Skip to main content
559 results in Everything
Sort by:
  • Security Operations & Program Governance

Featured content

The Zero Trust Security Playbook For 2021

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report How To Integrate Threat Intelligence Into Your Security Program

    Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
    January 15, 2021 | Brian Kime

    An effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...

  • Report How To Manage The Human Risk In Cybersecurity

    Continuous Improvement: The S&R Practice Playbook
    January 13, 2021 | Jinan Budge

    Traditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...

  • Report Optimize Your Human Risk Management Practices To Differentiate

    Advanced Level: People Practices For Cybersecurity And Privacy
    January 13, 2021 | Jinan Budge

    Firms at the advanced stage of cybersecurity and privacy maturity have likely built a positive reputation for responsible data use and enjoy strong employee morale. This report — the last of three...

  • Report The Forrester Wave™: Static Application Security Testing, Q1 2021

    The 12 Providers That Matter Most And How They Stack Up
    January 11, 2021 | Sandy Carielli

    In our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...

  • Report The State Of Network Security, 2020 To 2021

    Benchmarks: The Zero Trust Security Playbook
    January 7, 2021 | David Holmes, Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...

  • Playbook The Zero Trust Security Playbook For 2021

    Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

    In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • Report Now Tech: External Threat Intelligence Services, Q4 2020

    Forrester's Overview Of 30 External Threat Intelligence Services Providers
    December 28, 2020 | Brian Kime, Elsa Pikulik

    You can use external threat intelligence services to reduce the risk of vulnerability exploitation, protect your brand's reputation, and monitor and track cyberthreats. But to realize these...

  • Report Don't Ignore Security In Low-Code Development

    Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
    December 23, 2020 | Sandy Carielli, John Bratincevic

    The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...

  • Report Gauge Your Data Security And Privacy Maturity

    Assessment: The Data Security And Privacy Playbook
    December 18, 2020 | Enza Iannopollo, Heidi Shey

    To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...

  • Report Now Tech: Managed Detection And Response Services Providers, Q4 2020

    Forrester's Overview Of 42 Managed Detection And Response Providers
    December 16, 2020 | Jeff Pollard

    You can use managed detection and response (MDR) to attain significant expertise to help drive detection and response, become proactive rather than reactive, and choose what the security team will...

  • Report Multinational Firms Must Quickly Adapt To The UK's Divergence From EU Privacy Standards

    December 3, 2020 | Enza Iannopollo

    With Brexit negotiations coming to an end and a deal with the EU still out of sight, data protection matters are more uncertain than ever. Meanwhile, the UK data protection regulator is softening...

  • Report The Forrester Wave™: Security Analytics Platforms, Q4 2020

    The 11 Providers That Matter Most And How They Stack Up
    December 1, 2020 | Joseph Blankenship, Claire O'Malley

    In our 27-criterion evaluation of security analytics platform providers, we identified the 11 most significant ones — Exabeam, FireEye, Gurucul, IBM Security, LogRhythm, Micro Focus, Microsoft,...

  • Report Define A Roadmap To Accelerate Your Security Program

    Roadmap: The S&R Practice Playbook
    December 1, 2020 | Jinan Budge, Paul McKay

    Turning strategy into action reveals a CISO's worth. A solid security roadmap is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...

  • Report Gauge Your GRC Program Maturity

    Assessment: The Governance, Risk, And Compliance Playbook
    November 6, 2020 | Renee Murphy, Alla Valente

    Risk management pros must objectively assess their governance, risk, and compliance (GRC) program to identify gaps and highlight strengths to successfully create a roadmap for improvements. This...

  • Forum Data Strategy & Insights

    Thought leadership, strategic direction, and networking opportunities needed to shape your data and analytics strategy for the coming decade.
    October 14, 2020 | Live Virtual Experience | Brandon Purcell, Noel Yuhanna, Boris Evelson

    Are you ready to turn your organization into an insights-driven enterprise? Join more than 20 Forrester analysts, industry speakers, and over 650 data and analytics practitioners for two days at...

  • Forum Security & Risk Global

    Leading the Way
    September 22, 2020 | Live Virtual Experience | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    August 14, 2020 | Sean Ryan

    Mega data breaches will often spur organizations to invest in cyber security. However, if the approach is reactive and unplanned, then it's a wasted opportunity. Use this report to structure a...

  • Report The Zero Trust eXtended Ecosystem: Data

    Landscape: The Data Security And Privacy Playbook
    August 11, 2020 | Heidi Shey, Chase Cunningham

    Data security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...

  • Playbook The S&R Practice Playbook For 2021

    Build A High-Performance, Customer-Obsessed Security Organization

    CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...

  • Report The Top Trends Shaping Anti-Money Laundering In 2020

    Robotic Process Automation, Cryptocurrencies, Real-Time Detection, And KYC Processes Gain Importance
    August 10, 2020 | Andras Cser

    With new real-time transactions gaining popularity and new legalized product markets (such as cannabis) emerging, anti-money-laundering (AML) regulations are getting tougher and more complex. This...

  • Report Now Tech: Security Analytics Platforms, Q3 2020

    Forrester's Overview Of 23 Security Analytics Platform Providers
    August 7, 2020 | Josh Zelonis

    You can use security analytics platforms to provide better visibility into your environments, detect threats and support investigations, and orchestrate a response across the environment. But to...

  • Report Maintain Security Visibility In The TLS 1.3 Era

    You Have Two Years To Prepare Your Security Tools For TLS 1.3 And DNS-Over-HTTPS
    July 30, 2020 | David Holmes

    New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Soon, security controls, already starved for...

  • Report The Forrester Wave™: Global Managed Security Services Providers, Q3 2020

    The 15 Providers That Matter Most And How They Stack Up
    July 27, 2020 | Jeff Pollard, Claire O'Malley

    In our 26-criterion evaluation of global managed security services providers (MSSPs), we identified the 15 most significant ones — Accenture, Alert Logic, AT&T Cybersecurity, Capgemini,...

  • Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success

    Advanced Level: Process For Cybersecurity And Privacy
    July 15, 2020 | Merritt Maxim, Elsa Pikulik

    CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect their brands, they help their firms drive revenue growth and sustained long-term success. This report — the...

  • Report Job Description: Director Of Threat Intelligence

    The Infosec Renaissance Pro
    July 13, 2020 | Brian Kime

    Security and risk (S&R) professionals frequently struggle to maximize the value of their investments in threat intelligence solutions. Improperly treating threat intelligence as a technical control...

Content Type