now Tech (13)
- Forrester Wave (4)
- Forrester Tech Tide (1)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
- Predictions (1)
Region
- North America (1)