1,238 results in Everything
 
Sort by:
Refine
  • Security & Risk

Search Results

  • Forum Privacy & Security 2019

    The Technology of Trust
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Webinar European Security Market Trends In 2019

    Tuesday, May 7, 2019, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Paul McKay

    Security leaders in Europe aren’t just grappling with the constantly changing security threat landscape. Budgetary pressures are starting to bite as economic growth slows down. CISOs will...

  • Report The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2019

    The 15 Providers That Matter Most And How They Stack Up
    March 18, 2019 | Josh Zelonis

    In our 11-criterion evaluation of cybersecurity incident response services providers, we identified the 15 most significant ones — Aon, Booz Allen Hamilton, CrowdStrike, Cylance, Deloitte, EY,...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report The Forrester Wave™: Managed Security Services In Asia Pacific, Q1 2019

    The 11 Providers That Matter Most And How They Stack Up
    March 13, 2019 | Jinan Budge

    In our 28-criterion evaluation of managed security service providers (MSSPs) in Asia Pacific (AP), we identified the 11 most significant ones — Accenture, Deloitte, EY, IBM, Orange Cyberdefense,...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report Recruiting And Retaining Insider Threat Analysts

    To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts
    March 7, 2019 | Joseph Blankenship

    Whether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need...

  • Report Throw Away Your Current Application Security Metrics

    Match Application Security Metrics To Developer Speed
    March 1, 2019 | Amy DeMartine, Jeff Pollard

    Applications underpin customer engagement, but they also are the top external attack method for breaches. To avoid launching efforts that waste time, effort, and money, security leaders need...

  • Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019

    Forrester's Landscape Overview Of 21 Providers
    February 28, 2019 | Merritt Maxim, Joseph Blankenship

    A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...

  • Report How Insiders Use The Dark Web To Sell Your Data

    Financial Services Firms Need To Prioritize Monitoring For Insider Threats
    February 28, 2019 | Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report The Forrester MITRE ATT&CK Evaluation Guide

    An Objective Analysis Of The Evaluation And How To Interpret The Results
    February 27, 2019 | Josh Zelonis

    In an industry desperate for objective efficacy testing, the introduction of the MITRE ATT&CK evaluation of endpoint detection and response (EDR) security products is a much-welcomed event....

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report The Security Of Cryptocurrencies

    Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
    February 13, 2019 | Andras Cser, Heidi Shey, Jeff Pollard

    Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...

  • Report The State Of Business Continuity, 2018

    Risk Pros Are Expanding BC To Include Most Operational Risks
    February 11, 2019 | Stephanie Balaouras, Salvatore Schiano

    As 100-year floods and cyberattacks grow more frequent, and as organizations become completely dependent on complex technology, business continuity (BC) preparedness must be a cornerstone of a...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

  • Webinar Customer Call Centers: Dos And Don'ts

    February 7, 2019 | Andras Cser

    When we have the online channels (e.g., web, mobile app, etc.) all secured, fraudsters turn to the customer call center as an avenue to commit fraud. This webinar explains key types of fraud, best...

  • Report Build Your Security Organization

    Organization: The S&R Practice Playbook
    January 31, 2019 | Jeff Pollard, Paul McKay

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. This report examines key organizational challenges...

  • Report Use Advanced Encryption For Data Security

    Landscape: The Data Security And Privacy Playbook
    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

  • Report GRC Vision, 2019 To 2024

    Vision: The Governance, Risk, And Compliance Playbook
    January 25, 2019 | Renee Murphy, Christopher McClean

    Risk management professionals are used to helping steer their organizations through uncertainty, and as fast as business and technology are advancing, they should be looking five years into the...

  • Report The Future Of Endpoint Protection, 2019 To 2024

    Endpoint Security Will Focus On Apps' And Users' Behavior
    January 24, 2019 | Chris Sherman

    Security leaders have struggled for the past 20 years to balance effective endpoint security with good employee experience, and this challenge will only get tougher as attacks and technologies...

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Playbook The Governance, Risk, And Compliance Playbook For 2019

    Maximize Business Performance With A World-Class GRC Program

    Governance, risk, and compliance (GRC) programs are essential for protecting business value and maximizing business performance. Yet too many organizations lack well-defined GRC programs or neglect...

  • Report Now Tech: Security Awareness And Training Solutions, Q1 2019

    Forrester's Overview Of 20 Security Awareness And Training Solution Providers
    January 23, 2019 | Jinan Budge, Claire O'Malley

    You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...

Content Type

Apply

Filters

Region