
This report details the departments and use cases driving the adoption of generative AI and the threats and risks security teams will need to defend against.
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
This webinar was originally scheduled for September 19th, 2024.
Harness the advantages of AI with help from this webinar series featuring the latest expert insights, practical tips, and key steps you and your team can take with this rapidly evolving technology.
In the realm of generative AI (genAI), where machines possess the ability to create and mimic human-like content, the need for robust security measures is paramount. This panel discussion delves into the challenges and strategies involved in securing genAI systems to prevent misuse and malicious intent. On the other hand, genAI can play a role in helping security officials in their workplace. Webinar panelists discuss the various ways genAI will help security officials in their difficult task of keep systems secure.
Key takeaways:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
This report details the departments and use cases driving the adoption of generative AI and the threats and risks security teams will need to defend against.
This report outlines how security tools are incorporating generative AI and what security and risk pros need to prepare for as this technology evolves.
Read this report to learn more about how generative AI is affecting security leaders.
Anyone who sells software or digital goods online and wants to grow through globalization will at least consider a third-party Merchant Of Record model. Merchant of Record (MOR) solutions have existed for decades, but the industry has made headlines recently with some notable departures: Digital River, a former heavyweight in the market, is closing up shop, and a relative newcomer in the category, Lemon Squeezy, was acquired by payments heavyweight Stripe, which, per its founder, will “scale Merchant Of Record selling in a big way.”In this webinar, Forrester analyst Lily Varon is joined by a panel of CEOs from three major players in the MOR solution space: David Nachman, CEO of FastSpring; Jimmy Fitzgerald, CEO of Paddle; and Wendi Sturgis, CEO of Cleverbridge. Key takeaways: Understand what is really going on with the Merchant Of Record market right now.Learn how to avoid common pitfalls of MOR selling.Discover the best ways for digital leaders to prepare for the future of MOR selling.Target audience level: all levels
As we move further into 2025, the security landscape continues to evolve in parallel with the uncertainty unfolding globally. Our latest report, Top Recommendations For Your Security Program, 2025, provides timely guidance for security leaders as they navigate another precarious year for their roles, programs, and organizations. Join us in this webinar to go over highlights from our 2025 recommendations and hear directly from the analysts making these calls.Key takeaways: Learn the most important recommendations for your security strategy in 2025 and our rationale behind them.Leverage our research and insights to guide your security program strategy.Understand how to prioritize changes in areas including security platforms, privacy and data protection, critical infrastructure, emerging tech, and security leadership in the coming year.Target audience level: intermediate
So far, 2025 is proving to be a challenging and volatile time, especially for security and risk professionals. Charged with protecting the enterprise, security leaders can’t take a backseat to facing and taking charge of volatility. In this webinar, analysts from Forrester’s security and risk team will discuss some immediate actions you can take to help your enterprise navigate the current chaos and improve your organization’s security posture Key takeaways: Learn ways to optimize current security spending.Understand the broader enterprise risks facing all organizations in 2025.Learn how to improve your organization's approach to enterprise risk management to address these risksDiscover how having a structured approach to change management can optimize business performance. Target audience level: beginner and intermediate
Generative AI (genAI) is profoundly impacting the knowledge economy and knowledge work with the promise of improved productivity for knowledge workers. As we embrace these transformative forces, organizations must go beyond integrating AI into existing workflows and reimagine how work is performed. GenAI should empower the genAI worker — the curious questioner who drives a learning organization — transcending mundane tasks and fostering creativity and innovation. Knowledge improves the human ability to create and engage in innovation. Now is the time to build knowledge capacity and harness genAI wisely, bridging the gap and propelling us toward a future where AI truly becomes our advantage.Key takeaways: Learn how long-standing knowledge management beliefs are changing.Explore the use cases of genAI in knowledge management solutions. Understand critical success factors.Target audience level: intermediate
Learn about the four key phases of the development, security, and operations (DevSecOps) journey (prepare, crawl, walk, and run) as well as the best practices in each phase to either jump-start your transformation or move to the next level.Key takeaways: Learn the four DevSecOps phases.Learn the role that people, process, technology, and governance play at each phase.Learn how to get started or level up on your journey!Target audience level: all levels
Digital sovereignty is changing the IT and cloud market with ever-evolving regulations and new requirements. But unlike in other areas, there is no single body of legislation that ordains what directives organizations and vendors should abide by in planning their sovereign IT deployments. In this webinar, we explore the global state of digital sovereignty, regulations that apply worldwide, and what to do about them.Key takeaways: Discover the state of digital sovereignty globally.Understand global digital sovereignty regulations.Learn how to comply with ever-changing sovereignty needs.Learn how to plan for digital sovereignty in the long term.Target audience level: intermediate