26 results in Reports
 
Sort by:
Refine
  • Security & Risk
  • Risk Management

Featured content

The Governance, Risk, And Compliance Playbook For 2019

Take On More Business Risk Using A World-Class GRC Program

Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...

Search Results

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Report Forrester Analytics: IAM Software Forecast, 2018 To 2023 (Global)

    ForecastView Document

    Identity and access management (IAM) software tools help digital businesses provide access to employees, partners, and customers without sacrificing security or user experience. This data-driven...

  • Report Video: Protect Your Organization From Business Email Compromise (BEC) Attacks

    Watch Our Video To Understand A Real-Life BEC Attack And How To Protect Against These Frauds And Scams
    May 8, 2019 | Josh Zelonis, Andrew Hogan

    Alongside other scams, fraudsters and cybercriminals use business email compromise (BEC) attacks to convince unwitting employees to wire money, grant access to payment accounts, or share sensitive...

  • Report Harden Your Human Firewall

    Engagement And Communication Tactics That Strengthen Security Culture
    March 25, 2019 | Jinan Budge, Claire O'Malley

    Building a strong security culture is no easy task. It requires strategy, vision, people, and the right attitude to change behavior and set a cultural shift in motion. This report highlights some...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report The Security Of Cryptocurrencies

    Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
    February 13, 2019 | Andras Cser, Heidi Shey, Jeff Pollard

    Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

  • Report Now Tech: Security Awareness And Training Solutions, Q1 2019

    Forrester's Overview Of 20 Security Awareness And Training Solution Providers
    January 23, 2019 | Jinan Budge, Claire O'Malley

    You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...

  • Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018

    Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
    December 18, 2018 | Merritt Maxim

    You can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...

  • Report The State Of Risk Management 2018

    Benchmarks: The Governance, Risk, And Compliance Playbook
    November 30, 2018 | Christopher McClean, Trevor Lyness

    Executives must take big bets on new technologies, business models, and emerging markets to stay ahead of the fast pace of competition. With so much at stake and so many public examples of...

  • Report Beware The Coming Data Integrity Crisis

    Data Tampering Will Threaten Your Digital Transformation

    Insights-driven businesses are growing at eight times the rate of global GDP and will earn more than $1.8 trillion by 2021. As organizations rush to capitalize on the value of data, security...

  • Report Transform Your Cybersecurity Capability

    How To Stay Ahead Of Rapidly Evolving Business, Technology, And Threat Landscapes
    August 2, 2018 | Jinan Budge

    As businesses become more digitized and interconnected, the impact cyberattacks have on brand value, customer trust, and physical safety increases. Yet many firms still underinvest in security,...

  • Report The Forrester New Wave™: Digital Risk Protection, Q3 2018

    The 14 Providers That Matter Most And How They Stack Up
    July 17, 2018 | Nick Hayes

    In Forrester's evaluation of the emerging market for digital risk protection (DRP), we identified the 14 most significant providers in the category — Axur, Blueliv, CTM360, CyberInt, Cyxtera,...

  • Report Planning For Failure: How To Survive A Breach

    Organization: The Zero Trust Security Playbook

    Cybercriminals are using more-sophisticated attacks to steal valuable intellectual property and the personal data of your customers, partners, and employees. Their motivations run the gamut from...

  • Report Protect Your Extended Ecosystem With Third-Party Cyber-Risk Scoring

    Continually Quantify The Cyber Risk Of Your Third Parties For Actionable Insights
    July 3, 2018 | Nick Hayes, Claire O'Malley, Renee Murphy

    Managing the cybersecurity postures of your third parties is a crucial aspect of risk management. Third-party cyber-risk-scoring solutions are helping S&R pros identify, measure, and mitigate the...

  • Report Forrester's Risk-Centric Identity And Access Management Process Framework

    Processes: The Identity And Access Management Playbook
    June 15, 2018 | Merritt Maxim, Andras Cser

    Identity and access management (IAM) processes get complex and convoluted, which makes it challenging to protect against new or emerging threats and creates a range of consequences for customers...

  • Report New Tech: Digital Risk Protection, Q2 2018

    Forrester's Landscape Overview Of 21 DRP Solutions
    June 8, 2018 | Nick Hayes

    The digital risk protection (DRP) market is taking off. New vendors, major venture capital (VC) funding, and fast-paced growth all reflect swelling demand. Through persistent monitoring and...

  • Report Your Guide To Cyberinsurance

    Examining The Market And Your Options For Covering Cyber Risk
    June 6, 2018 | Heidi Shey, Nick Hayes

    Security pros now have access to a robust, necessary, but still nebulous cyberinsurance market. Before you select a policy, you'll have to determine your company's cybervalue at risk and what kind...

  • Report The Forrester Tech Tide™: Risk And Compliance Management, Q2 2018

    14 Technologies Underpin Risk And Compliance Efforts
    May 1, 2018 | Nick Hayes

    Companies today face unprecedented risk velocity and volatility. Digital disruption, cyberattacks, vulnerable third parties, and geopolitical instability — this is just a sampling of issues that...

  • Report Manage Third-Party Risk To Achieve And Maintain GDPR Compliance

    April 19, 2018 | Enza Iannopollo, Alexander Spiliotes

    It doesn't matter if third parties supply you with data, technology, or services: If they touch your customers' or employees' personal data, their security and privacy postures directly affect your...

  • Report Top Recommendations For Your Security Program, 2018

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report The Forrester Wave™: Vulnerability Risk Management, Q1 2018

    The 12 Providers That Matter Most And How They Stack Up
    March 14, 2018 | Josh Zelonis

    In our 22-criteria evaluation of vulnerability risk management (VRM) providers, we identified the 12 most significant ones — Beyond Security, BeyondTrust, Digital Defense, IBM, Kenna Security,...

  • Report Define And Articulate The Role Of Risk Management

    Processes: The Governance, Risk, And Compliance Playbook
    January 25, 2018 | Christopher McClean

    As a risk professional, you are now in a position to exert more influence on your firm and increase the value your team offers, but if your efforts are unfocused, determining success will be...

  • Report The State Of Risk Management 2017

    December 5, 2017 | Christopher McClean

    Executives must take big bets on new technologies, business models, and emerging markets to stay ahead of the fast pace of competition. With so much at stake and so many public examples of...

  • Report Vendor Landscape: Third-Party Risk Intelligence

    Products Vie To Augment Your Survey-Based Program
    October 20, 2017 | Claire O'Malley, Nick Hayes

    Increasing business reliance on third-party ecosystems, coupled with worsening market volatility and threats, is forcing risk professionals to manage third-party risk at a new level. Point-in-time...