110 results in Everything
 
Sort by:
Refine
  • Security Operations & Program Governance
  • Secure customers, protect the brand

Featured content

The Security Architecture And Operations Playbook For 2019

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Forum Privacy & Security 2019

    The Technology of Trust
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report How Insiders Use The Dark Web To Sell Your Data

    Financial Services Firms Need To Prioritize Monitoring For Insider Threats
    February 28, 2019 | Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report Build Your Security Organization

    Organization: The S&R Practice Playbook
    January 31, 2019 | Jeff Pollard, Paul McKay

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. This report examines key organizational challenges...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...

  • Report Build A High-Performance, Customer-Obsessed Security Organization

    Executive Overview: The S&R Practice Playbook
    January 16, 2019 | Christopher McClean

    CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...

  • Report Build A Strong Process Foundation For Cybersecurity And Privacy

    Beginner Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Claire O'Malley

    To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...

  • Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success

    Advanced Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Stephanie Balaouras

    CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...

  • Report Elevate Cybersecurity And Privacy With Process Metrics

    Intermediate Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Salvatore Schiano

    The intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...

  • Report Define A Road Map To Accelerate Your Security Program

    Road Map: The S&R Practice Playbook
    January 8, 2019 | Christopher McClean

    Turning strategy into action reveals a CISO's worth. A solid security road map is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...

  • Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019

    Tools And Technology: The Security Architecture And Operations Playbook
    January 2, 2019 | Josh Zelonis, Joseph Blankenship

    Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...

  • Report Partner With European Security Startups To Protect Your Business

    How To Capitalize On The Market's Best New Innovations
    December 28, 2018 | Paul McKay

    In addition to more-traditional venture funding, investors and governments across Europe have spent big to set up security incubators and accelerators, and their efforts have resulted in some true...

  • Report How To Talk To Your Board About Cybersecurity

    Best Practices And Template For Board Presentations
    December 28, 2018 | Jeff Pollard, Jinan Budge, Paul McKay

    Whether there to answer questions, give a status update, or build support, security leaders need to make the most out of each opportunity they get in front of their board of directors. This report...

  • Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018

    Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
    December 18, 2018 | Merritt Maxim

    You can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...

  • Report Top Enterprise Fraud Management And Anti-Money-Laundering Trends

    Consortium, Third-Party, And Blockchain Data Integration Will Transform EFM And AML Solutions And Practices
    December 17, 2018 | Andras Cser

    While enterprise fraud management (EFM) and anti-money laundering (AML) are mature functions, regulatory pressures in Europe and advances in machine learning are rapidly and profoundly changing...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    December 10, 2018 | Jeff Pollard

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Estimate Breach Impact And Costs To Drive Investments

    Business Case: The Data Security And Privacy Playbook
    December 3, 2018 | Heidi Shey

    In today's climate, businesses are taking a hard look at the risks associated with data misuse and privacy missteps. For security, risk, and privacy professionals to build a business case for...

  • Report Set Risk And Compliance Accountability With Forrester's RASCI Tool

    Organization: The Governance, Risk, And Compliance Playbook
    November 29, 2018 | Nick Hayes

    This report helps risk professionals build and maintain an effective GRC stakeholder plan, outlining the major tasks and expectations for key leaders you will hold accountable for the success or...

  • Report The State Of Network Security: 2018 To 2019

    Benchmarks: The Security Architecture And Operations Playbook
    November 27, 2018 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2018 to...

  • Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    November 16, 2018 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't participate in...

  • Report Predictions 2019: Cybersecurity

    The US-China Trade War Will Revive Corporate Espionage Attacks Around The World
    November 5, 2018 | Amy DeMartine, Jeff Pollard, Heidi Shey

    The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and...

Content Type

Apply

Filters

Primary Role

Region

Vendor