Skip to main content
53 results in Everything
 
Sort by:
Refine
  • Transform IT to win, serve, and retain customers
  • Security & Risk

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Embrace Zero Trust For Australia's Essential Eight

    Avoid The Compliance-As-A-Strategy Approach

    In this report, we show how your organization can leverage Zero Trust to comply with the Australian Essential Eight and better align your security planning, budget, and strategy. Security and risk...

  • Webinar Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR

    April 13, 2021 | Allie Mellen

    In this webinar, we address the elephant in the room: defining extended detection and response (XDR). Join this webinar to learn what XDR is, what benefits it can bring to security teams, and how...

  • Report How To Manage The Human Risk In Cybersecurity

    Continuous Improvement: The S&R Practice Playbook
    January 13, 2021 | Jinan Budge

    Traditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...

  • Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    December 4, 2020 | Merritt Maxim, Andras Cser

    New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...

  • Webinar Transform Enterprise Security With The Zero Trust Edge

    November 10, 2020 | David Holmes

    Enterprise security architecture has struggled because we have to interface with the most toxic network ever built — the public internet. It was designed to withstand nuclear attacks and to...

  • Webinar Improve Your Climate Action Plan With The Right Investments In Sustainability And Climate Risk Technologies

    Like coping with the COVID-19 pandemic, how your company responds to the climate crisis reveals its commitment to its values and the extent of its adaptability. Investments in sustainability and...

  • Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    October 27, 2020 | Andras Cser, Sean Ryan

    Your identity and access management (IAM) strategy must establish and explain the business need and value of IAM to technology and business leaders. It must also describe the current state, define...

  • Webinar The Future Of Endpoint Management And Security Is Now

    September 1, 2020 | Andrew Hewitt, Chris Sherman

    The COVID-19 pandemic has accelerated the shift toward modern endpoint management and security. To improve scalability, business continuity, security, and digital employee experience, organizations...

  • Report Job Description: Director Of Threat Intelligence

    The Infosec Renaissance Pro
    July 13, 2020 | Brian Kime

    Security and risk (S&R) professionals frequently struggle to maximize the value of their investments in threat intelligence solutions. Improperly treating threat intelligence as a technical control...

  • Report Sell Your Zero Trust Strategy Internally

    Gain Advocacy, Support, And Budget For Your Security Vision
    June 23, 2020 | Jinan Budge, Chase Cunningham

    Security and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...

  • Report Bust The Zero Trust Myths

    Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
    June 22, 2020 | Jinan Budge, Chase Cunningham

    Zero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...

  • Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020

    The 12 Providers That Matter Most And How They Stack Up
    February 25, 2020 | Jinan Budge, Claire O'Malley

    In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...

  • Report Build A Security Champions Network

    How To Integrate Security Culture Across Your Organization
    February 12, 2020 | Jinan Budge, Claire O'Malley

    Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...

  • Webinar Kill The Employee Password With Zero Trust

    February 6, 2020 | Sean Ryan

    Passwords are easy to hack and expensive to support. So why do so many organizations still rely on them for secure access? S&R pros need to ditch the password and adopt a Zero Trust approach to...

  • Report A CISO's Guide To Successfully Leading Change

    How To Build Support, Manage Detractors, And Navigate Politics
    January 9, 2020 | Jinan Budge

    Cybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...

  • Webinar Top Trends Shaping IAM In 2020

    December 11, 2019 | Andras Cser, Sean Ryan

    This webinar highlights the top trends influencing identity and access management (IAM) in 2020. We cover enterprise and customer IAM as well as access management and governance.Key...

  • Report Artificial Intelligence Is Transforming Fraud Management

    Advances In AI Are Reshaping The Fraud Management Landscape
    December 10, 2019 | Andras Cser, Danny Mu, Meng Liu

    Artificial intelligence went through a long period of maturation plagued by high rates of false positives and inexplicable decisioning. But AI and machine learning (ML) tools have since become part...

  • Report Research Overview: Security Awareness, Behavior, And Culture

    A CISO's Guide To Research About The People Side Of Security
    October 30, 2019 | Jinan Budge

    The people element of security has long sat on the back burner as security and risk (S&R) pros buy product after product without first solving fundamental problems. People and culture are central...

  • Report The Forrester Wave™: Cybersecurity Consulting Services In Asia Pacific, Q4 2019

    The 10 Providers That Matter Most And How They Stack Up
    October 30, 2019 | Jinan Budge

    In our 23-criterion evaluation of cybersecurity consulting providers in Asia Pacific (AP), we identified the 10 most significant ones — Accenture, Deloitte, EY, IBM, KPMG, NTT, PwC, Tech Mahindra,...

  • Report Now Tech: Cybersecurity Consulting Services In Asia Pacific, Q4 2019

    Forrester's Overview Of 18 Cybersecurity Consulting Service Providers
    October 29, 2019 | Jinan Budge

    Security and risk (S&R) leaders can use cybersecurity consulting services to reduce the time to deliver security projects, accelerate the pace of innovation, and understand diverse business models...

  • Report Master Your Security Service Catalog

    Processes: The S&R Practice Playbook
    October 10, 2019 | Paul McKay

    CISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. But too many CISOs focus only on delivering technical controls, which results in a...

  • Report Get Fighting Fit For EU's NISD

    First EU Cybersecurity Regulation Has Mixed Response In First Year Of Operation
    September 5, 2019 | Paul McKay

    In May 2018, the EU Network Information Security Directive (NISD) came into force. Over the past 12 months, regulators and competent authorities have been working with industry to determine a...