8 results in Everything
 
Sort by:
Refine
  • Governance Risk & Compliance (GRC)
  • Jinan Budge

Featured content

The Governance, Risk, And Compliance Playbook For 2019

Maximize Business Performance With A World-Class GRC Program

Governance, risk, and compliance (GRC) programs are essential for protecting business value and maximizing business performance. Yet too many organizations lack well-defined GRC programs or neglect...

Search Results

  • Report Harden Your Human Firewall

    Engagement And Communication Tactics That Strengthen Security Culture
    March 25, 2019 | Jinan Budge, Claire O'Malley

    Building a strong security culture is no easy task. It requires strategy, vision, people, and the right attitude to change behavior and set a cultural shift in motion. This report highlights some...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Now Tech: Security Awareness And Training Solutions, Q1 2019

    Forrester's Overview Of 20 Security Awareness And Training Solution Providers
    January 23, 2019 | Jinan Budge, Claire O'Malley

    You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...

  • Report Transform Your Cybersecurity Capability

    How To Stay Ahead Of Rapidly Evolving Business, Technology, And Threat Landscapes
    August 2, 2018 | Jinan Budge

    As businesses become more digitized and interconnected, the impact cyberattacks have on brand value, customer trust, and physical safety increases. Yet many firms still underinvest in security,...

  • Report Planning For Failure: How To Survive A Breach

    Organization: The Zero Trust Security Playbook

    Cybercriminals are using more-sophisticated attacks to steal valuable intellectual property and the personal data of your customers, partners, and employees. Their motivations run the gamut from...

Content Type

Apply

Filters

Primary Role

Methodology

Region