Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Breakdown Of Confirmed Security Breaches In 2018
December 5, 2018
-
The Data Security Technology Wish List
December 5, 2018
Search Results
-
Report The State Of Data Security And Privacy: 2018 To 2019
This data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in global firms for 2018 through 2019. Understanding...
-
Report Reinvent Security Awareness To Engage The Human Firewall
December 17, 2014 | Nick HayesThe human element is one of the most critical aspects of your security program, yet it's often the most neglected. Many security leaders prioritize other projects and see little value in the...
-
Report Enforce A Just Culture To Fortify The Human Firewall
Transform Impotent Policies Into The Foundation Of Your Security Program
April 24, 2014 | Andrew RoseIn the continually changing landscape of internal and external security threats, S&R professionals must constantly assess the efficacy of their security programs. Although policy is at the core of...
-
Report Executive Spotlight: How CISOs Can Meet (And Surpass) The CIO's Expectations
Planning The Journey From Safe Pair Of Hands To Trusted Advisor
February 19, 2014 | Andrew Rose, Alastair BehennaNext-generation CIOs and their teams face the challenge of fulfilling consumer expectations and the demands of digital natives while still meeting appropriate budgetary, governance, and performance...
-
Report Executive Spotlight: Selling Security To The CMO
An Outline Of CMO Priorities, And The Five Questions Every CISO Should Ask The CMO
January 9, 2014 | Andrew RoseThe age of the customer is redefining business challenges for organizations of all types. Rather than paying lip service to "customer care," they now must become "customer-obsessed" to retain...
-
Report Create And Manage An Effective Security Governance Board
September 4, 2013 | Andrew RoseOver the past few years, regulation, compliance, and an escalating threat landscape gradually pushed information security to mature into a formal discipline, and these drivers encouraged CISOs to...
-
Report Build A Strategic Security Program And Organization
April 12, 2013 | Andrew RoseThis report outlines Forrester's solution for security and risk (S&R) professionals looking to build a high-performance security program and organization. This report is designed to help S&R execs...
-
Report Forrsights: The New IT Security Buyer Landscape
Success Requires Vendors To Change Features, Positioning, And Sales Enablement
Despite the recent spate of high-profile security breaches, many chief information security officers (CISOs) find themselves marginalized by their peers and disconnected from their business's...
-
Report Navigate The Future Of The Security Organization
February 14, 2012 | Stephanie Balaouras, Andrew RoseThis report outlines Forrester's solution for security and risk (S&R) executives working on building a high-performance security program and organization. This report is designed to help you...
-
Report Don't Bore Your Executives — Speak To Them In A Language That They Understand
Seven Critical Executive-Level Metrics For CISOs And The Business
July 18, 2011 | Ed FerraraThe ability to communicate effectively has always been a core competency for any business executive, and today's chief information security officer (CISO) is fast becoming a business executive. The...
-
Report Twelve Recommendations For Your 2011 Security Strategy
Governance, Maturity, And Analytics Are The Major Themes For 2011
December 3, 2010 | Khalid KarkEvery winter Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on hundreds of client inquiries, numerous consulting...
-
Report Securing An Empowered Organization
An Empowered Report: Run At The Threat, Shape The Future Of Your Company
October 29, 2010 | Chenxi WangEmployees are provisioning themselves with consumer and cloud technology. Forrester's study of US information workers reveals that 37% are doing something with technology without permission. And...
-
Report CISO Handbook: Ten Tips For Building A Successful Security Steering Committee
October 4, 2010 | Khalid KarkAs information security matures into a formal discipline, it needs formal governance mechanisms. Over the past 12 months, Forrester has seen increased interest and activity in establishing security...
-
Report The New Threat Landscape: Proceed With Caution
Understand The New Threat Paradigm To Make Your Responses More Effective
August 13, 2010 | Khalid KarkThe information security threat landscape is changing rapidly, and many security organizations are struggling to keep up with the changing nature, complexity, and scale of attacks. Not only is it...
-
Report Security Organization Trends 2010
February 4, 2010 | Khalid Kark, Jonathan PennThe scope of IT security continues to expand, and with it the visibility of the security organization is rising. Most security organizations now regularly engage with executives and business...
-
Report Privacy Policies And Drivers 2008
April 9, 2009 | Christopher McCleanPrivacy programs in North America and Europe typically include policies for protecting corporate intellectual property and sensitive data. Although government regulation is by far the biggest...
-
Report SMBs Struggle To Keep Pace With IT Security
The State Of SMB IT Security: 2008 To 2009
January 29, 2009 | Simon YatesForrester's recent security survey of North American and European SMBs provides some insight into the current state of IT security. We found that the IT security organizations for small and...
-
Report IT Security Remains An Integral Part Of The Enterprise
The State Of Enterprise IT Security: 2008 To 2009
January 29, 2009 | Simon YatesForrester's recent security survey of North American and European enterprises shows hope for the current state of IT security. Thankfully, we found that the IT security organization continues to be...
-
Report 2008 CISO Agenda: Embrace Change
Ten Changes To Existing Practices That Will Guarantee Your Success
March 28, 2008 | Khalid KarkIt's amazing how little progress we see year after year. As we look back to early 2007, or even 2006, not a lot has changed in what's expected of the security organization and what the chief...
-
Report 2008 CISO Priorities: The Right Objectives But The Wrong Focus
March 20, 2008 | Khalid KarkThere is a definite chasm between chief information security officers' (CISOs') priorities and their responsibilities. CISOs understand that their priorities need to align with business objectives,...
-
Report Building A World-Class Security Operations Function
March 19, 2008 | Paul StampTo protect their vital information assets better and be more responsive to business requirements, companies have shifted security programs to gain better visibility into what happens in their...
-
Report Trends 2007: Physical And Logical Security Convergence
August 17, 2007 | Geoffrey TurnerThe integration of enterprise physical security controls and management regimes with enterprise IT security architectures is a nascent trend that has been forecast as imminent for several years....
Content Type
ApplyFilters
Topics
- Organizational Structure (50)
- Steering Committees (11)
- Executive Leadership (4)
- Corporate Culture (1)
Methodology
Region
- United States (5)
Analyst
- Heidi Shey (2)
- Stephanie Balaouras (2)
- Enza Iannopollo (1)