Stephanie Balaouras

Vice President, Research Director serving Security & Risk PROFESSIONALS

Stephanie serves Security & Risk Professionals. She leads a team of analysts who provide research and advisory services on topics like IT security frameworks; governance, risk, and compliance (GRC); identity and access management (IAM); application security; data security; and IT infrastructure security. She also provides Forrester's coverage of specific risk topics including business continuity (BC), IT continuity/disaster recovery (DR), and backup and recovery.

Previous Work Experience

Stephanie has more than 12 years of experience in BC/DR, backup and recovery, and information storage industries. Prior to joining the security and risk team, Stephanie was a principal analyst on Forrester's infrastructure and operations team, where she was instrumental in the development of Forrester's research and offerings in continuity, availability, and information storage and protection. Prior to joining Forrester, Stephanie was a senior analyst with Yankee Group, where she provided insight on technology trends to key system, storage, and information protection vendors and consultative advice on strategic and tactical initiatives. Before Yankee Group, Stephanie worked at EMC, first as a technical architect and then as a senior education and productivity consultant. As a technical architect, she articulated EMC's value to partners and customers and designed solutions to meet customer and new market opportunities. As an education and productivity consultant, she managed and supported complex technical training programs for business and practice managers in EMC's Technology Solutions Group. Prior to EMC, Stephanie worked at Accenture as a consultant, focusing on the implementation of business applications (SAP, PeopleSoft) for global businesses.

Education

Stephanie holds a bachelor's degree in business administration and finance and investments from Babson College.

 

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

85 results in Reports

  • Stephanie Balaouras
  • For Security & Risk Professionals

    Report:Top Security And Risk Priorities For The Business Technology Agenda

    Fail To Preserve Customer Trust And Watch Your Firm's Competitive Strengths And Revenue Disappear

    Digital businesses cannot succeed in today's competitive environment if they don't protect their customers from cybercriminals and fraudsters, safeguard their firm's intellectual property from...

    • Downloads: 163
  • For Security & Risk Professionals

    Report:Define A Compelling Strategy To Secure And Protect Mobile Moments

    Strategic Plan: The Mobile Security Playbook

    Forrester designed this report to help security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments...

    • Downloads: 823
  • For Security & Risk Professionals

    Report:Develop Mobile Security Metrics With Forrester's Tech Management Balanced Scorecard

    Performance Management: The Mobile Security Playbook

    Leading technology management organizations use Kaplan and Norton's Balanced Scorecard (BSC) as a framework for measuring performance and for selecting metrics that demonstrate business value....

    • Downloads: 74
  • For Security & Risk Professionals

    Report:The Forrester Mobile Security Maturity Model

    The Forrester Mobile Security Maturity Model distills the recommended functions and components of a comprehensive program into a single framework. With a three-tiered hierarchy, it also offers a...

    • Downloads: 54
  • For Security & Risk Professionals

    Report:Assess The Maturity Of Your Mobile Security Program

    Assessment: The Mobile Security Playbook

    When developing a mobile security strategy for today's digital business, security and risk (S&R) executives must consider both how they will enable a digital workforce that expects to work anytime...

    • Downloads: 803
  • For Security & Risk Professionals

    Report:Build A High-Performance, Customer-Obsessed Security Organization

    Executive Overview: The S&R Practice Playbook

    As CIOs shift their focus to the business technology (BT) agenda, CISOs must accelerate their evolution to become business managers focused on retaining customer trust. To make this big transition,...

    • Downloads: 997
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 832
  • For Security & Risk Professionals

    Report:Rules Of Engagement: A Call To Action To Automate Breach Response

    Processes: The Security Architecture And Operations Playbook

    It seems that not a day goes by that there isn't another massive security breach in the news. Consumers around the globe hear about continual threats to their personal data while name brand retailers...

    • Downloads: 174
  • For Security & Risk Professionals

    Report:Lessons Learned From Global Customer Data Breaches And Privacy Incidents Of 2013-14

    Continuous Improvement: The Data Security And Privacy Playbook

    Frustrated security and risk (S&R) professionals once wished for more media coverage of customer data breaches and privacy abuses to help them raise the importance of security with naive business...

    • Downloads: 267
  • For Security & Risk Professionals

    Report:Predictions 2015: Security Budgets Will Increase, As Will Breach Costs, Fines, And Lawsuits

    Landscape: The S&R Practice Playbook

    There are still a few months left in 2014, but it's safe to say this was a pivotal year in security and risk (S&R). The news of high-profile breaches felt less like a steady dribble and more like a...

    • Downloads: 284
  • For Security & Risk Professionals

    Report:Quick Take: Symantec Splits In Two

    Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

    On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

    • Downloads: 134
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The rapid adoption of mobile devices and cloud services, together with a multitude of new partnerships and customer-facing applications, has "extended" the identity boundary of today's digital...

    • Downloads: 996
  • For Security & Risk Professionals

    Report:Secure And Protect Mobile Moments

    Executive Overview: The Mobile Security Playbook

    The mobile mind shift is an expectation that an individual can get what she wants in her immediate context and moments of need. The shift is a global phenomenon that is happening now, not only with...

    • Downloads: 1164
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 831
  • For Infrastructure & Operations Professionals

    Report:Building The Always-On, Always-Available Enterprise

    Three Steps To Get You On The Path To Running 24x7x365 Services

    Your extended enterprise consists of customers, partners, suppliers, and employees, and every stakeholder in this ecosystem expects your services to be available 24x7x365 in a seamless fashion. But...

    • Downloads: 528
  • For Security & Risk Professionals

    Report:Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses, but for economic and even political gain, highly skilled cybercriminals and malicious insiders are determined to steal it. Meanwhile, customers...

    • Downloads: 978
  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires ThreatGrid, Bolstering Advanced Malware Protection

    Cisco Broadens A Strong Portfolio But Still Needs To Better Explain Its Overall Security Product Road Map

    On May 20, 2014, Cisco Systems announced its intention to acquire privately-held dynamic malware analysis company ThreatGrid for an undisclosed amount. This acquisition enhances Cisco Systems'...

    • Downloads: 96
  • For Infrastructure & Operations Professionals

    Report:The State Of Business Technology Resiliency, Q2 2014

    Infrastructure and operations (I&O) leaders have a growing number of services and tools to better prepare themselves for any type of event, whether it's natural or manmade; however, that doesn't mean...

    • Downloads: 242
  • For Security & Risk Professionals

    Report:TechRadar™: Data Security, Q2 2014

    Road Map: The Data Security And Privacy Playbook

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming a...

    • Downloads: 734
  • For Security & Risk Professionals

    Report:Brief: Insights For S&R Pros From IBM's CIO Leadership Exchange

    The Time Is Now For CISOs To Move From The Back Office To The Front Office

    On March 13, 2014, IBM hosted close to 200 CIOs from North America for a two-day event in Chicago. Discussion focused on the impact that big data, cloud, and new customer engagement models such as...

    • Downloads: 109
  • For Infrastructure & Operations Professionals

    Report:Execute The Five Key Processes Of The Business Technology Resiliency Life Cycle

    This report outlines Forrester's solution for infrastructure and operations (I&O) leaders responsible for developing and implementing the core processes that support business technology (BT)...

    • Downloads: 312
  • For Security & Risk Professionals

    Report:Industry Spotlight: US Healthcare Security Budgets, Priorities, And Challenges

    Healthcare Providers Must Move Beyond Compliance To Improve Security

    Historically, IT security teams within US healthcare providers have had much smaller budgets than counterparts in other industries. As a result, they have struggled to implement advanced security...

    • Downloads: 418
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1014
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

    • Downloads: 747
  • For Security & Risk Professionals

    Report:Quick Take: IBM Buys Trusteer And, With It, Better, More-Intelligent Data-Centric Security

    Prospects Are Good For This Acquisition, Which Matches Complementary Strengths

    On August 15, 2013, IBM announced its acquisition, for an undisclosed sum, of Trusteer, a fraud protection and cybersecurity firm focused primarily on providing services to banking customers. With...

    • Downloads: 194