
See how your organization’s approach to security platforms, AI, and skills compares to other organizations.
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
So far, 2025 is proving to be a challenging and volatile time, especially for security and risk professionals. Charged with protecting the enterprise, security leaders can’t take a backseat to facing and taking charge of volatility. In this webinar, analysts from Forrester’s security and risk team will discuss some immediate actions you can take to help your enterprise navigate the current chaos and improve your organization’s security posture
Key takeaways:
Target audience level: beginner and intermediate
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
See how your organization’s approach to security platforms, AI, and skills compares to other organizations.
CISOs know cybersecurity is a core competency of their enterprise; this report provides a methodology that proves it and helps them win the budget battles they fight.
This annual report offers security and risk leaders advice on changing roles and organizational consequences, changing and emerging tech, and the ever-evolving threat landscape.
Understand the human experience of change, and master seven activities to improve your change leadership skills.
This report highlights some of the best influence and engagement activities that security leaders use to engage and influence executives and boards.
This report guides S&R pros through the process of building a network of security champions to augment your team, influence culture, and help your initiatives succeed.
Success in change initiatives depends on leaders’ ability to communicate effectively to employees.
In our 35-criterion evaluation of human risk management solution providers, we identified the most significant ones and researched, analyzed, and scored them.
This report explores tensions between security and technology, the mutual benefits of an alliance, and how to build, repair, improve or elevate the relationship.
Leadership storytelling is vital to guide teams through uncertainty and ambiguity.
This report analyzes burnout in cybersecurity and offers detailed guidance on how to address it based on your teams’ profiles and the causes of their burnout.
Understand the impact of employee burnout and gain insights on how to begin to address it at your organization.
To survive and thrive in the future of work, organizations must evolve from “doing” to “learning” in every aspect of their business process.
Tech leaders should institute skills-based talent strategies to improve how their team delivers.
Use this report to identify and track the top 11 systemic risks for 2024.
Understand how to defend against nation-state cyberattacks and prepare for the regulatory responses that’ll follow.
Create your unique strategy and make the case for Zero Trust in six Forrester Zero Trust Certification courses.
Accelerate innovation with deeper insights about why autonomous mobility is important, when it will likely pay off, and how others are using it; we feature the latest expert insights, practical tips, and key steps you and your team can take with this rapidly evolving technology. Autonomous mobility can potentially transform transportation, logistics, and urban planning over a mid- to long-term horizon. Join this session to learn more about how this technology will mature and steps you can take to maximize your investment in it.Key takeaways: Learn how autonomous vehicles are shaping the future of transportation.Understand the regulatory and technical challenges.Explore pilot projects and adoption trends.Target audience level: all levels
End-to-end automation means different things to different people. At its narrowest, it’s going from compile to staging. More broadly, it can encompass the entire software development lifecycle, from collecting requirements to eventual retirement of the product and the infrastructure it runs on. Join Naveen, Chris, and Andrew to learn where to best end — and start — your automation journey.Key takeaways: Learn what end-to-end automation means.Discover how to redefine the boundaries of automation.Target audience level: intermediate and advanced
Disruptive technologies are a double-edged sword for environmental sustainability, offering both crucial enablers and significant challenges. On the positive side, technology innovations accelerate energy and resource efficiency, aid in climate adaptation and risk mitigation, monitor crucial sustainability metrics, and even help in environmental conservation. However, the necessary compute power, volume of waste, types of materials needed, and scale of implementing these technologies can offset their benefits.In this webinar, we discuss our latest report, which explores the dual roles of six disruptive technologies, and illustrate the beneficial use cases to guide sustainability and technology leaders on how to use them for good.Key takeaways: Explore the case studies and examples on leveraging disruptive technologies to focus on optimization.Learn about the disruptive technologies that will make the most impact in sustainability in 2025.Target audience level: beginner and intermediate
Generative AI (genAI) has distinct security-, efficiency-, and agility-boosting effects in customer identity and access management (IAM), anti-money laundering (AML), and fraud management. This webinar highlights how to use these capabilities.Key takeaways: Learn the uses of genAI in customer IAM.Discover the uses of genAI in fraud management and AML.Explore the risks of genAI and how to overcome them.Target audience level: intermediate and advanced
The CISO is the arbiter of confidence and protection for the business in a world of geopolitical strife and shifting allegiances; regulatory hurdles and changes to AI and tech; quickly emerging and changing technologies in generative AI (genAI); and constantly evolving cybercriminal activity, including deepfakes. In 2025, five threats will affect security teams more than any other: global regulatory disruptions, high-quality deepfakes, tech exuberance over genAI, job loss radicalization, and genAI-driven extortion. Security pros need to prepare in advance.Key takeaways: Global regulatory disruptions: Data-related policies, regulations, and standards are becoming less aligned between domains and across countries.High-quality deepfakes: Attackers are increasingly using deepfakes because of their ability to cast doubt on security, trust in the media, and brand reputation. Deepfakes impact verification and authentication for almost every user group, including customers, business partners, and workforce members.Tech exuberance over genAI: Enterprise adoption of genAI continues to accelerate as models proliferate, training costs come down, and deployment options increase. But tech and security leaders are learning hard lessons about how different models behave — and the work required to make them secure — as new models emerge.Job loss radicalization: A new economic reality has emerged in 2025 with a flurry of activity that saw job cuts to 4% of the US federal government workforce, massive tech layoffs, and job cuts in Europe. Employees who remain after layoffs are not happy.GenAI-driven extortion: Between continued law enforcement disruption of ransomware gangs and enterprises’ greater focus on business resilience and data backups, ransomware became less lucrative for cybercriminals in 2024. Before genAI, stealing data was only so useful — reviewing millions of emails takes far too much time. Now, with genAI, attackers can perform a quick sentiment analysis on troves of stolen data for extortion schemes.Target audience level: intermediate
If you couldn’t attend RSAC Conference 2025 (or even if you did), the Forrester Security & Risk Team has you covered. Join us for a roundtable on the key themes from the conference, takeaways from the show floor, and insights from some of the biggest sessions.Key takeaways: Learn about the most prominent technology and security themes at the conference.Discover which products and markets are dominating the show floor (and which ones have gone quiet).Hear our takeaways from the RSAC Innovation Sandbox.Explore expo trends: animals, nostalgia, and experiences.Target audience level: all levels