494 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Information Security

Search Results

  • Webinar Endpoint Security Strategy: How To Choose The Right Suite

    Using The Forrester Wave™
    Tuesday, October 29, 2019, 1:00 p.m.-1:45 p.m. Eastern time (17:00-17:45 GMT) | Chris Sherman, Matthew Flug

    Is your enterprise endpoint security strategy in need of a refresh? In this webinar, Forrester discusses the evolution of the modern endpoint security suite and how to choose the right solution in...

  • Webinar Secure What You Sell: Director's Cut

    Tuesday, October 29, 2019, 11:00 a.m.-12:00 p.m. Eastern time (15:00-16:00 GMT) | Amy DeMartine, Jeff Pollard

    Securing the products and services their companies sell offers a mechanism for CISOs to contribute to their firms' goals. This webinar helps CISOs understand the world of product security and how...

  • Webinar Tactics For Maximizing Cybersecurity Risk Ratings Solutions

    October 15, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk ratings solutions are becoming a core part of enterprise security and third-party security programs of global companies. Join this webinar to learn the best practices and tactics...

  • Report Gauge Your ZTX Security Maturity

    Assessment: The Zero Trust Security Playbook
    October 11, 2019 | Chase Cunningham

    To convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...

  • Report Master Your Security Service Catalog

    Processes: The S&R Practice Playbook
    October 10, 2019 | Paul McKay

    CISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. But too many CISOs focus only on delivering technical controls, which results in a...

  • Webinar When Ransomware Strikes: How To Make The Ransom Payment Decision

    October 8, 2019 | Trevor Lyness, Josh Zelonis

    Ransomware attacks on businesses are increasing. And no one wants to pay a ransom when ransomware strikes. However, if ransomware has your business’ operations in a vise, you may find...

  • Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Zero Trust Security Playbook
    October 4, 2019 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • Report Best Practices: Phishing Prevention

    Protect Against Email-Borne Threats With Forrester's Layered Approach
    September 30, 2019 | Joseph Blankenship, Claire O'Malley

    Attackers use phishing and other social engineering tactics to infiltrate corporate networks. Advances in malicious email protection can recognize and stop obvious phishing attempts, but...

  • Report Gauge Your Data Security And Privacy Maturity

    Assessment: The Data Security And Privacy Playbook
    September 27, 2019 | Enza Iannopollo, Heidi Shey

    To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost, to one that champions privacy and uses its technology...

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Zero Trust Security Playbook
    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report The Forrester Wave™: Endpoint Security Suites, Q3 2019

    The 15 Providers That Matter Most And How They Stack Up
    September 23, 2019 | Chris Sherman

    In our 25-criterion evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bitdefender, BlackBerry Cylance, Carbon Black, Check Point, Cisco, CrowdStrike,...

  • Report The Forrester MITRE ATT&CK Evaluation Guide

    An Objective Analysis Of The Evaluation And How To Interpret The Results
    September 17, 2019 | Josh Zelonis

    In an industry desperate for objective efficacy testing, the introduction of the MITRE ATT&CK evaluation of endpoint detection and response (EDR) security products is a much-welcomed event....

  • Forum Security & Risk 2019

    A New Hope
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Report Gauge Your Information Security Maturity

    Assessment: The S&R Practice Playbook
    September 4, 2019 | Renee Murphy

    Information security is a complex discipline, and CISOs are responsible for compiling a vast array of controls and standards to plot a road map for improvements. However, CISOs can't determine a...

  • Report Lessons Learned From The Latest HIPAA Security And Privacy Incidents

    As Fines Reach Into The Millions, It's Time For Healthcare To Move Beyond Minimal Compliance Efforts
    July 31, 2019 | Chris Sherman

    The healthcare industry experienced several high-profile data breaches and security incidents in 2018, leading to the loss of personal information on millions of patients and millions in fines. We...

  • Report Protect Whistleblowers For Business Success

    A Guide To Legitimizing And Safeguarding Corporate Whistleblowers In Today's Digital Workplace
    July 31, 2019 | Alla Valente

    Whistleblowers are an essential safety valve in ethical corporate culture. They provide a mechanism for healthy corporate governance by exposing fraud and corruption and, more recently, revealing...

  • Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management

    Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
    July 25, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...

  • Report The Forrester Tech Tide™: Data Security And Privacy, Q3 2019

    Tools And Technology: The Data Security And Privacy Playbook
    July 22, 2019 | Heidi Shey, Enza Iannopollo

    Data security and privacy is critical to firms' ability to win, serve, and retain their customers. To protect sensitive data, meet compliance, and continue to mature their practices for data...

  • Report Zero Trust For Compliance

    A Control Mapping Of The Zero Trust Framework To 12 Industry And Government Compliance Mandates

    Security and risk professionals who use Forrester's Zero Trust framework as the foundation for their security vision and architecture are able to meet compliance requirements with greater ease....

  • Report Find Elusive Security Defects Using Bug Bounty Platforms

    Harness The Power Of Hackers To Protect Your Company's Applications
    July 15, 2019 | Amy DeMartine

    Apps continue to be the top method of attack for cybercriminals. Unfortunately, prerelease scanning and penetration testing services discover only known security flaw patterns or use a limited...

  • Report Security Budgets In Asia Pacific, 2019

    Budgets Are Rising As The Region Continues To Play Catch-Up
    July 15, 2019 | Jinan Budge

    In 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...

  • Report Making Smart Cities Safe And Secure

    Building Secure And Resilient Digital Systems To Serve Citizens
    July 12, 2019 | Merritt Maxim, Salvatore Schiano

    The era of the connected city has arrived, as municipal leaders around the globe invest in new technologies to optimize existing services and improve overall citizen experience. But with these new...

  • Report The Zero Trust eXtended (ZTX) Ecosystem

    Strategic Plan: The Zero Trust Security Playbook
    July 11, 2019 | Chase Cunningham

    In the past two years, Forrester's Zero Trust security has exploded in awareness and plans for adoption. We've reached this market inflection thanks to the categorical realization from both...

  • Report Make Your Digital Transformation An Ethical One

    An Ethical Transformation Series Report

    To close the gap between customer expectations and your current capabilities, your organization, like many others, is probably undergoing a digital transformation. This transformation is critical...

  • Webinar Differentiating Capabilities Of Data Security Portfolio Vendors

    Using The Forrester Wave
    June 24, 2019 | Heidi Shey

    Major data security vendors and tech titans like Microsoft and Google have expanded their portfolio of capabilities to approach data security in a holistic and integrated fashion. This expansion...

Content Type

Apply

Filters

Region

Vendor