Featured content
The Governance, Risk, And Compliance Playbook For 2017
Maximize Business Performance With A World-Class GRC Program
Governance, risk, and compliance (GRC) programs are essential for protecting business value and maximizing business performance. However, too many organizations lack well-defined GRC programs or...
Search Results
-
For CIO Professionals
Report
Report Tackle Five Key Areas Of Risk For Successful AI Projects
Create Clear Road Maps To Avoid Getting Burned
June 7, 2017 | Craig Le ClairMobile and social are still core enablers in the age of the customer, but the focus has shifted to the potential of artificial intelligence (AI) and automation to build next-generation customer...
-
For Security & Risk Professionals
Report
Report The Top Security Technology Trends To Watch, 2017
Tools And Technology: The S&R Practice Playbook
Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...
-
For B2C Marketing Professionals
Report
Report Social Crisis Management: Get Back To Basics
April 19, 2017 | Jessica LiuWith consumers more polarized than ever and increasingly showing their own values in the way they spend their money, brands worry about making missteps on social media and falling out of favor....
-
For eBusiness & Channel Strategy Professionals
Report
Report Disruptive Fintech Is Dead — Long Live Collaborative Fintech!
Takeaways From Global Fintech Hackcelerator And FinovateAsia 2016
January 23, 2017 | Zhi Ying NgDigital financial innovation shows no signs of abating, with a series of financial technology (fintech) startups placing Hong Kong and Singapore firmly on the innovation map. As FinovateAsia 2016...
-
For Security & Risk Professionals
Report
Report Develop Your Information Security Management System
Processes: The S&R Practice Playbook
The chief information security officer's (CISO) role is fraught with many challenges, including more sophisticated adversaries, a larger attack surface, increasing regulation, and customer demands....
-
For Application Development & Delivery Professionals
Report
Report Breakout Vendors: Domain-Specific Insights Service Providers
From CX To Risk Mitigation To Supply Chain: Context Matters
Despite the growing interest in all things data and analytics, many firms struggle to benefit from the insights revolution. Frustrated by the challenges of providing functional teams across the...
-
For Infrastructure & Operations Professionals
Report
Report Business Technology Resiliency Matters More Than Ever
A Multidimensional Approach Can Achieve Dependability When You Need It Most
Businesses are suffering increasing downtime due to technology failure or hacking events that are damaging their precious brands. Technology makes you competitive and improves the customer...
-
For Security & Risk Professionals
Report
Report Forrester's Risk-Driven Identity And Access Management Process Framework
Process: The Identity And Access Management Playbook
January 6, 2017 | Andras CserIdentity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...
-
For Security & Risk Professionals
Report
Report Understand The State Of Data Security And Privacy: 2016 To 2017
Benchmarks: The Data Security And Privacy Playbook
December 7, 2016 | Heidi SheyThroughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...
-
For Security & Risk Professionals
Report
Report Vendor Landscape: Software Composition Analysis
Security, Legal, And App Dev Pros Find Common Value In Dependency Management
October 21, 2016 | Amy DeMartineSoftware composition analysis (SCA) tools provide valuable data to security pros, legal pros, and app developers by identifying software vulnerabilities and exposing licenses for open source...
-
For Security & Risk Professionals
Report
Report Six Frameworks To Manage Your Big Data Privacy Concerns And Risks
Assess Your Data Practices And Protect Customer And Employee Privacy
October 21, 2016 | Heidi SheyAs companies store, process, and analyze vast amounts of data from email, social networks, sensors, IT systems, public data stores, and other sources, they need to be aware that much of it could be...
-
For CIO Professionals
Report
Report Brief: Brexit Makes Customer-Focused Innovation Imperative
While Uncertainty Continues, Focusing On Innovation Is Your Best Chance Of Success
Now that a timeline has been set for Brexit, every business operating in the UK is sure to face market uncertainty and volatility for at least the next three years. In our conversations with CIOs...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Digital Risk Monitoring, Q3 2016
The Nine Vendors That Matter Most And How They Stack Up
September 28, 2016 | Nick HayesIn our 27-criteria evaluation of digital risk monitoring (DRM) solutions, we identified the nine most significant ones — BrandProtect, Crisp Thinking, Digital Shadows, DigitalStakeout, ListenLogic,...
-
For Security & Risk Professionals
Report
Report Reconfigure Your Human Firewall
Continuous Improvement: The S&R Practice Playbook
September 22, 2016 | Martin WhitworthThe human element is a critical aspect of any security program, yet awareness initiatives are sporadic, with minimal, uninspired investment. Thus, easily avoided human mistakes too often render...
-
For Security & Risk Professionals
Report
Report Planning For Failure: How To Survive A Breach
An Effective Incident Management Program Is Essential To Help You Stay In Business
September 9, 2016 | John Kindervag, Josh ZelonisCybercriminals are using more sophisticated and targeted attacks to steal everything from valuable intellectual property to the sensitive personal information of your customers, partners, and...
-
For Application Development & Delivery Professionals
Report
Report Vendor Landscape: Supplier Risk And Performance Management
Software And Services Providers That Can Protect Your Brand From Suppliers' Mistakes
September 8, 2016 | Duncan JonesEnterprises struggle to manage the risk to their brands from suppliers' mistakes. Your customers expect you to choose suppliers that are efficient, safe, secure, ethical, and legal — and to have...
-
For Security & Risk Professionals
Report
Report Brand Resilience: Addressing The Critical Risks
How To Measure And Treat Risks To Your Reputation And Brand
In recent years, risk professionals' struggles with reputational risk have come front and center, with countless major brands suffering disastrous impacts to their reputations. Executives typically...
-
For Application Development & Delivery Professionals
Report
Report The Critical Role Of Policy In Enterprise Collaboration
Processes: The Enterprise Collaboration Playbook
March 4, 2016 | Craig Le ClairA clear collaboration policy is essential for employees using customer, partner, and internal collaboration tools. While it takes a cross-organizational team to establish a collaboration policy,...
-
For Security & Risk Professionals
Report
Report Build Digital Risk Insight
Improve Brand Resilience By Monitoring And Analyzing Data Across Social, Mobile, And Web Channels
February 27, 2016 | Nick HayesWhile sales, marketing, and other business functions have advanced tools and techniques to make the most of data across digital channels (including social, mobile, and web), risk functions have no...
-
For Security & Risk Professionals
Report
Report Define And Articulate The Role Of Risk Management
Processes: The Governance, Risk, And Compliance Playbook
February 22, 2016 | Christopher McCleanAs a risk professional, you are currently in a position to exert more influence on your organization and increase the value you and your team can offer. Don't take shortcuts when defining the...
-
For Security & Risk Professionals
Report
Report The State Of Business Continuity 2015: People And Communication
Part 3: Risk Pros Need To Prioritize The Human Aspects Of BC Preparedness
January 29, 2016 | Stephanie BalaourasA resilient company can absorb the impact of any unexpected event without failing to deliver on its brand promise. In this report, the third in a series highlighting the current state of business...
-
For Security & Risk Professionals
Report
Report TechRadar™: Risk Management, Q4 2015
December 1, 2015 | Nick HayesThe technology landscape for risk management is deeper and broader than we can ever remember — and this surge in valuable solutions couldn't be timelier. Risk pros face rising demands from the...
-
For Security & Risk Professionals
Report
Report Predictions 2016: Social Media Risk
Why Risk Pros Will Work Harder To Mitigate Reputational Risk
Social media is an important — and therefore risky — engagement channel for organizations. Companies looking to thrive in the age of the customer leverage social to strengthen their...
-
For Security & Risk Professionals
Report
Report The State Of Business Continuity 2015: Planning, Maintenance, And Exercises
Part 2: BC Plans Fail To Address Looming Cybersecurity And Third-Party Risks
October 8, 2015 | Stephanie BalaourasA resilient company can absorb the impact of any unexpected event without failing to deliver on its brand promise. In this report, the second in a series highlighting the current state of business...
-
For Security & Risk Professionals
Report
Report The State Of Business Continuity 2015: Mission, Priorities, Program Management, And Budgeting
Part 1: Risk Pros Are Putting The Business Back Into Business Continuity
August 28, 2015 | Stephanie BalaourasAs so-called "100-year floods" and cyberattacks grow more frequent, and as governments, healthcare providers, and businesses become completely dependent on complex technology, business continuity...
Content categories
- Reports (148)
- Events (9)
- Charts & Figures (176)
- Everything (333)
Refine your results
Date Range
- Past 6 months (5)
- Past 12 months (16)
- Past 18 months (21)
Primary Role
- Security & Risk (104)
- CIO (12)
- Infrastructure & Operations (12)
- Application Development & Delivery (10)
- Sourcing & Vendor Management (6)
- + Show All
- eBusiness & Channel Strategy (2)
- B2C Marketing (1)
Methodology
- Business Technographics (22)
- Forrester Wave (9)
- TechRadar (2)
- Total Economic Impact (TEI) (2)
- Vendor Landscape (2)
- + Show All
- Breakout Vendors (1)
Industry
- Financial Services (11)
- Healthcare (7)
- Manufacturing (7)
- Public Sector (5)
- Retail (1)
Market Imperatives
- Excel at customer-obsessed marketing (9)
- Differentiate with digital (7)
- Build an insights-driven organization (5)
- Drive revenue with great customer experience (5)
Region
- North America (24)
- Europe (16)
- Asia Pacific (3)
- Middle East (1)
Vendor
- Deloitte (4)
- SAP (3)
- BlackBerry (2)
- IBM (1)
- KPMG (1)
- + Show All
- Symantec (1)
- Tata Consultancy Services (TCS) (1)
Analyst
- Christopher McClean (37)
- Stephanie Balaouras (19)
- Nick Hayes (16)
- Heidi Shey (8)
- Renee Murphy (7)
- + Show All
- Andras Cser (5)
- Chris Sherman (5)
- Laura Koetzle (3)
- Amy DeMartine (2)
- Craig Le Clair (2)
- Eveline Oehrlich (2)
- Josh Zelonis (2)
- Dan Bieler (1)
- Duncan Jones (1)
- Elizabeth Cullen (1)
- Enza Iannopollo (1)
- Erna Alfred Liousas (1)
- Jeff Pollard (1)
- Jennifer Belissent, Ph.D. (1)
- Jessica Liu (1)
- Jim Nail (1)
- Joseph Blankenship (1)
- Jost Hoppermann (1)
- Marc Cecere (1)
- Merritt Maxim (1)
- Naveen Chhabra (1)
- Paul D. Hamerman (1)
- Sharyn Leaver (1)
- Sophia I. Vargas (1)
- Zhi Ying Ng (1)
