Charts & Figures
-
Planned Investments By Budget Range And Deployment Type
December 17, 2018
-
Security Services Spending Overtakes Product Spending
December 17, 2018
-
Search Results
-
Forum Privacy & Security 2019
The Technology of Trust
Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...
-
Report The Security Of Cryptocurrencies
Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...
-
Report Build Your Security Organization
Organization: The S&R Practice Playbook
CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. This report examines key organizational challenges...
-
Webinar Beware Of And Prepare For The Coming Data Integrity Crisis
Companies increasingly rely on data and automated decision making to transform their business. This, however, means that the impact of a data integrity attack – where an attacker alters...
-
Report How To Talk To Your Board About Cybersecurity
Best Practices And Template For Board Presentations
Whether there to answer questions, give a status update, or build support, security leaders need to make the most out of each opportunity they get in front of their board of directors. This report...
-
Report Security Budgets 2019: The Year Of Services Arrives
Benchmarks: The S&R Practice Playbook
December 17, 2018 | Jeff PollardThis report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...
-
Report Justify Security Budget By Its Impact On Maturity
Business Case: The S&R Practice Playbook
December 10, 2018 | Jeff PollardSecurity leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...
-
Report Maintain Your Security Edge
Continuous Improvement: The Security Architecture And Operations Playbook
New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...
-
Blog Marriott Breach: Starwood Hacker Gains Access To 500 Million Customer Records
November 30, 2018 | Jeff PollardAnother Friday, Another Breach Announcement Today, Marriott announced that it uncovered four-plus years of a previously unknown, unexpected, and unauthorized data breach that includes travel...
-
Report Use Forrester's CISO Strategic Canvas To Align Security With Business
Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...
-
Report The Forrester Wave™: Managed Security Services Providers (MSSPs), Europe, Q4 2018
The 14 Providers That Matter Most And How They Stack Up
In our 26-criterion evaluation of European managed security service providers (MSSPs) we identified the 14 most significant ones —Accenture, Atos, BT, Capgemini, Deloitte, Fujitsu, IBM, NTT, Orange...
-
Report Remove The Mystery From Security Metrics
Performance Management: The S&R Practice Playbook
November 16, 2018 | Jeff PollardDifficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't participate in...
-
Blog The Fight For Cybersecurity Brand Dominance Intensifies
November 16, 2018 | Jeff Pollard“Everything Is An Endpoint” Brings BlackBerry Back From The Dead For many, the fact that BlackBerry still exists — and the fact that it spent $1.4 billion of the $2.4 billion in capital...
-
Report Predictions 2019: Cybersecurity
The US-China Trade War Will Revive Corporate Espionage Attacks Around The World
The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and...
-
Report Predictions 2019: Privacy And Data Ethics
Entitled Consumers Will Force Firms To Course Correct Poor Practices
The marketing-privacy ecosystem is about to change — again. If 2018 was the year of regulatory action, then 2019 will be the year of consumer action. This will open new opportunities for brands...
-
Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses
Intermediate Level: Technology Practices For Cybersecurity And Privacy
CIOs and technology leaders in the intermediate phase of the journey to cybersecurity and privacy maturity must ensure that security travels with the data and position data security and privacy as...
-
Report Drive Growth With Customer Trust And Build Brand Resilience
Advanced Level: Technology Practices For Cybersecurity And Privacy
When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to move...
-
Report Beware The Coming Data Integrity Crisis
Data Tampering Will Threaten Your Digital Transformation
Insights-driven businesses are growing at eight times the rate of global GDP and will earn more than $1.8 trillion by 2021. As organizations rush to capitalize on the value of data, security...
-
Report Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats
Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences
Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to...
-
Report The Forrester Wave™: Emerging Managed Security Services Providers (MSSPs), Q3 2018
The 10 Providers That Matter Most And How They Stack Up
In our 24-criterion evaluation of the emerging managed security services providers (MSSPs) market, we identified the 10 most significant providers — Capgemini, CyberProof, InteliSecure, Kudelski...
-
Report The Eight Business And Security Benefits Of Zero Trust
Business Case: The Security Architecture And Operations Playbook
In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...
-
Report The Forrester Wave™: Global Managed Security Services Providers (MSSPs), Q3 2018
The 14 Providers That Matter Most And How They Stack Up
In our 23-criteria evaluation of global managed security services providers (MSSPs), we identified the 14 most significant ones — Accenture, Alert Logic, AT&T Business, BAE Systems, CenturyLink,...
-
Report The Top Five Emerging Technologies Security Leaders Need To Prepare For
Tools And Technology: The S&R Practice Playbook
June 21, 2018 | Jeff PollardHigh-stakes technology implementations and digital transformations with board-level visibility are moving faster than traditional security programs can handle. CISOs need to understand the reasons...
-
Blog Early Horror Stories Of The Data Economy
May 3, 2018 | Jeff PollardWhen salacious tales of Cambridge Analytica’s activities emerged in 2018, we thought the company was finished. The many on-air discussions of illegal activities, law enforcement warrants, legal...