1,266 results in Everything
 
Sort by:
Refine
  • Security & Risk

Search Results

  • Webinar Secure What You Sell: Director's Cut

    Tuesday, October 29, 2019, 11:00 a.m.-12:00 p.m. Eastern time (15:00-16:00 GMT) | Amy DeMartine, Jeff Pollard

    Securing the products and services their companies sell offers a mechanism for CISOs to contribute to their firms' goals. This webinar helps CISOs understand the world of product security and how...

  • Webinar Endpoint Security Strategy: How To Choose The Right Suite

    Using The Forrester Wave™
    Tuesday, October 29, 2019, 1:00 p.m.-1:45 p.m. Eastern time (17:00-17:45 GMT) | Chris Sherman, Matthew Flug

    Is your enterprise endpoint security strategy in need of a refresh? In this webinar, Forrester discusses the evolution of the modern endpoint security suite and how to choose the right solution in...

  • Webinar Tactics For Maximizing Cybersecurity Risk Ratings Solutions

    Tuesday, October 15, 2019, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Paul McKay, Trevor Lyness

    Cybersecurity risk ratings solutions are becoming a core part of enterprise security and third-party security programs of global companies. Join this webinar to learn the best practices and tactics...

  • Webinar When Ransomware Strikes: How To Make The Ransom Payment Decision

    Tuesday, October 8, 2019, 2:00 p.m.-2:40 p.m. Eastern time (19:00-19:40 GMT) | Trevor Lyness, Josh Zelonis

    Ransomware attacks on businesses are increasing. And no one wants to pay a ransom when ransomware strikes. However, if ransomware has your business’ operations in a vise, you may find...

  • Report The Forrester Wave™: Endpoint Security Suites, Q3 2019

    The 15 Providers That Matter Most And How They Stack Up
    September 23, 2019 | Chris Sherman

    In our 25-criterion evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bitdefender, BlackBerry Cylance, Carbon Black, Check Point, Cisco, CrowdStrike,...

  • Report The Forrester MITRE ATT&CK Evaluation Guide

    An Objective Analysis Of The Evaluation And How To Interpret The Results
    September 17, 2019 | Josh Zelonis

    In an industry desperate for objective efficacy testing, the introduction of the MITRE ATT&CK evaluation of endpoint detection and response (EDR) security products is a much-welcomed event....

  • Report Forrester's Identity And Access Management Maturity Assessment

    Assessment: The Identity And Access Management Playbook
    September 12, 2019 | Merritt Maxim, Andras Cser

    Security leaders often struggle to understand the gaps and potential security vulnerabilities in the broad range of identity and access management (IAM) functional areas such as identity...

  • Forum Security & Risk 2019

    A New Hope
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Report Get Fighting Fit For EU's NISD

    First EU Cybersecurity Regulation Has Mixed Response In First Year Of Operation
    September 5, 2019 | Paul McKay

    In May 2018, the EU Network Information Security Directive (NISD) came into force. Over the past 12 months, regulators and competent authorities have been working with industry to determine a...

  • Report Now Tech: eDiscovery Service Providers, Q3 2019

    Forrester's Overview Of 35 eDiscovery Service Providers
    September 4, 2019 | Heidi Shey

    You can use eDiscovery service providers to boost expertise, speed, and scale of eDiscovery-related operations, benefit from best-fit technologies for your requirements, and optimize overall...

  • Report Assess Your Security Program With Forrester's Information Security Maturity Model

    Mature Your Information Security Program To Protect Your Brand
    September 4, 2019 | Renee Murphy

    CISOs often struggle to articulate the full scope of their security responsibilities, prioritize their various initiatives, develop a coherent strategy, and connect their value to the business. In...

  • Report Gauge Your Information Security Maturity

    Assessment: The S&R Practice Playbook
    September 4, 2019 | Renee Murphy

    Information security is a complex discipline, and CISOs are responsible for compiling a vast array of controls and standards to plot a road map for improvements. However, CISOs can't determine a...

  • Playbook The S&R Practice Playbook For 2019

    Build A High-Performance, Customer-Obsessed Security Organization

    CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...

  • Report Assess Your GRC Program With Forrester's GRC Maturity Model

    Create A More Agile Organization By Maturing Your GRC Program
    August 22, 2019 | Renee Murphy, Alla Valente

    The Forrester GRC Maturity Model helps risk management professionals objectively assess their GRC efforts to identify areas of weakness as well as centers of excellence, then outline a strategy to...

  • Report Gauge Your GRC Program Maturity

    Assessment: The Governance, Risk, And Compliance Playbook
    August 22, 2019 | Renee Murphy, Alla Valente

    Risk management pros must objectively assess their governance, risk and compliance (GRC) program to identify gaps and highlight strengths to successfully create a road map for improvements. This...

  • Webinar Hybrid Cloud Security Best Practices

    August 21, 2019 | Andras Cser

    Protecting cloud workloads and their configuration in public, private, and hybrid clouds is a key concern of enterprises. This webinar highlights the drivers and best practices to secure...

  • Webinar The Security And Privacy Implications Of Drones

    August 14, 2019 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just airborne toys for amateur hobbyists. Organizations increasingly deploy drones in a wide range of applications, from agriculture to maintenance and inspection to law...

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Report Lessons Learned From The Latest HIPAA Security And Privacy Incidents

    As Fines Reach Into The Millions, It's Time For Healthcare To Move Beyond Minimal Compliance Efforts
    July 31, 2019 | Chris Sherman

    The healthcare industry experienced several high-profile data breaches and security incidents in 2018, leading to the loss of personal information on millions of patients and millions in fines. We...

  • Report Protect Whistleblowers For Business Success

    A Guide To Legitimizing And Safeguarding Corporate Whistleblowers In Today's Digital Workplace
    July 31, 2019 | Alla Valente

    Whistleblowers are an essential safety valve in ethical corporate culture. They provide a mechanism for healthy corporate governance by exposing fraud and corruption and, more recently, revealing...

  • Report New Tech: Cyber Ranges, Q3 2019

    Forrester's Landscape Overview Of 14 Providers
    July 30, 2019 | Jeff Pollard, Claire O'Malley

    Cyber ranges use a simulated breach environment to prepare your workforce for the stress, panic, and communication barriers they will face during a real cyberattack. In an inevitable cyberattack,...

  • Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management

    Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
    July 25, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...

  • Report The Forrester Tech Tide™: Data Security And Privacy, Q3 2019

    Tools And Technology: The Data Security And Privacy Playbook
    July 22, 2019 | Heidi Shey, Enza Iannopollo

    Data security and privacy is critical to firms' ability to win, serve, and retain their customers. To protect sensitive data, meet compliance, and continue to mature their practices for data...

  • Report Reverse Cybersecurity's Self-Inflicted Staffing Shortage

    Adopt More Realistic Expectations And More Effective Hiring Practices

    Every day, we hear news stories, speeches, and vendor pitches that lament our acute cybersecurity talent shortage, one that will take years to address. However, the shortage is largely...

  • Report Build Your Identity And Access Management Road Map

    Road Map: The Identity And Access Management Playbook
    July 16, 2019 | Andras Cser, Merritt Maxim

    Base your identity and access management (IAM) road map on a well-defined strategy that establishes and articulates to technology and business leaders the business need and value of IAM. Your IAM...

Content Type

Apply

Filters

Region