27 results in Reports
 
Sort by:
Refine
  • Security & Risk
  • Business & IT Alignment

Search Results

  • Report Find Elusive Security Defects Using Bug Bounty Platforms

    Harness The Power Of Hackers To Protect Your Company's Applications
    July 15, 2019 | Amy DeMartine

    Apps continue to be the top method of attack for cybercriminals. Unfortunately, prerelease scanning and penetration testing services discover only known security flaw patterns or use a limited...

  • Report The Zero Trust eXtended (ZTX) Ecosystem

    Strategic Plan: The Zero Trust Security Playbook
    July 11, 2019 | Chase Cunningham

    In the past two years, Forrester's Zero Trust security has exploded in awareness and plans for adoption. We've reached this market inflection thanks to the categorical realization from both...

  • Report The US Healthcare Security Benchmark, 2018 To 2019

    Healthcare Pros Must Spend Wisely To Counter Increasing Complexity

    In the past, IT security teams within US healthcare providers had much smaller budgets than those within other industries. This is no longer the case, as budget increases in healthcare have come as...

  • Report How To Implement Zero Trust Security In Europe

    Large technology companies and the US Federal Government have adopted Zero Trust (ZT) as their next-generation security model. 2019 is the year that Zero Trust hits the mainstream in Europe....

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

  • Report The Zero Trust eXtended Ecosystem: Networks

    The Network Continues To Be A Critical Point Of Control In ZTX
    January 2, 2019 | Chase Cunningham

    Anywhere packets pass is a place that can offer cybercriminals command and control of critical network assets, but it can also enable better security and ultimately help to build a Zero Trust...

  • Report How To Talk To Your Board About Cybersecurity

    Best Practices And Template For Board Presentations
    December 28, 2018 | Jeff Pollard, Jinan Budge, Paul McKay

    Whether there to answer questions, give a status update, or build support, security leaders need to make the most out of each opportunity they get in front of their board of directors. This report...

  • Report Top Cybersecurity Threats In 2019

    Landscape: The Zero Trust Security Playbook
    December 11, 2018 | Josh Zelonis

    Security pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    December 10, 2018 | Jeff Pollard

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Build The Business Case For GRC

    Business Case: The Governance, Risk, And Compliance Playbook
    November 29, 2018 | Nick Hayes

    The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...

  • Report Use Forrester's CISO Strategic Canvas To Align Security With Business

    November 21, 2018 | Jeff Pollard, Jinan Budge

    Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...

  • Report Instill A Security Culture By Elevating Communication

    Continuous Improvement: The S&R Practice Playbook
    October 19, 2018 | Jinan Budge, Claire O'Malley

    Traditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...

  • Report Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences
    September 25, 2018 | Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to...

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Zero Trust Security Playbook
    August 24, 2018 | Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook
    August 2, 2018 | Andras Cser, Merritt Maxim

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility,...

  • Report Transform Your Cybersecurity Capability

    How To Stay Ahead Of Rapidly Evolving Business, Technology, And Threat Landscapes
    August 2, 2018 | Jinan Budge

    As businesses become more digitized and interconnected, the impact cyberattacks have on brand value, customer trust, and physical safety increases. Yet many firms still underinvest in security,...

  • Report Build A Governance, Risk, And Compliance Strategy Worthy Of Business Consideration

    Strategic Plan: The Governance, Risk, And Compliance Playbook
    July 20, 2018 | Renee Murphy

    Governance, risk, and compliance (GRC) are far too often functions of emergency response. To get your team and key stakeholders onboard and to show that all your efforts are helping your business...

  • Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    July 20, 2018 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • Report Develop Data Privacy Metrics That Matter To The Business

    Performance Management: The Data Security And Privacy Playbook
    April 24, 2018 | Enza Iannopollo

    A commitment to security and privacy enables firms to build trusted customer relationships that increase revenue. Security and privacy teams must establish data security and privacy programs that...

  • Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Zero Trust Security Playbook
    March 28, 2018 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • Report Security Budgets 2018: Financial Services And Insurance

    New Initiatives Require Security To Take An Expertise-On-Demand Approach
    March 22, 2018 | Jeff Pollard

    Data breaches, regulation, stiff competition for talent, and decentralized technology spending are still major challenges for security leaders in the FSI industry. We compare the budgets of...

  • Report Cultivate Culture For Sustained GRC Performance

    Continuous Improvement: The Governance, Risk, And Compliance Playbook
    March 15, 2018 | Nick Hayes

    A corporate culture with strong values is integral to governance, risk, and compliance (GRC) programs — and therefore to the entire company. This report explains how significantly culture affects...

  • Report The US Healthcare Security Benchmark 2017 To 2018

    Healthcare Providers Must Improve Security For Digital Transformation
    January 17, 2018 | Salvatore Schiano, Chris Sherman

    IT security budgets at US healthcare organizations have lagged behind other industries. In a highly regulated industry, budget constraints have made compliance challenging and impeded security...

  • Report Top Cybersecurity Threats In 2018

    November 27, 2017 | Josh Zelonis

    Security and risk (S&R) professionals have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for...

  • Report Construct A Business Case For Interactive Application Security Testing

    How Faster App Releases At Reduced Cost Make IAST Worthwhile
    November 3, 2017 | Amy DeMartine

    As software delivery times speed up, security professionals are trying to fit repeatable security testing into shrinking software delivery life cycles. Rather than depending on a crawler to assess...