Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
When Business Process Professionals turn to the business process management (BPM) training and certification market for skills development, they must sift through a wide range of training programs with competing BPM approaches, frameworks, and knowledge domains. This webinar helps BP Professionals determine what BPM training and certification providers are the best fit for their specific needs.
Agenda:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
Enterprise architecture is an important organizational interlock for security teams. To help better understand this, Vice President, Research Director Charlie Betz and Senior Analyst Carlos Rivera walk us through their research on the opportunities for collaboration between enterprise architecture and security to help security professionals better understand what the crossover is and what CISOs need to know to have a collaborative partnership. In this fireside chat, we identify links between Charlie’s research on enterprise architecture with the priorities of the security organization.Key takeaways:How enterprise architecture can help support the security teamHow security can help support enterprise architectureHow enterprise architecture can be an important stakeholder in Zero TrustTarget audience level: intermediate
So, your enterprise wants to become data-driven. You can implement the best data platforms, hire great people, and use the most sophisticated analysis techniques, but it’s all for naught if faulty analysis and human cognitive biases get in the way. The result? Poor business insights and data-driven decisions. Join this webinar to learn about seven data analysis failures to avoid. How many of these seven do you and/or your organization succumb to?Key takeaways: How human cognitive biases can lead to poor data analysis Seven data analysis failures to avoid (or exploit) Target level audience: beginner and intermediate
Cloud workload security (CWS) — including cloud security posture management, container security, and cloud workload protection — plays a very important role in migrating and maintaining security for cloud workloads. This webinar provides a market overview and high-level best practices for CWS deployment. Key takeaways: Get an overview of Forrester's cloud workload security evaluation. Review vendor profiles. Learn best practices. Discover Forrester’s predictions. Target audience level: beginner and intermediate