12 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Security Operations & Program Governance
  • North America
  • Heidi Shey

Featured content

The Zero Trust Security Playbook For 2020

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Forum Security & Risk 2019

    A New Hope
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Report Maintain Your Security Edge

    Continuous Improvement: The Zero Trust Security Playbook
    December 6, 2018 | Heidi Shey, Jeff Pollard, Claire O'Malley

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • Report Planning For Failure: How To Survive A Breach

    Organization: The Zero Trust Security Playbook

    Cybercriminals are using more-sophisticated attacks to steal valuable intellectual property and the personal data of your customers, partners, and employees. Their motivations run the gamut from...

  • Report Develop Effective Security And Privacy Policies

    Policy: The Data Security And Privacy Playbook
    March 29, 2018 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...