Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Forrester's Data Security And Control Framework
January 19, 2021
-
-
Search Results
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Report The Future Of Cybersecurity And Privacy: Defeat The Data Economy's Demons
The Vision Report In The Cybersecurity And Privacy Playbook
The combination of data and machines could fuel either techno-optimistic utopia (happier, healthier lives for all) or totalitarian dystopia (corporations and governments using personal data to...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Opportunities And Risks Accompany The Use Of Employee Collaboration And Meeting Technology
Video, Audio, And Chat Just Got More Complicated For Enterprises
Hundreds of millions of workers are on chats, video, and audio calls each day, with many working from home — this is the "new normal." Application development and delivery (AD&D) leaders and their...
-
Webinar Privacy Predictions 2021
Elevate Customer And Employee Privacy As A Strategic Business And Societal Imperative
With values-based consumers watching companies closely and employee privacy posed to become a priority for companies and regulators, 2021 will bring a great deal of change and new risks to...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Blog Predictions 2021: The Path To A New Normal Demands Increased Cybersecurity Resilience
October 26, 2020 | Heidi Shey2021 will be the beginning of a transition toward a new normal. Organizations will continue to adapt to new business models and changing customer expectations simply because they must in the face...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report A Five-Step Strategy For Data Discovery And Classification
Strategic Plan: The Data Security And Privacy Playbook
June 26, 2020 | Heidi SheyTo protect data and support data governance, security and risk (S&R) pros need to understand what data exists, where it resides, how valuable it is to the firm, and who can use it. This report...
-
Blog Address Legal, Regulatory, And Operational Risks For The Return To Work
June 10, 2020 | Heidi SheyIn late March, Forrester CEO George Colony outlined the four phases of COVID-19. We are currently at the beginning of Phase Three (Management) as regions and businesses reopen. This is a...
-
Report Returning To Work: How To Avoid The 15 Most Critical Risks
The Legal, Regulatory, And Operational Risks Of Pandemic Recovery Everyone Needs To Know
As enterprises plan to reopen office buildings, plants, and other facilities, they will have to develop detailed pandemic management protocols (PMPs) before they can safely ask employees,...
-
Report Maintain Your Security Edge: Develop And Retain Cybersecurity Talent
Continuous Improvement: The Zero Trust Security Playbook
Complacency, lack of diversity, and a focus on technologies over people are threats to the business. In an environment of competitive hiring and fast-evolving threats, security leaders must invest...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Webinar How To Rebuild Customer Trust After A Data Breach
April 16, 2020 | Heidi SheyHow you respond and communicate to customers about a breach and other disruptive events like ransomware sets the tone for recovery. Breach notification is more than just a regulatory requirement;...
-
Webinar Top Recommendations For Your Security Program, 2020
Security and risk (S&R) pros will need to open the risk aperture to account for the impacts of externalities — those risks that are not under the direct control of the business....
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report The Breach Notification Opportunity
Continuous Improvement: The Data Security And Privacy Playbook
March 3, 2020 | Heidi SheyBreach notification is much more than a regulatory requirement. How you respond and communicate to customers about a breach and other disruptive events like ransomware sets the tone for recovery....
-
Report The State Of Data Security And Privacy, 2020
Benchmarks: The Data Security And Privacy Playbook
February 27, 2020 | Heidi SheyThis data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...
-
Blog RSA Conference 2020: What I’m Looking For This Year
February 13, 2020 | Heidi SheyCounting down the days! My RSA Conference schedule is set, and I’ve stocked up on hand sanitizer. Here’s my game plan: · Look for innovation in data security. I keep coming back...
-
Blog Children’s Data Privacy: What’s A Parent To Do?
January 28, 2020 | Heidi SheyHappy Data Privacy Day! What kinds of conversations do you have with friends and family about privacy? Over the holidays and through the new year, I had the topic of children’s data privacy and...
-
Report Capturing Innovation In Your Security Program
Security Startups Offer More Flexibility And Innovative Approaches To Securing Your Enterprise
Cybersecurity is one of the hottest areas worldwide for venture capital and private equity investment. There has never been so many cybersecurity startups globally. Unprecedented levels of...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (6)
- Healthcare (4)
- Retail (4)
- Energy & Utilities (3)
- Manufacturing (3)
- Consumer Electronics (2)
- Public Sector (2)
- Travel (2)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Primary Role
- Security & Risk (59)
- eBusiness & Channel Strategy (3)
- B2C Marketing (2)
- CIO (2)
- Application Development & Delivery (1)
Topics
- Data & Information Protection (39)
- Security Operations & Program Governance (33)
- Governance Risk & Compliance (GRC) (22)
- Information Security (22)
- Organization (9)
- Tech Sector Economics (9)
- Financial Management (7)
- Identity & Access Management (IAM) (7)
- Measurement (7)
- Pandemic (5)
- Application Security (4)
- Employee Experience (4)
- Business & IT Alignment (3)
- Consumer Mobility (3)
- Networking (3)
- Customer Intelligence (2)
- Data Centers & Data Center Networking (2)
- Internet of Things (IoT) (2)
- Telecommunications Services (2)
- Biometrics (1)
- Business Intelligence (1)
- Cloud Computing (1)
- Customer Experience Management (1)
- Customer Relationship Management (CRM) (1)
- Digital Customer Experience (1)
- eCommerce (1)
- Enterprise Collaboration (1)
- Enterprise Content Management (ECM) (1)
- Enterprise Mobility (1)
- Innovation (1)
- Marketing Mix Modeling (1)
- Program & Project Management (1)
- Storage (1)
Methodology
- Now Tech (7)
- Forrester Wave (4)
- Predictions (3)
- Infographic (2)
- Business Technographics (1)
- Forrester Tech Tide (1)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
Region
- North America (2)