105 results in Reports
Sort by:
Refine
  • Heidi Shey

Search Results

  • For Security & Risk Professionals

    Report

    Report Rethinking Data Discovery And Classification Strategies

    Strategic Plan: The Data Security And Privacy Playbook
    June 9, 2017 | Heidi Shey

    Security and risk (S&R) pros can't expect to adequately protect customer, employee, and sensitive corporate data and IP if they don't know what data exists, where it resides, how valuable it is to...

  • For Security & Risk Professionals

    Report

    Report Creating Actionable Security And Privacy Policy

    Policy: The Data Security And Privacy Playbook
    May 3, 2017 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Minimizing Business Travel Risk

    Detailed Guides For Preventing Cybertheft, Espionage, And Physical Harm
    April 24, 2017 | Heidi Shey, Merritt Maxim

    Determined adversaries will stop at nothing to infiltrate your firm for its sensitive data, and employees who travel for business or take their devices on the road often become a vulnerability that...

  • For Customer Insights Professionals

    Report

    Report How To Design And Build A Great Consumer Data Privacy Organization

    Organization: The Customer Trust And Privacy Playbook
    April 3, 2017 | Fatemeh Khatibloo, Heidi Shey

    How companies handle and protect consumer data privacy is much more than a compliance issue. As privacy becomes a competitive differentiator, firms will have to develop a cohesive privacy strategy...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Data Classification For Security And Privacy

    Firms That Understand The Value Of Data Classify Their Data
    February 24, 2017 | Heidi Shey

    Data classification is a core component of defining and understanding data that security and risk (S&R) pros must protect, as well as identifying the way employees should handle it and the types of...

  • For Security & Risk Professionals

    Report

    Report The State Of Network Security: 2016 To 2017

    Benchmarks: The Security Architecture And Operations Playbook
    January 26, 2017 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2016 to...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Data Breaches And Privacy Abuses, 2016

    Continuous Improvement: The Data Security And Privacy Playbook
    January 9, 2017 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Data Security And Privacy: 2016 To 2017

    Benchmarks: The Data Security And Privacy Playbook
    December 7, 2016 | Heidi Shey

    Throughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Symantec Injects New Life Into Its Consumer Security With LifeLock Acquisition

    Symantec Becomes One Of The Few Firms To Bridge Enterprise And Consumer Security And Privacy
    November 22, 2016 | Andras Cser, Jeff Pollard

    On November 21, Symantec announced its acquisition of LifeLock for $2.3 billion. This signals a significant reinvestment in Symantec's consumer security portfolio and an expansion into new consumer...

  • For Security & Risk Professionals

    Report

    Report Calculate The Business Impact And Cost Of A Breach

    Business Case: The Data Security And Privacy Playbook
    November 17, 2016 | Heidi Shey

    The business impact and cost of a breach are notoriously difficult to measure. A data breach initiates a tangle of direct and indirect costs, with some costs accruing in the immediate aftermath and...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Data Loss Prevention Suites, Q4 2016

    Tools And Technology: The Data Security And Privacy Playbook
    November 8, 2016 | Heidi Shey

    In our 30-criteria evaluation of data loss prevention suite providers, we identified the seven most significant ones — Clearswift, DeviceLock, Digital Guardian, Forcepoint, GTB Technologies, Intel...

  • For Security & Risk Professionals

    Report

    Report Build A Privacy Organization For Consumer Data Management

    Organization: The Data Security And Privacy Playbook
    November 7, 2016 | Heidi Shey, Enza Iannopollo

    How companies handle and protect consumer data privacy is much more than a compliance issue. Privacy is a competitive differentiator, and firms that fail to have a cohesive privacy strategy and...

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    November 4, 2016 | Stephanie Balaouras, John Kindervag

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report Forrester's 2016 Interactive Data Privacy Heat Map

    Landscape: The Data Security And Privacy Playbook
    October 31, 2016 | Chris Sherman, Enza Iannopollo

    To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and...

  • For Security & Risk Professionals

    Report

    Report Six Frameworks To Manage Your Big Data Privacy Concerns And Risks

    Assess Your Data Practices And Protect Customer And Employee Privacy
    October 21, 2016 | Heidi Shey

    As companies store, process, and analyze vast amounts of data from email, social networks, sensors, IT systems, public data stores, and other sources, they need to be aware that much of it could be...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Lessons For Security And Risk Pros From The Yahoo Breach

    Don't Prioritize Corporate Damage Control Over Customers' Interests
    September 23, 2016 | Stephanie Balaouras, Jeff Pollard

    On Thursday, Yahoo announced that cybercriminals had compromised the personal information including names, email addresses, dates of birth, phone numbers, and, in some instances, security questions...

  • For Security & Risk Professionals

    Report

    Report Planning For Failure: How To Survive A Breach

    An Effective Incident Management Program Is Essential To Help You Stay In Business
    September 9, 2016 | John Kindervag, Josh Zelonis

    Cybercriminals are using more sophisticated and targeted attacks to steal everything from valuable intellectual property to the sensitive personal information of your customers, partners, and...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Data Loss Prevention Solutions

    Key Vendors For Email, Endpoint, Network, Web, And Cloud DLP Capabilities
    August 4, 2016 | Heidi Shey

    Policies to control data use and movement require enforcement mechanisms. Data loss prevention (DLP) capabilities give security and risk (S&R) professionals the means to enforce those policies and...

  • For Security & Risk Professionals

    Report

    Report Brief: Microsoft + LinkedIn Will Upend IAM, Blur Lines For Employee Privacy

    S&R Pros Must Strengthen Employee Privacy Oversight And Data Protection Practices
    July 13, 2016 | Merritt Maxim, Andras Cser

    Microsoft announced plans to acquire social networking site LinkedIn for $26.2 billion in cash, Microsoft's largest acquisition ever. This additional source of data can help to deliver stronger...

  • For Security & Risk Professionals

    Report

    Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    July 7, 2016 | John Kindervag, Heidi Shey

    Data is the lifeblood of today's digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits,...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Data Loss Prevention

    DLP Suite Adoption Holds Steady As DLP Becomes A Feature And Managed Services Offer An Attractive Option
    May 2, 2016 | Heidi Shey

    Policies to control data use and movement require enforcement mechanisms. Data loss prevention (DLP) capabilities give security and risk (S&R) professionals the means to enforce those policies and...

  • For Security & Risk Professionals

    Report

    Report Top 13 Technology Trends S&R Pros Should Watch: 2016

    April 21, 2016 | Andras Cser, John Kindervag

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...

  • For Security & Risk Professionals

    Report

    Report Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus
    April 21, 2016 | Heidi Shey, Jeff Pollard

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Rethinking Data Loss Prevention With Forrester's DLP Maturity Grid

    April 18, 2016 | Heidi Shey, John Kindervag

    Data loss prevention (DLP) remains a key technology to help prevent the leakage and exfiltration of the firm's most sensitive data. Using client feedback, survey data, and input from security...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor