Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
Cloud workload security (CWS) — including cloud security posture management, container security, and cloud workload protection — plays a very important role in migrating and maintaining security for cloud workloads. This webinar provides a market overview and high-level best practices for CWS deployment.
Key takeaways:
Target audience level: beginner and intermediate
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
The ITIL™ framework has been a mainstay of IT operational discipline, emerging as an authoritative inventory of key IT practices in the mid-1990s and enjoying broad adoption through the mid-2000s. But the Version 3 rewrite proposed an unworkable process-centric operating model that leading organizations bypassed in favor of DevOps and related approaches. While Version 4 made some necessary adjustments, the framework is now wholly owned by PeopleCert, who have shut out longstanding partners and increased costs for those seeking to gain or maintain certification. IT professionals have more effective and current guidance available.Key takeaways: Understand why now is the time to find alternative approaches to managing services.Understand the dynamics that are influencing the future of IT service management.Target audience level: intermediate
The CISO is the arbiter of confidence and protection for the business in a world of geopolitical strife and shifting allegiances; regulatory hurdles and changes to AI and tech; quickly emerging and changing technologies in generative AI (genAI); and constantly evolving cybercriminal activity, including deepfakes. In 2025, five threats will affect security teams more than any other: global regulatory disruptions, high-quality deepfakes, tech exuberance over genAI, job loss radicalization, and genAI-driven extortion. Security pros need to prepare in advance.Key takeaways: Global regulatory disruptions: Data-related policies, regulations, and standards are becoming less aligned between domains and across countries.High-quality deepfakes: Attackers are increasingly using deepfakes because of their ability to cast doubt on security, trust in the media, and brand reputation. Deepfakes impact verification and authentication for almost every user group, including customers, business partners, and workforce members.Tech exuberance over genAI: Enterprise adoption of genAI continues to accelerate as models proliferate, training costs come down, and deployment options increase. But tech and security leaders are learning hard lessons about how different models behave — and the work required to make them secure — as new models emerge.Job loss radicalization: A new economic reality has emerged in 2025 with a flurry of activity that saw job cuts to 4% of the US federal government workforce, massive tech layoffs, and job cuts in Europe. Employees who remain after layoffs are not happy.GenAI-driven extortion: Between continued law enforcement disruption of ransomware gangs and enterprises’ greater focus on business resilience and data backups, ransomware became less lucrative for cybercriminals in 2024. Before genAI, stealing data was only so useful — reviewing millions of emails takes far too much time. Now, with genAI, attackers can perform a quick sentiment analysis on troves of stolen data for extortion schemes.Target audience level: intermediate
Generative AI (genAI) and agentic workflows are roiling technology services markets, overturning the 15-year stability of the prevailing business model. The era defined by time-and-materials pricing, agnostic technology positions, and people-driven business growth is no longer viable. Since the peak growth seen in 2021, the sector has become entirely different.Starting in 2022, four powerful forces began converging to disrupt the services status quo, forcing providers toward radically different choices and reshaping the sector to deliver what enterprises need now.Key takeaways: Learn how four forces shape technology service business models.Find out what separates winners from losers.Explore how, as a buyer of services, you can thrive in a reconstructed services economy.Target audience level: intermediate
This client webinar was originally scheduled for March 26th, 2025.Machinery-of-government (MoG) changes restructure agencies, eliminating or splitting up some, combining others, and often causing radical shifts in mission. The US is currently facing significant upheaval across federal agencies, as the current administration has intensified these changes.In this webinar, we explore best practices, examples, and considerations that you should be aware of to successfully weather these changes.Key takeaways: Learn how to facilitate successful organizational transformations.Create a plan to address upheaval and change.Understand best practices for MoG change.Target audience level: all
In this webinar we will look at the state of IT sustainability survey Forrester conducted at the end of 2024 looking at the buyer and spending behavior for sustainability initiatives for 2025. We will take a closer look at the most impactful initiatives on sustainability enterprise leaders told us they undertook in the past year how investments will look like for 2025 the key capabilities for sustainability management software solutions that enterprise leaders sort and the services capabilities that were most asked for in the market.Key takeaways: Buyer trends for sustainability management softwareServices partnerships enterprises seekMost impactful IT decarbonization efforts by organizationsTarget audience level: all levels
In today's volatile environment, disciplined risk management and adaptive change leadership are essential for technology leaders. The constant volatility has upended carefully crafted tech strategies, budgets, and priorities, leaving technology leaders feeling unsure and overwhelmed. However, there is a way to navigate the chaos, regain control, and lead people through difficult times. This session will explore how to detect and decide which risks to take in pursuit of strategic goals, using the Three Es framework to identify risks within the enterprise, ecosystem, and external environment. Next, we’ll cover specific levers to optimize IT investments helping you to rationalize portfolios and identify quick wins to cut costs and prioritization for complex long-term initiatives. Join us to gain insights on creating a resilient, secure, and future-ready IT infrastructure that thrives in uncertainty. Key takeaways: Learn how to identify and manage risks across your enterprise, ecosystem, and external environment using the Three Es framework. Discover strategies to streamline your tech stack, reduce costs, and enhance performance through portfolio rationalization and automation.Understand how to balance long-term strategies with the ability to adapt to rapid changes, focusing on both processes and people.Gain insights on building a secure, AI-ready, and future-proof IT infrastructure that can thrive in times of uncertaintyTarget audience level: beginner and intermediate