Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
Enterprises must empower customers to drive deeper engagement — companies ignore this new reality at their peril. But the shift to an outside-in focus brings new demands to Business Process Professionals — who are already maxed out streamlining internal processes. Responding to these new business demands requires a fundamental shift in how you: 1) organize to meet the rising expectations of empowered customers; 2) transform your strategic business processes that serve customers; 3) develop the business process management and customer experience skills of Business Process Professionals driving process transformation; and 4) manage the culture change and new skill sets of people who not only serve customers but now proactively seek to delight customers. This outside-in shift also requires the mastery of customer-centric process disciplines like Lean and Lean Six Sigma and compels you to take advantage of the flexibility provided by BPM and dynamic case management. It requires a fundamental understanding of core technologies like CRM and customer service apps, demands a deep understanding of how to tap social channels that empower customers and drive deeper engagement, and requires you to look at how data and analytics are consumed in and produced by business processes.
In this Customer Empowerment Jam, Forrester analysts William Band, Craig Le Clair, Rob Karel, Derek Miers, Kate Leggett, and Mike Gilpin engage in an expert panel discussion, led by Vice President and Research Director Connie Moore, to deliver advice on how Business Process Professionals can help their organizations truly empower customers across multiple touchpoints, drive increased engagement that produces greater customer lifetime value, and deliver better customer outcomes, such as satisfaction and loyalty.
Agenda:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
Enterprise architecture is an important organizational interlock for security teams. To help better understand this, Vice President, Research Director Charlie Betz and Senior Analyst Carlos Rivera walk us through their research on the opportunities for collaboration between enterprise architecture and security to help security professionals better understand what the crossover is and what CISOs need to know to have a collaborative partnership. In this fireside chat, we identify links between Charlie’s research on enterprise architecture with the priorities of the security organization.Key takeaways:How enterprise architecture can help support the security teamHow security can help support enterprise architectureHow enterprise architecture can be an important stakeholder in Zero TrustTarget audience level: intermediate
So, your enterprise wants to become data-driven. You can implement the best data platforms, hire great people, and use the most sophisticated analysis techniques, but it’s all for naught if faulty analysis and human cognitive biases get in the way. The result? Poor business insights and data-driven decisions. Join this webinar to learn about seven data analysis failures to avoid. How many of these seven do you and/or your organization succumb to?Key takeaways: How human cognitive biases can lead to poor data analysis Seven data analysis failures to avoid (or exploit) Target level audience: beginner and intermediate
Cloud workload security (CWS) — including cloud security posture management, container security, and cloud workload protection — plays a very important role in migrating and maintaining security for cloud workloads. This webinar provides a market overview and high-level best practices for CWS deployment. Key takeaways: Get an overview of Forrester's cloud workload security evaluation. Review vendor profiles. Learn best practices. Discover Forrester’s predictions. Target audience level: beginner and intermediate