Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
-
Four Steps To Create A Strategic Program To Manage The Human Risks
January 13, 2021
-
Search Results
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report Job Description: Director Of Threat Intelligence
The Infosec Renaissance Pro
July 13, 2020 | Brian KimeSecurity and risk (S&R) professionals frequently struggle to maximize the value of their investments in threat intelligence solutions. Improperly treating threat intelligence as a technical control...
-
Report Sell Your Zero Trust Strategy Internally
Gain Advocacy, Support, And Budget For Your Security Vision
June 23, 2020 | Jinan Budge, Chase CunninghamSecurity and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...
-
Report Bust The Zero Trust Myths
Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
June 22, 2020 | Jinan Budge, Chase CunninghamZero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...
-
Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020
The 12 Providers That Matter Most And How They Stack Up
In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...
-
Report Build A Security Champions Network
How To Integrate Security Culture Across Your Organization
Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...
-
Report A CISO's Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
January 9, 2020 | Jinan BudgeCybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...
-
Report Research Overview: Security Awareness, Behavior, And Culture
A CISO's Guide To Research About The People Side Of Security
October 30, 2019 | Jinan BudgeThe people element of security has long sat on the back burner as security and risk (S&R) pros buy product after product without first solving fundamental problems. People and culture are central...
-
Report Master Your Security Service Catalog
Processes: The S&R Practice Playbook
October 10, 2019 | Paul McKayCISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. But too many CISOs focus only on delivering technical controls, which results in a...
-
Report Security Budgets In Asia Pacific, 2019
Budgets Are Rising As The Region Continues To Play Catch-Up
July 15, 2019 | Jinan BudgeIn 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...
-
Report Executive Spotlight: Top Priorities For Security And Risk Leaders In 2019
The Top Five Priorities That Security And Risk Leaders Are Focusing On
June 7, 2019 | Jinan BudgeForrester's Security & Risk Council is comprised of some of the senior-most security and risk (S&R) executives at companies with $1 billion or more in revenue. Each year, we ask our members about...
-
Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019
Forrester's Landscape Overview Of 21 Providers
A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...
-
Report Now Tech: Managed Security Services In Asia Pacific, Q1 2019
Forrester's Overview Of 19 Managed Security Service Providers
January 16, 2019 | Jinan BudgeYou can use managed security services to rapidly transform your security operations, improve your talent diversity, increase your breadth of skills, and support your global business. But to access...
Content Type
ApplyFilters
Industry
- Manufacturing (1)
Topics
Methodology
- Forrester Wave (4)
- New Tech (1)
- Now Tech (1)
Region
- Asia Pacific (6)
Vendor
- Proofpoint (4)
- Accenture (1)
- AT&T (1)
- Deloitte (1)
- EY (1)
- Fujitsu (1)
- IBM (1)
- Infosys (1)
- Symantec (1)
- Tata Consultancy Services (TCS) (1)
- Tech Mahindra (1)
- Verizon Communications (1)
- Wipro (1)
Analyst
- Jinan Budge (22)
- Brian Kime (6)
- Claire O'Malley (2)
- Paul McKay (2)
- Joseph Blankenship (1)
- Merritt Maxim (1)