Advanced Search
483 results in Reports
Sort by:
Refine
  • Security Operations & Program Governance

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Mature Cybersecurity Incident Response Requires Legal Advice

    Engage Legal To Help Your CEO Make Smart Decisions and Improve Breach Response
    March 13, 2017 | Josh Zelonis

    Business and technology leaders often dismiss lawyers as pedantic and obstacles to productivity. This is certainly something security and risk pros can relate to. However, it's important to get...

  • For Security & Risk Professionals

    Report

    Report Improve Physical Security And Customer Experience

    S&R Pros Must Develop Five Essential Capabilities In 2017
    March 9, 2017 | Merritt Maxim

    Every customer interaction plays a vital role in shaping that customer's confidence in your brand. While many businesses have heavily invested in optimizing the digital customer experience (CX),...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Structure Your Security Practice For Success

    Organization: The S&R Practice Playbook
    March 2, 2017 | Christopher McClean

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. While org structure can affect how well the security...

  • For CIO Professionals

    Report

    Report The Top Emerging Technologies For Digital Predators

    Tools And Technology: The CIO Digital Business Transformation Playbook
    March 1, 2017 | Nigel Fenwick, Ted Schadler

    CIOs must constantly evaluate an array of emerging technologies and determine where to incubate and where to increase investment. While the choices are as individual as the companies, the...

  • For Security & Risk Professionals

    Report

    Report Lessons From The Forrester Wave™: MSSPs, North America, Q3 2016

    The Characteristics Of Successful And Unsuccessful MSSP Engagements
    February 28, 2017 | Jeff Pollard, Claire O'Malley

    Despite the relative maturity of the managed security services provider (MSSP) market, customers and vendors far too often fail to sync up as true, successful partners. This report delves into the...

  • For Security & Risk Professionals

    Report

    Report Define A Road Map To Accelerate Your Security Program

    Road Map: The S&R Practice Playbook
    February 28, 2017 | Christopher McClean

    Turning a strategy into action is what really reveals a CISO's worth. A solid security road map is how you make this happen: guiding implementation activities, demonstrating an understanding of key...

  • For Security & Risk Professionals

    Report

    Report Build A Cross-Functional Mobile Security Team

    Organization: The Mobile Security Playbook
    February 22, 2017 | Chris Sherman

    As security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs...

  • For Security & Risk Professionals

    Report

    Report Define A Compelling Strategy To Secure And Protect Mobile Moments

    Strategic Plan: The Mobile Security Playbook
    February 14, 2017 | Laura Koetzle, Chris Sherman

    This report helps security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments — without degrading the...

  • For Security & Risk Professionals

    Report

    Report Design Mobile Security Metrics With Mobile Moments In Mind

    Performance Management: The Mobile Security Playbook
    February 13, 2017 | Jeff Pollard

    Security leaders struggling to demonstrate business value need to incorporate mobile security metrics into their reports. As companies adopt the mobile mind shift, mobile security metrics are often...

  • For Security & Risk Professionals

    Report

    Report How To Become A Superstar Security Leader

    Vision: The S&R Practice Playbook
    February 13, 2017 | Christopher McClean, Claire O'Malley

    As companies seek to innovate and engage customers through digital channels, they need superstar security leaders — business executives who know how to protect, support, and drive performance. This...

  • For Security & Risk Professionals

    Report

    Report Zero Trust Security Metrics That Matter To The Business

    Performance Management: The Security Architecture And Operations Playbook
    February 9, 2017 | Stephanie Balaouras

    Forrester's Zero Trust (ZT) Model of information security demands that security teams eliminate the dangerous trust assumptions underpinning perimeter-based security architectures. When you embrace...

  • For Security & Risk Professionals

    Report

    Report Maximize Business Performance With A World-Class GRC Program

    Executive Overview: The Governance, Risk, And Compliance Playbook
    February 2, 2017 | Claire O'Malley, Renee Murphy

    Governance, risk, and compliance (GRC) programs are essential for protecting business value and maximizing business performance. However, too many organizations lack well-defined GRC programs or...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2017

    Landscape: The Security Architecture And Operations Playbook
    January 26, 2017 | Josh Zelonis

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...

  • For Security & Risk Professionals

    Report

    Report The State Of Network Security: 2016 To 2017

    Benchmarks: The Security Architecture And Operations Playbook
    January 26, 2017 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2016 to...

  • For eBusiness & Channel Strategy Professionals

    Report

    Report Disruptive Fintech Is Dead — Long Live Collaborative Fintech!

    Takeaways From Global Fintech Hackcelerator And FinovateAsia 2016
    January 23, 2017 | Zhi Ying Ng

    Digital financial innovation shows no signs of abating, with a series of financial technology (fintech) startups placing Hong Kong and Singapore firmly on the innovation map. As FinovateAsia 2016...

  • For Security & Risk Professionals

    Report

    Report Assess Your Security Program With Forrester's Information Security Maturity Model

    Assessment: The S&R Practice Playbook
    January 20, 2017 | Renee Murphy

    CISOs often struggle to articulate the full scope of their security responsibilities, prioritize their various initiatives, develop a coherent strategy, and connect their value to the business. In...

  • For Security & Risk Professionals

    Report

    Report Develop Your Information Security Management System

    Processes: The S&R Practice Playbook
    January 19, 2017 | Laura Koetzle, Renee Murphy

    The chief information security officer's (CISO) role is fraught with many challenges, including more sophisticated adversaries, a larger attack surface, increasing regulation, and customer demands....

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Infrastructure & Operations Professionals

    Report

    Report Five Steps To Reinforce And Harden Application Security

    I&O Teams Must Prevent And Remediate App Vulnerabilities
    January 13, 2017 | Milan Hanson, Amy DeMartine

    Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Data Breaches And Privacy Abuses, 2016

    Continuous Improvement: The Data Security And Privacy Playbook
    January 9, 2017 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Security And Risk, Q3 2015 To Q3 2016

    December 27, 2016 | Stephanie Balaouras, Claire O'Malley

    Forrester's security and risk (S&R) research team fields hundreds of inquiries from our clients every month. These inquiries help us keep track of which areas our clients find most challenging and...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Incident Response Service Providers

    IR Services Are Vital To Mitigating The Consequences Of A Breach
    December 21, 2016 | Josh Zelonis

    A mature incident response (IR) is essential to your business. Breaches are inevitable, and the costs and damage to reputation can be massive. As a result, IR-as-a-service has fully graduated into...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst