249 results in Reports
 
Sort by:
Refine
  • Security & Risk

Search Results

  • Report Gauge Your ZTX Security Maturity

    Assessment: The Zero Trust Security Playbook
    October 11, 2019 | Chase Cunningham

    To convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...

  • Report Master Your Security Service Catalog

    Processes: The S&R Practice Playbook
    October 10, 2019 | Paul McKay

    CISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. But too many CISOs focus only on delivering technical controls, which results in a...

  • Report Secure What You Sell: CISOs Must Tackle Product Security To Protect Customers

    October 8, 2019 | Jeff Pollard, Amy DeMartine

    Today's mature enterprise security programs excel at securing infrastructure. Product security is different; it begins with minimum viable security during early-stage development and must extend to...

  • Report Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook
    October 7, 2019 | Andras Cser, Sean Ryan

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility,...

  • Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Zero Trust Security Playbook
    October 4, 2019 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • Report Best Practices: Phishing Prevention

    Protect Against Email-Borne Threats With Forrester's Layered Approach
    September 30, 2019 | Joseph Blankenship, Claire O'Malley

    Attackers use phishing and other social engineering tactics to infiltrate corporate networks. Advances in malicious email protection can recognize and stop obvious phishing attempts, but...

  • Report Gauge Your Data Security And Privacy Maturity

    Assessment: The Data Security And Privacy Playbook
    September 27, 2019 | Enza Iannopollo, Heidi Shey

    To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost, to one that champions privacy and uses its technology...

  • Report Take On More Business Risk Using A World-Class GRC Program

    Executive Overview: The Governance, Risk, And Compliance Playbook
    September 27, 2019 | Amy DeMartine

    Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Zero Trust Security Playbook
    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report The Forrester Wave™: Anti-Money Laundering Solutions, Q3 2019

    The Eight Providers That Matter Most And How They Stack Up
    September 24, 2019 | Andras Cser

    In our 32-criterion evaluation of anti-money laundering (AML) solution providers, we identified the eight most significant ones — ACI, BAE Systems, Featurespace, Feedzai, FICO TONBELLER,...

  • Report The Forrester Wave™: Endpoint Security Suites, Q3 2019

    The 15 Providers That Matter Most And How They Stack Up
    September 23, 2019 | Chris Sherman

    In our 25-criterion evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bitdefender, BlackBerry Cylance, Carbon Black, Check Point, Cisco, CrowdStrike,...

  • Report The Forrester MITRE ATT&CK Evaluation Guide

    An Objective Analysis Of The Evaluation And How To Interpret The Results
    September 17, 2019 | Josh Zelonis

    In an industry desperate for objective efficacy testing, the introduction of the MITRE ATT&CK evaluation of endpoint detection and response (EDR) security products is a much-welcomed event....

  • Report Forrester's Identity And Access Management Maturity Assessment

    Assessment: The Identity And Access Management Playbook
    September 12, 2019 | Merritt Maxim, Andras Cser

    Security leaders often struggle to understand the gaps and potential security vulnerabilities in the broad range of identity and access management (IAM) functional areas such as identity...

  • Report Get Fighting Fit For EU's NISD

    First EU Cybersecurity Regulation Has Mixed Response In First Year Of Operation
    September 5, 2019 | Paul McKay

    In May 2018, the EU Network Information Security Directive (NISD) came into force. Over the past 12 months, regulators and competent authorities have been working with industry to determine a...

  • Report Now Tech: eDiscovery Service Providers, Q3 2019

    Forrester's Overview Of 35 eDiscovery Service Providers
    September 4, 2019 | Heidi Shey

    You can use eDiscovery service providers to boost expertise, speed, and scale of eDiscovery-related operations, benefit from best-fit technologies for your requirements, and optimize overall...

  • Report Assess Your Security Program With Forrester's Information Security Maturity Model

    Mature Your Information Security Program To Protect Your Brand
    September 4, 2019 | Renee Murphy

    CISOs often struggle to articulate the full scope of their security responsibilities, prioritize their various initiatives, develop a coherent strategy, and connect their value to the business. In...

  • Report Gauge Your Information Security Maturity

    Assessment: The S&R Practice Playbook
    September 4, 2019 | Renee Murphy

    Information security is a complex discipline, and CISOs are responsible for compiling a vast array of controls and standards to plot a road map for improvements. However, CISOs can't determine a...

  • Report Assess Your GRC Program With Forrester's GRC Maturity Model

    Create A More Agile Organization By Maturing Your GRC Program
    August 22, 2019 | Renee Murphy, Alla Valente

    The Forrester GRC Maturity Model helps risk management professionals objectively assess their GRC efforts to identify areas of weakness as well as centers of excellence, then outline a strategy to...

  • Report Gauge Your GRC Program Maturity

    Assessment: The Governance, Risk, And Compliance Playbook
    August 22, 2019 | Renee Murphy, Alla Valente

    Risk management pros must objectively assess their governance, risk and compliance (GRC) program to identify gaps and highlight strengths to successfully create a road map for improvements. This...

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Report Lessons Learned From The Latest HIPAA Security And Privacy Incidents

    As Fines Reach Into The Millions, It's Time For Healthcare To Move Beyond Minimal Compliance Efforts
    July 31, 2019 | Chris Sherman

    The healthcare industry experienced several high-profile data breaches and security incidents in 2018, leading to the loss of personal information on millions of patients and millions in fines. We...

  • Report Protect Whistleblowers For Business Success

    A Guide To Legitimizing And Safeguarding Corporate Whistleblowers In Today's Digital Workplace
    July 31, 2019 | Alla Valente

    Whistleblowers are an essential safety valve in ethical corporate culture. They provide a mechanism for healthy corporate governance by exposing fraud and corruption and, more recently, revealing...

  • Report New Tech: Cyber Ranges, Q3 2019

    Forrester's Landscape Overview Of 14 Providers
    July 30, 2019 | Jeff Pollard, Claire O'Malley

    Cyber ranges use a simulated breach environment to prepare your workforce for the stress, panic, and communication barriers they will face during a real cyberattack. In an inevitable cyberattack,...

  • Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management

    Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
    July 25, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...

  • Report The Forrester Tech Tide™: Data Security And Privacy, Q3 2019

    Tools And Technology: The Data Security And Privacy Playbook
    July 22, 2019 | Heidi Shey, Enza Iannopollo

    Data security and privacy is critical to firms' ability to win, serve, and retain their customers. To protect sensitive data, meet compliance, and continue to mature their practices for data...

Content Type

Apply

Filters

Region