607 results in Everything
 
Sort by:
Refine
  • Security Operations & Program Governance

Featured content

The Zero Trust Security Playbook For 2019

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019

    Forrester's Landscape Overview Of 21 Providers
    February 28, 2019 | Merritt Maxim, Joseph Blankenship

    A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report How Insiders Use The Dark Web To Sell Your Data

    Financial Services Firms Need To Prioritize Monitoring For Insider Threats
    February 28, 2019 | Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy...

  • Report Design For Dependability By Embracing A Future Of Trusted Technology

    Reliable Services Are Critical For A Secure, Always-On Economy
    February 25, 2019 | Naveen Chhabra

    As the world evolves into a connected web of services that weave devices, users, and data in a seamless user experience, the megacloud providers have set expectations — for always-on capabilities,...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report The State Of Business Continuity, 2018

    Risk Pros Are Expanding BC To Include Most Operational Risks
    February 11, 2019 | Stephanie Balaouras, Salvatore Schiano

    As 100-year floods and cyberattacks grow more frequent, and as organizations become completely dependent on complex technology, business continuity (BC) preparedness must be a cornerstone of a...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report Build Your Security Organization

    Organization: The S&R Practice Playbook
    January 31, 2019 | Jeff Pollard, Paul McKay

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. This report examines key organizational challenges...

  • Report Now Tech: Security Awareness And Training Solutions, Q1 2019

    Forrester's Overview Of 20 Security Awareness And Training Solution Providers
    January 23, 2019 | Jinan Budge, Claire O'Malley

    You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...

  • Report Now Tech: Managed Security Services In Asia Pacific, Q1 2019

    Forrester's Overview Of 19 Managed Security Service Providers
    January 16, 2019 | Jinan Budge

    You can use managed security services to rapidly transform your security operations, improve your talent diversity, increase your breadth of skills, and support your global business. But to access...

  • Report Build A High-Performance, Customer-Obsessed Security Organization

    Executive Overview: The S&R Practice Playbook
    January 16, 2019 | Christopher McClean

    CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...

  • Report Build A Strong Process Foundation For Cybersecurity And Privacy

    Beginner Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Claire O'Malley

    To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...

  • Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success

    Advanced Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Stephanie Balaouras

    CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...

  • Report Elevate Cybersecurity And Privacy With Process Metrics

    Intermediate Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Salvatore Schiano

    The intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...

  • Report Define A Road Map To Accelerate Your Security Program

    Road Map: The S&R Practice Playbook
    January 8, 2019 | Christopher McClean

    Turning strategy into action reveals a CISO's worth. A solid security road map is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...

  • Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019

    Tools And Technology: The Zero Trust Security Playbook
    January 2, 2019 | Josh Zelonis, Joseph Blankenship

    Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...

  • Report Partner With European Security Startups To Protect Your Business

    How To Capitalize On The Market's Best New Innovations
    December 28, 2018 | Paul McKay

    In addition to more-traditional venture funding, investors and governments across Europe have spent big to set up security incubators and accelerators, and their efforts have resulted in some true...

  • Report How To Talk To Your Board About Cybersecurity

    Best Practices And Template For Board Presentations
    December 28, 2018 | Jeff Pollard, Jinan Budge, Paul McKay

    Whether there to answer questions, give a status update, or build support, security leaders need to make the most out of each opportunity they get in front of their board of directors. This report...

  • Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018

    Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
    December 18, 2018 | Merritt Maxim

    You can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...

  • Report Top Enterprise Fraud Management And Anti-Money-Laundering Trends

    Consortium, Third-Party, And Blockchain Data Integration Will Transform EFM And AML Solutions And Practices
    December 17, 2018 | Andras Cser

    While enterprise fraud management (EFM) and anti-money laundering (AML) are mature functions, regulatory pressures in Europe and advances in machine learning are rapidly and profoundly changing...

  • Report Security Budgets 2019: The Year Of Services Arrives

    Benchmarks: The S&R Practice Playbook
    December 17, 2018 | Jeff Pollard

    This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...

  • Report Top Cybersecurity Threats In 2019

    Landscape: The Zero Trust Security Playbook
    December 11, 2018 | Josh Zelonis

    Security pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    December 10, 2018 | Jeff Pollard

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Measure GRC Performance To Show Processes And Data Reliability

    Performance Management: The Governance, Risk, And Compliance Playbook
    December 6, 2018 | Renee Murphy

    The more complex a program is, the more difficult it is to mature and maintain it. The more complicated the business process is, the faster and more devastating this breakdown can be. Strong...

Content Type

Apply

Filters

Region