Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Breakdown Of Confirmed Breaches In 2020
April 6, 2021
-
Data Types Compromised In The Past 12 Months
April 6, 2021
Search Results
-
Report The State Of Data Security And Privacy, 2021
Benchmarks: The Data Security And Privacy Playbook
April 6, 2021 | Heidi SheyOrganizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...
-
Report The Rise Of Anti-Surveillance Capitalism
The Apparel, Cosmetics, And Technology Shaping Surveillance Resistance And Why It's Time For CISOs To Adopt Them
Security and risk pros need to weigh surveillance capitalism as a risk to their enterprise. This report will explain how data collected, synthesized, and commercialized by tech companies, data...
-
Report Now Tech: Data Masking, Q1 2021
Forrester's Overview Of 18 Data Masking Providers
You can use data masking to protect sensitive data by obfuscation, become significantly more productive, and support various compliance mandates. But to realize these benefits, you'll first have to...
-
Report Top Recommendations For Your Security Program, 2021
Following the mad scramble in 2020 to secure the remote workforce during the global pandemic, 2021 is a time for security leaders to assess their current cybersecurity posture, prioritize...
-
Report The Opportunity, The Unknowns, And The Risks Of Vaccine Passports In The Workplace
Despite The Hype, Employers Must Make Only Modest Changes To Pandemic Protocols
With vaccine rollout occurring around the world, hopes run high of returning to a life free from COVID-19. Vaccine passports promise to quickly turn this hope into a reality, including bringing...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report Now Tech: Data Security Platforms, Q1 2021
Forrester's Overview Of 26 Data Security Platform Providers
February 25, 2021 | Heidi SheyYou can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Report The Future Of Cybersecurity And Privacy: Defeat The Data Economy's Demons
The Vision Report In The Cybersecurity And Privacy Playbook
The combination of data and machines could fuel either techno-optimistic utopia (happier, healthier lives for all) or totalitarian dystopia (corporations and governments using personal data to...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Webinar Privacy Predictions 2021
Elevate Customer And Employee Privacy As A Strategic Business And Societal Imperative
With values-based consumers watching companies closely and employee privacy posed to become a priority for companies and regulators, 2021 will bring a great deal of change and new risks to...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report A Five-Step Strategy For Data Discovery And Classification
Strategic Plan: The Data Security And Privacy Playbook
June 26, 2020 | Heidi SheyTo protect data and support data governance, security and risk (S&R) pros need to understand what data exists, where it resides, how valuable it is to the firm, and who can use it. This report...
-
Report Returning To Work: How To Avoid The 15 Most Critical Risks
The Legal, Regulatory, And Operational Risks Of Pandemic Recovery Everyone Needs To Know
As enterprises plan to reopen office buildings, plants, and other facilities, they will have to develop detailed pandemic management protocols (PMPs) before they can safely ask employees,...
-
Report Maintain Your Security Edge: Develop And Retain Cybersecurity Talent
Continuous Improvement: The Zero Trust Security Playbook
Complacency, lack of diversity, and a focus on technologies over people are threats to the business. In an environment of competitive hiring and fast-evolving threats, security leaders must invest...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Webinar How To Rebuild Customer Trust After A Data Breach
April 16, 2020 | Heidi SheyHow you respond and communicate to customers about a breach and other disruptive events like ransomware sets the tone for recovery. Breach notification is more than just a regulatory requirement;...
-
Webinar Top Recommendations For Your Security Program, 2020
Security and risk (S&R) pros will need to open the risk aperture to account for the impacts of externalities — those risks that are not under the direct control of the business....
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report The Breach Notification Opportunity
Continuous Improvement: The Data Security And Privacy Playbook
March 3, 2020 | Heidi SheyBreach notification is much more than a regulatory requirement. How you respond and communicate to customers about a breach and other disruptive events like ransomware sets the tone for recovery....
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (5)
- Retail (4)
- Energy & Utilities (3)
- Healthcare (3)
- Manufacturing (3)
- Public Sector (2)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Primary Role
- Security & Risk (75)
- B2C Marketing (2)
- CIO (1)
Topics
- Data & Information Protection (48)
- Security Operations & Program Governance (40)
- Information Security (31)
- Governance Risk & Compliance (GRC) (22)
- Tech Sector Economics (15)
- Application Security (10)
- Identity & Access Management (IAM) (9)
- Organization (9)
- Business & IT Alignment (8)
- Cloud Computing (7)
- Financial Management (7)
- Measurement (7)
- Architecture & Technology Strategy (6)
- Packaged Solutions (6)
- Pandemic (5)
- Employee Experience (4)
- Networking (3)
- Data Centers & Data Center Networking (2)
- Data Management (2)
- Biometrics (1)
- Business Intelligence (1)
- Customer Experience Management (1)
- Customer Intelligence (1)
- Customer Relationship Management (CRM) (1)
- Enterprise Mobility (1)
- Innovation (1)
- Internet of Things (IoT) (1)
- Marketing Mix Modeling (1)
- Planning & Fulfillment (1)
- Program & Project Management (1)
- Sourcing Strategy & Execution (1)
- Telecommunications Services (1)
Methodology
- Now Tech (14)
- Forrester Wave (4)
- Predictions (2)
- Business Technographics (1)
- Forrester Tech Tide (1)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
Region
- North America (2)
- Asia Pacific (1)
- Europe (1)
- Middle East (1)