5 results in Reports
 
Sort by:
Refine
  • Heidi Shey
  • Security Operations & Program Governance
  • North America

Featured content

The Zero Trust Security Playbook For 2019

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report Maintain Your Security Edge

    Continuous Improvement: The Zero Trust Security Playbook
    December 6, 2018 | Heidi Shey, Jeff Pollard, Claire O'Malley

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • Report Planning For Failure: How To Survive A Breach

    Organization: The Zero Trust Security Playbook

    Cybercriminals are using more-sophisticated attacks to steal valuable intellectual property and the personal data of your customers, partners, and employees. Their motivations run the gamut from...

  • Report Develop Effective Security And Privacy Policies

    Policy: The Data Security And Privacy Playbook
    March 29, 2018 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...

  • Report Equifax Exposed Two Massive Systemic Risks

    Flaws In The Data Economy Will Make Future Breaches Even More Frequent And Damaging
    December 19, 2017 | Amy DeMartine, Jeff Pollard, Heidi Shey

    In September 2017, Equifax announced a breach of sensitive personal information of 143 million US consumers, as well as consumers in the UK and Canada. The scale and scope of the breach foretell...

  • Report The State Of Network Security: 2017 To 2018

    November 30, 2017 | Heidi Shey, Alexander Spiliotes

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2017 to...