Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Now Tech Market Presence Segments: Data Security Platforms, Q1 2021
February 25, 2021
-
Now Tech Small Vendors: Data Security Platforms, Q1 2021
February 25, 2021
-
Search Results
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report Now Tech: Data Security Platforms, Q1 2021
Forrester's Overview Of 26 Data Security Platform Providers
February 25, 2021 | Heidi SheyYou can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Report The Future Of Cybersecurity And Privacy: Defeat The Data Economy's Demons
The Vision Report In The Cybersecurity And Privacy Playbook
The combination of data and machines could fuel either techno-optimistic utopia (happier, healthier lives for all) or totalitarian dystopia (corporations and governments using personal data to...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Webinar Privacy Predictions 2021
Elevate Customer And Employee Privacy As A Strategic Business And Societal Imperative
With values-based consumers watching companies closely and employee privacy posed to become a priority for companies and regulators, 2021 will bring a great deal of change and new risks to...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report A Five-Step Strategy For Data Discovery And Classification
Strategic Plan: The Data Security And Privacy Playbook
June 26, 2020 | Heidi SheyTo protect data and support data governance, security and risk (S&R) pros need to understand what data exists, where it resides, how valuable it is to the firm, and who can use it. This report...
-
Report Returning To Work: How To Avoid The 15 Most Critical Risks
The Legal, Regulatory, And Operational Risks Of Pandemic Recovery Everyone Needs To Know
As enterprises plan to reopen office buildings, plants, and other facilities, they will have to develop detailed pandemic management protocols (PMPs) before they can safely ask employees,...
-
Report Maintain Your Security Edge: Develop And Retain Cybersecurity Talent
Continuous Improvement: The Zero Trust Security Playbook
Complacency, lack of diversity, and a focus on technologies over people are threats to the business. In an environment of competitive hiring and fast-evolving threats, security leaders must invest...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Webinar How To Rebuild Customer Trust After A Data Breach
April 16, 2020 | Heidi SheyHow you respond and communicate to customers about a breach and other disruptive events like ransomware sets the tone for recovery. Breach notification is more than just a regulatory requirement;...
-
Webinar Top Recommendations For Your Security Program, 2020
Security and risk (S&R) pros will need to open the risk aperture to account for the impacts of externalities — those risks that are not under the direct control of the business....
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report The Breach Notification Opportunity
Continuous Improvement: The Data Security And Privacy Playbook
March 3, 2020 | Heidi SheyBreach notification is much more than a regulatory requirement. How you respond and communicate to customers about a breach and other disruptive events like ransomware sets the tone for recovery....
-
Report The State Of Data Security And Privacy, 2020
Benchmarks: The Data Security And Privacy Playbook
February 27, 2020 | Heidi SheyThis data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...
-
Report Capturing Innovation In Your Security Program
Security Startups Offer More Flexibility And Innovative Approaches To Securing Your Enterprise
Cybersecurity is one of the hottest areas worldwide for venture capital and private equity investment. There has never been so many cybersecurity startups globally. Unprecedented levels of...
-
Report The Business Case For Data Security And Privacy
Business Case: The Data Security And Privacy Playbook
January 23, 2020 | Heidi SheyBusinesses recognize that the consequences of breach, data misuse, or privacy mishaps can be costly. For security, risk, and privacy professionals, building a business case based on the importance...
-
Report Demystifying De-Identification, Anonymization, And Pseudonymization
How To Reduce Privacy Compliance Risk, Unlock The Value Of Data, And Improve Customer Experience
Privacy regulations such as the California Consumer Privacy Act (CCPA) and the EU General Data Protection Regulation (GDPR) have spurred interest in key technologies and approaches to support...
-
Report Predictions 2020: Privacy And Data Ethics
Marketers Fight To Retain Access To Consumer Data As Regional Regulations Make A Global Impact In Courtrooms And Boardrooms
2020 is poised to be the "year of the privacy regulator." As a result, privacy and data ethics will rightfully take their place on the boardroom agenda. This report lays out Forrester's five...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (5)
- Retail (4)
- Energy & Utilities (3)
- Healthcare (3)
- Manufacturing (3)
- Public Sector (2)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Primary Role
- Security & Risk (65)
- B2C Marketing (2)
- CIO (1)
Topics
- Data & Information Protection (45)
- Security Operations & Program Governance (33)
- Information Security (29)
- Governance Risk & Compliance (GRC) (19)
- Organization (9)
- Tech Sector Economics (9)
- Financial Management (7)
- Identity & Access Management (IAM) (7)
- Measurement (7)
- Pandemic (5)
- Application Security (4)
- Employee Experience (4)
- Networking (3)
- Business & IT Alignment (2)
- Data Centers & Data Center Networking (2)
- Biometrics (1)
- Business Intelligence (1)
- Cloud Computing (1)
- Customer Experience Management (1)
- Customer Intelligence (1)
- Customer Relationship Management (CRM) (1)
- Enterprise Mobility (1)
- Innovation (1)
- Internet of Things (IoT) (1)
- Marketing Mix Modeling (1)
- Program & Project Management (1)
- Telecommunications Services (1)
Methodology
- Now Tech (14)
- Forrester Wave (4)
- Predictions (2)
- Business Technographics (1)
- Forrester Tech Tide (1)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
Region
- North America (1)