42 results in Reports
Sort by:
Refine
  • Jeff Pollard

Search Results

  • For Security & Risk Professionals

    Report

    Report Quick Take: Fatal Chip Flaws Set Security Back Decades

    CISOs And CIOs Must Act Immediately To Weather The Chip-Ocalypse

    This week, researchers revealed two critical flaws, Meltdown and Spectre, that impact billions of mobile phones, laptops, servers, and cloud services running on chips from suppliers including AMD,...

  • For Security & Risk Professionals

    Report

    Report Equifax Exposed Two Massive Systemic Risks

    Flaws In The Data Economy Will Make Future Breaches Even More Frequent And Damaging
    December 19, 2017 | Amy DeMartine, Jeff Pollard, Heidi Shey

    In September 2017, Equifax announced a breach of sensitive personal information of 143 million US consumers, as well as consumers in the UK and Canada. The scale and scope of the breach foretell...

  • For Security & Risk Professionals

    Report

    Report CISO Career Paths: Plot Your Course For Advancement

    Look Up And Out For Your Next Promotion
    December 7, 2017 | Jeff Pollard

    The CISO role is evolving rapidly, so there is no standard guidebook to getting hired, progressing, or succeeding as a CISO. To understand the skills, experience, and education that qualify leaders...

  • For Security & Risk Professionals

    Report

    Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    November 21, 2017 | Jeff Pollard

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • For Security & Risk Professionals

    Report

    Report Predictions 2018: Cybersecurity

    Landscape: The S&R Practice Playbook
    November 7, 2017 | Andras Cser, Jeff Pollard, Merritt Maxim

    In 2018, consumers and businesses will face challenges brought on by four primary forces: 1) rising tensions in international relations; 2) ubiquitous connectivity; 3) digital transformation...

  • For Security & Risk Professionals

    Report

    Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    November 1, 2017 | Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros devote resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way...

  • For Security & Risk Professionals

    Report

    Report Use Forrester's CISO Strategic Canvas To Align Security With Business

    Strategic Plan: The S&R Practice Playbook
    October 16, 2017 | Jeff Pollard

    Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Information Security Consulting Services, Q3 2017

    The Best Firms Are Helping CISOs Secure Digital Transformation
    September 28, 2017 | Jeff Pollard, Claire O'Malley

    In our 26 criteria evaluation of information security consulting services providers, we identified the 15 most significant ones — Accenture, Atos, BAE Systems, Deloitte, DXC Technology, EY, IBM,...

  • For Security & Risk Professionals

    Report

    Report Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook
    August 25, 2017 | Heidi Shey, Jeff Pollard

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • For Security & Risk Professionals

    Report

    Report Assess Your Exposure To Geopolitical Cyber Risk

    How To Identify The Impacts Of Geopolitical Dynamics Across Your Organization

    Geopolitical tensions around the world are spawning nearly constant cyberattacks on unprepared private sector firms. These cyberattacks result in millions of dollars in lost customer trust, as well...

  • For Security & Risk Professionals

    Report

    Report The Market For Managed Detection And Response Booms In 2017

    Cyberattacks And Skill Shortages Drive MDR Demand
    July 21, 2017 | Jeff Pollard

    Managed detection and response (MDR) has emerged as a specific category of managed security services (MSS) in the last 12 months. Security and risk (S&R) pros thinking about investing in MDR...

  • For Security & Risk Professionals

    Report

    Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    July 18, 2017 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't hope to...

  • For Security & Risk Professionals

    Report

    Report Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels
    July 18, 2017 | Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't...

  • For Security & Risk Professionals

    Report

    Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Security Architecture And Operations Playbook
    July 5, 2017 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it is the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • For Security & Risk Professionals

    Report

    Report Top Competencies To Look For In An IAM Systems Integrator

    Cloud App Integration, Hosting, And Identity Management And Governance Skills Matter

    Systems integrators (SIs) are a crucial part of identity and access management (IAM) deployments. SIs bring valuable deployment and integration experience, and their vital advice on business...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

  • For Security & Risk Professionals

    Report

    Report Top Seven Recommendations For Your Security Program In 2017

    April 7, 2017 | Jeff Pollard, Amy DeMartine

    Each year, Forrester outlines important recommendations for a successful security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: The CIA — Good At Spying, Bad At Data Loss Prevention

    Key Takeaways From The WikiLeaks Revelations Of Widespread CIA Device-Hacking
    March 10, 2017 | Jeff Pollard

    This week, controversial media organization WikiLeaks released a trove of leaked documents purporting to prove the existence of a sophisticated covert US Central Intelligence Agency (CIA) hacking...

  • For Security & Risk Professionals

    Report

    Report Lessons From The Forrester Wave™: MSSPs, North America, Q3 2016

    The Characteristics Of Successful And Unsuccessful MSSP Engagements
    February 28, 2017 | Jeff Pollard, Claire O'Malley

    Despite the relative maturity of the managed security services provider (MSSP) market, customers and vendors far too often fail to sync up as true, successful partners. This report delves into the...

  • For Security & Risk Professionals

    Report

    Report Design Mobile Security Metrics With Mobile Moments In Mind

    Performance Management: The Mobile Security Playbook
    February 13, 2017 | Jeff Pollard

    Security leaders struggling to demonstrate business value need to incorporate mobile security metrics into their reports. As companies adopt the mobile mind shift, mobile security metrics are often...

  • For Security & Risk Professionals

    Report

    Report Security Budgets 2017: Increases Help But Remain Reactionary

    Benchmarks: The S&R Practice Playbook
    November 23, 2016 | Jeff Pollard

    Skyrocketing budget numbers might lead security leaders to believe that good times have finally arrived. But security spending's continued climb as a percentage of IT budgets hides the disruption...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Symantec Injects New Life Into Its Consumer Security With LifeLock Acquisition

    Symantec Becomes One Of The Few Firms To Bridge Enterprise And Consumer Security And Privacy
    November 22, 2016 | Andras Cser, Jeff Pollard, Heidi Shey

    On November 21, Symantec announced its acquisition of LifeLock for $2.3 billion. This signals a significant reinvestment in Symantec's consumer security portfolio and an expansion into new consumer...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Network Threat Mitigation Technologies, Q4 2016

    October 28, 2016 | John Kindervag, Jeff Pollard, Joseph Blankenship

    This TechRadar™, the road map document of the security architecture and operations playbook, defines the use cases, business value, and outlook for the 20 technologies that comprise the most...

Content categories

Refine your results

Date Range

Industry

Topics

Methodology

Region

Vendor

Market Imperatives