21 results in Everything
 
Sort by:
Refine
  • Governance Risk & Compliance (GRC)
  • Paul McKay

Featured content

The Governance, Risk, And Compliance Playbook For 2019

Take On More Business Risk Using A World-Class GRC Program

Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...

Search Results

  • Report Master Your Security Service Catalog

    Processes: The S&R Practice Playbook
    October 10, 2019 | Paul McKay

    CISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. But too many CISOs focus only on delivering technical controls, which results in a...

  • Report Get Fighting Fit For EU's NISD

    First EU Cybersecurity Regulation Has Mixed Response In First Year Of Operation
    September 5, 2019 | Paul McKay

    In May 2018, the EU Network Information Security Directive (NISD) came into force. Over the past 12 months, regulators and competent authorities have been working with industry to determine a...

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Report Improve Open Banking Customer Authentication Experiences With Biometrics

    Improving Payment Security Must Not Sacrifice Customer Experience
    May 10, 2019 | Paul McKay

    The introduction of the second Payment Services Directive (PSD2) on January 13, 2018 revolutionized the European financial services industry. In 2019, financial services professionals will focus on...

  • Webinar European Security Market Trends In 2019

    May 7, 2019 | Paul McKay

    Security leaders in Europe aren’t just grappling with the constantly changing security threat landscape. Budgetary pressures are starting to bite as economic growth slows down. CISOs will...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Optimize Cybersecurity And Privacy Oversight

    Advanced Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Renee Murphy, Nick Hayes, Paul McKay

    Firms with advanced-level oversight for cybersecurity and privacy are rare, but despite their strong efforts, they can't become complacent. Regulatory requirements, threats, business models, and...

  • Report Elevate Cybersecurity And Privacy Oversight

    Intermediate Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Paul McKay, Renee Murphy, Nick Hayes

    Firms with intermediate cybersecurity and privacy oversight have a solid foundation and are seeking to extend their influence in the organization. By strengthening strategy, governance, adherence...

  • Report Partner With European Security Startups To Protect Your Business

    How To Capitalize On The Market's Best New Innovations
    December 28, 2018 | Paul McKay

    In addition to more-traditional venture funding, investors and governments across Europe have spent big to set up security incubators and accelerators, and their efforts have resulted in some true...

  • Report All The Fun Of The Fair: Lessons From Infosec Europe 2018

    Basic Security Hygiene Is Back In Vogue
    September 20, 2018 | Paul McKay, Enza Iannopollo

    Early June in London saw thousands of cybersecurity professionals gather for the Infosecurity 2018 conference, the largest event of its kind in Europe. The event is a carnival of the cybersecurity...

  • Report Planning For Failure: How To Survive A Breach

    Organization: The Zero Trust Security Playbook

    Cybercriminals are using more-sophisticated attacks to steal valuable intellectual property and the personal data of your customers, partners, and employees. Their motivations run the gamut from...

Content Type

Apply

Filters

Industry

Primary Role

Methodology

Region