252 results in Reports
 
Sort by:
Refine
  • Security & Risk

Search Results

  • Report The Forrester MITRE ATT&CK Evaluation Guide

    An Objective Analysis Of The Evaluation And How To Interpret The Results
    September 17, 2019 | Josh Zelonis

    In an industry desperate for objective efficacy testing, the introduction of the MITRE ATT&CK evaluation of endpoint detection and response (EDR) security products is a much-welcomed event....

  • Report Forrester's Identity And Access Management Maturity Assessment

    Assessment: The Identity And Access Management Playbook
    September 12, 2019 | Merritt Maxim, Andras Cser

    Security leaders often struggle to understand the gaps and potential security vulnerabilities in the broad range of identity and access management (IAM) functional areas such as identity...

  • Report Get Fighting Fit For EU's NISD

    First EU Cybersecurity Regulation Has Mixed Response In First Year Of Operation
    September 5, 2019 | Paul McKay

    In May 2018, the EU Network Information Security Directive (NISD) came into force. Over the past 12 months, regulators and competent authorities have been working with industry to determine a...

  • Report Now Tech: eDiscovery Service Providers, Q3 2019

    Forrester's Overview Of 35 eDiscovery Service Providers
    September 4, 2019 | Heidi Shey

    You can use eDiscovery service providers to boost expertise, speed, and scale of eDiscovery-related operations, benefit from best-fit technologies for your requirements, and optimize overall...

  • Report Assess Your Security Program With Forrester's Information Security Maturity Model

    Mature Your Information Security Program To Protect Your Brand
    September 4, 2019 | Renee Murphy

    CISOs often struggle to articulate the full scope of their security responsibilities, prioritize their various initiatives, develop a coherent strategy, and connect their value to the business. In...

  • Report Gauge Your Information Security Maturity

    Assessment: The S&R Practice Playbook
    September 4, 2019 | Renee Murphy

    Information security is a complex discipline, and CISOs are responsible for compiling a vast array of controls and standards to plot a road map for improvements. However, CISOs can't determine a...

  • Report Assess Your GRC Program With Forrester's GRC Maturity Model

    Create A More Agile Organization By Maturing Your GRC Program
    August 22, 2019 | Renee Murphy, Alla Valente

    The Forrester GRC Maturity Model helps risk management professionals objectively assess their GRC efforts to identify areas of weakness as well as centers of excellence, then outline a strategy to...

  • Report Gauge Your GRC Program Maturity

    Assessment: The Governance, Risk, And Compliance Playbook
    August 22, 2019 | Renee Murphy, Alla Valente

    Risk management pros must objectively assess their governance, risk and compliance (GRC) program to identify gaps and highlight strengths to successfully create a road map for improvements. This...

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Report Lessons Learned From The Latest HIPAA Security And Privacy Incidents

    As Fines Reach Into The Millions, It's Time For Healthcare To Move Beyond Minimal Compliance Efforts
    July 31, 2019 | Chris Sherman

    The healthcare industry experienced several high-profile data breaches and security incidents in 2018, leading to the loss of personal information on millions of patients and millions in fines. We...

  • Report Protect Whistleblowers For Business Success

    A Guide To Legitimizing And Safeguarding Corporate Whistleblowers In Today's Digital Workplace
    July 31, 2019 | Alla Valente

    Whistleblowers are an essential safety valve in ethical corporate culture. They provide a mechanism for healthy corporate governance by exposing fraud and corruption and, more recently, revealing...

  • Report New Tech: Cyber Ranges, Q3 2019

    Forrester's Landscape Overview Of 14 Providers
    July 30, 2019 | Jeff Pollard, Claire O'Malley

    Cyber ranges use a simulated breach environment to prepare your workforce for the stress, panic, and communication barriers they will face during a real cyberattack. In an inevitable cyberattack,...

  • Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management

    Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
    July 25, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...

  • Report The Forrester Tech Tide™: Data Security And Privacy, Q3 2019

    Tools And Technology: The Data Security And Privacy Playbook
    July 22, 2019 | Heidi Shey, Enza Iannopollo

    Data security and privacy is critical to firms' ability to win, serve, and retain their customers. To protect sensitive data, meet compliance, and continue to mature their practices for data...

  • Report Reverse Cybersecurity's Self-Inflicted Staffing Shortage

    Adopt More Realistic Expectations And More Effective Hiring Practices

    Every day, we hear news stories, speeches, and vendor pitches that lament our acute cybersecurity talent shortage, one that will take years to address. However, the shortage is largely...

  • Report Build Your Identity And Access Management Road Map

    Road Map: The Identity And Access Management Playbook
    July 16, 2019 | Andras Cser, Merritt Maxim

    Base your identity and access management (IAM) road map on a well-defined strategy that establishes and articulates to technology and business leaders the business need and value of IAM. Your IAM...

  • Report Zero Trust For Compliance

    A Control Mapping Of The Zero Trust Framework To 12 Industry And Government Compliance Mandates

    Security and risk professionals who use Forrester's Zero Trust framework as the foundation for their security vision and architecture are able to meet compliance requirements with greater ease....

  • Report Find Elusive Security Defects Using Bug Bounty Platforms

    Harness The Power Of Hackers To Protect Your Company's Applications
    July 15, 2019 | Amy DeMartine

    Apps continue to be the top method of attack for cybercriminals. Unfortunately, prerelease scanning and penetration testing services discover only known security flaw patterns or use a limited...

  • Report Security Budgets In Asia Pacific, 2019

    Budgets Are Rising As The Region Continues To Play Catch-Up
    July 15, 2019 | Jinan Budge

    In 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...

  • Report Making Smart Cities Safe And Secure

    Building Secure And Resilient Digital Systems To Serve Citizens
    July 12, 2019 | Merritt Maxim, Salvatore Schiano

    The era of the connected city has arrived, as municipal leaders around the globe invest in new technologies to optimize existing services and improve overall citizen experience. But with these new...

  • Report The Zero Trust eXtended (ZTX) Ecosystem

    Strategic Plan: The Zero Trust Security Playbook
    July 11, 2019 | Chase Cunningham

    In the past two years, Forrester's Zero Trust security has exploded in awareness and plans for adoption. We've reached this market inflection thanks to the categorical realization from both...

  • Report The Top Trends Shaping Privacy In 2019

    A Forrester Guide To The Macro Trends And Key Takeaways From The IAPP Global Privacy Summit 2019
    July 10, 2019 | Enza Iannopollo, Heidi Shey

    May 2019 was a significant month in the privacy field: It was not only the first anniversary of GDPR, but thousands of privacy professionals also gathered in Washington, D.C. for the International...

  • Report Forrester Infographic: Build A Better Bot Management Program

    Create A Single Team Now To Battle Bad Bots
    July 8, 2019 | Amy DeMartine

    Internet traffic contains a worrying amount of bad bot traffic. Organizations need to do a much better job of combating them or suffer their scraping, fraud, inventory hoarding, credential...

  • Report Make Your Digital Transformation An Ethical One

    An Ethical Transformation Series Report

    To close the gap between customer expectations and your current capabilities, your organization, like many others, is probably undergoing a digital transformation. This transformation is critical...

  • Report The US Healthcare Security Benchmark, 2018 To 2019

    Healthcare Pros Must Spend Wisely To Counter Increasing Complexity

    In the past, IT security teams within US healthcare providers had much smaller budgets than those within other industries. This is no longer the case, as budget increases in healthcare have come as...

Content Type

Apply

Filters

Region