518 results in Reports
Sort by:
Refine
  • Security Operations & Program Governance

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Data From Mutating Threats With A Zero Trust Network

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Designate Clear Lines Of Risk And Compliance Accountability With Forrester's RASCI Tool

    Organization: The Governance, Risk, And Compliance Playbook
    December 8, 2017 | Nick Hayes

    Without clearly defined GRC responsibilities, stakeholder involvement flounders, risks go unnoticed and untreated, and company exposure to large fines and devastating crises grows. This report...

  • For Security & Risk Professionals

    Report

    Report CISO Career Paths: Plot Your Course For Advancement

    Look Up And Out For Your Next Promotion
    December 7, 2017 | Jeff Pollard

    The CISO role is evolving rapidly, so there is no standard guidebook to getting hired, progressing, or succeeding as a CISO. To understand the skills, experience, and education that qualify leaders...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: DDoS Mitigation Solutions, Q4 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    December 7, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of DDoS mitigation providers, we identified 11 of the most significant ones — Akamai Technologies, Arbor Networks, Cloudflare, F5 Networks, Fortinet, Huawei...

  • For Security & Risk Professionals

    Report

    Report Develop Your Zero Trust Workforce Security Strategy

    Strategic Plan: The Security Architecture And Operations Playbook
    December 5, 2017 | Chase Cunningham

    The concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve...

  • For B2B Marketing Professionals

    Report

    Report Forrester Data Global Business Technographics® Security Survey, 2017: Overview

    A Business Technographics Presentation
    December 4, 2017 | Ryan Halliday

    This report is our overview of global security decision makers’ goals and concerns, cloud security sourcing strategies, breaches, and the risks surrounding emerging technology and the internet of...

  • For Security & Risk Professionals

    Report

    Report Job Description: Director Of Threat Intelligence

    Organization: The Security Architecture And Operations Playbook
    December 1, 2017 | Josh Zelonis

    Security and risk (S&R) professionals frequently struggle to realize the benefits that threat intelligence marketing promises. This is in part due to trying to integrate threat intelligence as a...

  • For Security & Risk Professionals

    Report

    Report The State Of Network Security: 2017 To 2018

    Benchmarks: The Security Architecture And Operations Playbook
    November 30, 2017 | Heidi Shey, Alexander Spiliotes

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2017 to...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2018

    Landscape: The Security Architecture And Operations Playbook
    November 27, 2017 | Josh Zelonis

    Security and risk (S&R) professionals have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for...

  • For Security & Risk Professionals

    Report

    Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    November 21, 2017 | Jeff Pollard

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • For eBusiness & Channel Strategy Professionals

    Report

    Report Top Cybersecurity Threats For Retailers In 2018

    Digital Transformation Means Retailers Must Get Cyber-Ready
    November 15, 2017 | Brendan Miller, Josh Zelonis

    Attackers are exploiting your digital transformation efforts. The age of the customer demands that retailers go on the offensive and exceed the demands of today's digital customers while also...

  • For Infrastructure & Operations Professionals

    Report

    Report Predictions 2018: Automation Alters The Global Workforce

    Ten Key Developments In Automation Reshape The Industry In 2018

    Automation has been one of the most profound and disruptive forces in human history. The market for automation in many forms will accelerate faster in 2018 as firms look to squeeze performance and...

  • For Security & Risk Professionals

    Report

    Report Predictions 2018: Cybersecurity

    Landscape: The S&R Practice Playbook
    November 7, 2017 | Andras Cser, Jeff Pollard, Merritt Maxim

    In 2018, consumers and businesses will face challenges brought on by four primary forces: 1) rising tensions in international relations; 2) ubiquitous connectivity; 3) digital transformation...

  • For Security & Risk Professionals

    Report

    Report Assess Your Digital Risk Protection Maturity

    Use Forrester's Assessment To Structure How You Monitor And Mitigate Digital Risks That Expose Your Brand, Business, And People
    November 3, 2017 | Nick Hayes

    How well do you protect your external digital assets and thwart malicious lookalikes and activity? Most companies underestimate their digital risk exposure and lack monitoring and mitigation...

  • For Security & Risk Professionals

    Report

    Report Best Practices: Mitigating Insider Threats

    Processes: The Security Architecture And Operations Playbook
    November 2, 2017 | Joseph Blankenship, Claire O'Malley

    Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros...

  • For Security & Risk Professionals

    Report

    Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    November 1, 2017 | Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros devote resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way...

  • For Security & Risk Professionals

    Report

    Report Assess Your GRC Program With Forrester's GRC Maturity Model

    Assessment: The Governance, Risk, And Compliance Playbook
    October 24, 2017 | Renee Murphy, Nick Hayes

    The Forrester GRC Maturity Model helps risk management professionals objectively assess their GRC efforts to identify areas of weakness as well as centers of excellence, then outline a strategy to...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Customer Data Breach Notification And Response Services, Q4 2017

    Tools And Technology: The Data Security And Privacy Playbook
    October 23, 2017 | Heidi Shey

    In our 18-criteria evaluation of customer breach notification and response service providers, we identified the seven most significant ones — AllClear ID, Epiq Systems, Equifax, Experian, ID...

  • For CIO Professionals

    Report

    Report The Top 10 Technology Trends To Watch: 2018 To 2020

    Ten Trends Will Help You Maximize The Value Of Business Technology

    Maximizing the value of your business technology investments requires an understanding of trends — not just as interesting reading but as vital clues to your firm's future success and, possibly,...

  • For Security & Risk Professionals

    Report

    Report Use Forrester's CISO Strategic Canvas To Align Security With Business

    Strategic Plan: The S&R Practice Playbook
    October 16, 2017 | Jeff Pollard

    Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Digital Forensics And Incident Response Service Providers, Q3 2017

    September 28, 2017 | Josh Zelonis

    In our 18-criteria evaluation of digital forensics and incident response service providers, we identified the 14 most significant ones — CrowdStrike, Cylance, Deloitte, KPMG, Mandiant, Optiv,...

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    September 19, 2017 | Stephanie Balaouras, Heidi Shey

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report Forrester's 2017 Interactive Data Privacy Heat Map

    Landscape: The Data Security And Privacy Playbook
    September 14, 2017 | Enza Iannopollo, Chris Sherman, Heidi Shey

    To help S&R professionals navigate the complex landscape of privacy laws around the world, Forrester created the Data Privacy Heat Map, which explains the data protection guidelines and practices...

  • For Security & Risk Professionals

    Report

    Report Calculate The Business Impact And Cost Of A Breach

    Business Case: The Data Security And Privacy Playbook
    August 31, 2017 | Heidi Shey

    The business impact and cost of a breach are notoriously difficult to measure. A data breach initiates a tangle of direct and indirect costs, with some accruing in the immediate aftermath and...

  • For Security & Risk Professionals

    Report

    Report Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook
    August 25, 2017 | Heidi Shey, Jeff Pollard

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • For Security & Risk Professionals

    Report

    Report Forrester Data: Endpoint Security Software Forecast, 2016 To 2021 (Global)

    ForecastView Document
    August 22, 2017 | Jennifer Adams, Chris Sherman

    Hackers are creating new, more sophisticated malware daily, and endpoint security solutions provide a critical line of defense to protect PCs, laptops, and servers from these malicious threats....

Content categories

Refine your results

Date Range

Industry

Primary Role

Topics

Methodology

Region

Vendor

Analyst

Market Imperatives