15 results for "marketing and live events" in Everything
 
Sort by:
Refine
  • Security & Risk

Search Results

  • Report GRC Vision, 2019 To 2024

    Vision: The Governance, Risk, And Compliance Playbook
    January 25, 2019 | Renee Murphy, Christopher McClean

    Risk management professionals are used to helping steer their organizations through uncertainty, and as fast as business and technology are advancing, they should be looking five years into the...

  • Report The Future Of Endpoint Protection, 2019 To 2024

    Endpoint Security Will Focus On Apps' And Users' Behavior
    January 24, 2019 | Chris Sherman

    Security leaders have struggled for the past 20 years to balance effective endpoint security with good employee experience, and this challenge will only get tougher as attacks and technologies...

  • Report Top Trends Shaping IAM In 2019

    Landscape: The Identity And Access Management Playbook
    January 3, 2019 | Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R)...

  • Report Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences
    September 25, 2018 | Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to...

  • Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    August 15, 2018 | Heidi Shey, Enza Iannopollo

    Data is the lifeblood of digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every security and privacy leader. Hacked customer data can erase millions in...

  • Report Develop Actionable Business-Centric Identity And Access Management Metrics

    Performance Management: The Identity And Access Management Playbook
    July 27, 2018 | Andras Cser, Merritt Maxim

    Year in and year out, many security and risk (S&R) professionals struggle to sustain identity and access management (IAM) as a top business technology priority. S&R pros who succeed at nurturing...

  • Report The State Of Facial Recognition For Authentication And Verification

    Facial Recognition Expedites Critical Identity Processes For Consumers And Employees
    June 11, 2018 | Andras Cser, Alexander Spiliotes, Merritt Maxim

    ...to authentication, identity verification, and fraud management. Security and risk (S&R) and marketing pros should assess it for boosting their security and customer experience (CX)...

  • Report Best Practices: Behavioral Biometrics

    Behavioral Biometrics Has Assumed A Greater Role Since The Equifax Breach
    May 25, 2018 | Andras Cser, Merritt Maxim

    Preventing identity theft and account takeover is no small feat. Many solutions that address these concerns impede the user experience, create unnecessary friction, and increase help desk support...

  • Report Use AI To Optimize Your IAM Initiatives

    Mitigate Identity Risks And Automate Processes With Emerging AI Models
    March 27, 2018 | Merritt Maxim, Andras Cser

    AI and machine learning (ML) are transforming many existing technologies and processes. Identity and access management (IAM) is no exception to this trend, with many incumbent IAM vendors and new...

  • Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    March 27, 2018 | Andras Cser, Merritt Maxim

    Your strategic plan for identity and access management (IAM) must establish and explain the business need and value of IAM to both technology management and business leaders. It must also describe...

  • Report Top Trends Shaping IAM In 2018

    January 9, 2018 | Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R)...

  • Report Assess Your Digital Risk Protection Maturity

    Use Forrester's Assessment To Structure How You Monitor And Mitigate Digital Risks That Expose Your Brand, Business, And People
    November 3, 2017 | Nick Hayes

    How well do you protect your external digital assets and thwart malicious lookalikes and activity? Most companies underestimate their digital risk exposure and lack monitoring and mitigation...

  • Report Vendor Landscape: eCommerce And Retail Fraud Management Solutions, Q3 2017

    A Focus On Accepting Orders And Business Growth Transforms The Market
    October 6, 2017 | Andras Cser

    As security, risk, and fraud management professionals strive to secure every digital touchpoint of the customer journey, they've discovered that it's imperative to update eCommerce and retail fraud...

  • Report TechRadar™: Data Security And Privacy, Q4 2017

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • Report TechRadar™: Physical Security, Q1 2017

    New Technologies Emerging To Improve Physical Security
    April 17, 2017 | Merritt Maxim

    This TechRadar defines the use cases, business value, and outlook for the 14 most relevant and important technologies for physical security. This includes core technologies, such as converged...