Advanced Search
10 results in Reports
Sort by:
Refine
  • Josh Zelonis

Search Results

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...

  • For Security & Risk Professionals

    Report

    Report Achieve Early Success In Threat Intelligence With The Right Collection Strategy

    S&R Pros Must Use Strategic Intelligence To Maximize Their Investment
    April 11, 2017 | Josh Zelonis

    Threat intelligence is a different animal than most security and risk (S&R) professionals are used to dealing with. For those new to the space, getting started can feel like an overwhelming...

  • For Security & Risk Professionals

    Report

    Report Mature Cybersecurity Incident Response Requires Legal Advice

    Engage Legal To Help Your CEO Make Smart Decisions and Improve Breach Response
    March 13, 2017 | Josh Zelonis

    Business and technology leaders often dismiss lawyers as pedantic and obstacles to productivity. This is certainly something security and risk pros can relate to. However, it's important to get...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2017

    Landscape: The Security Architecture And Operations Playbook
    January 26, 2017 | Josh Zelonis

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Data Breaches And Privacy Abuses, 2016

    Continuous Improvement: The Data Security And Privacy Playbook
    January 9, 2017 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Incident Response Service Providers

    IR Services Are Vital To Mitigating The Consequences Of A Breach
    December 21, 2016 | Josh Zelonis

    A mature incident response (IR) is essential to your business. Breaches are inevitable, and the costs and damage to reputation can be massive. As a result, IR-as-a-service has fully graduated into...

  • For Security & Risk Professionals

    Report

    Report Maximize The Benefits Of Your Incident Response Retainer

    A Strong Relationship With Your Retainer Is Critical To Breach Response
    November 11, 2016 | Josh Zelonis

    To deal with the inevitability of a significant cyberattack and breach, security and risk pros are forging relationships with external breach notification and incident response (IR) firms. However,...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report Planning For Failure: How To Survive A Breach

    An Effective Incident Management Program Is Essential To Help You Stay In Business
    September 9, 2016 | John Kindervag, Josh Zelonis

    Cybercriminals are using more sophisticated and targeted attacks to steal everything from valuable intellectual property to the sensitive personal information of your customers, partners, and...