Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
Join Forrester VP and principal analysts Sucharita Kodali and Martha Bennett for the next episode of the 2021 "Retail Lens" webinar series. In this episode, Sucharita and Martha discuss:
Target audience level: intermediate
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
With a high-performance IT strategy, you’ll tailor your capabilities — technologies, skills, and practices — to continuously improve business outcomes with technology. To start your journey to high-performance IT, assess your business needs, your technology's current styles, and your ability to execute. Use these assessments to identify gaps in your execution and technology capabilities and to plot your investment strategy. Use assessments for annual planning, to respond to a sudden business shift, or to address the needs of a specific business initiative.Key takeaways: Learn how to assess your high-performance IT readiness.Learn how best to identify a dominant business need and the best IT style to achieve it.Discover how, empowered by this analysis, you are ready to pivot your investment budget to the capabilities and operating model that will drive the greatest business impact.Target audience level: intermediate
This webinar was originally scheduled for April 17th, 2024.The specter of attackers going wild with the possibilities of generative AI looms large in cybersecurity-focused media coverage. More importantly, generative AI has the potential to dramatically change the way security practitioners operate. This webinar discusses how security tools are incorporating generative AI and shows security and risk leaders what they need to prepare for as this technology evolves.Key takeaways:Explore the current state of generative AI in security tools.Understand how security tools are leveraging generative AI across domains (detection and response, governance, Zero Trust, identity).Learn actionable next steps to help your team get value out of generative AI.Target audience level: all levels
Have you ever encountered tall poppy syndrome? It’s a social phenomenon that occurs when talented individuals are resented or criticized because their achievements elevate them above their peers. This harmful mindset stifles team growth, damages morale, and creates a culture of mediocrity and conformity.Overcoming tall poppy syndrome requires extraordinary operations leaders to effectively navigate challenges and drive success while creating a positive and productive environment.Key takeaways:Explore the critical operations leadership skills required in today’s dynamic and rapidly changing business environment.Explore delving into four primary leadership skills operations leaders must focus on for success.Learn how to inspire and motivate a team and drive a supportive culture.Target audience level: all levels
The 2024 edition of our annual top security recommendations advises security leaders to tackle changes in tech, the threat landscape, and potential consequences facing the organization and themselves by acting quickly and marshalling the necessary resources and allies to ensure business growth in 2024. Join us in this webinar to go over highlights from our 2024 recommendations and hear directly from the analysts making these calls.Key takeaways:Learn the most important recommendations for your security strategy in 2024 and our rationale behind them.Leverage our research and insights to guide your security program strategy.Understand how to prioritize changes in areas including generative AI, privacy and data protection, OT/ICS security, fraud mitigation, and security leadership in the coming year.Target audience level: intermediate
Confused about secure access service edge (SASE), Zero Trust edge (ZTE), and security service edge (SSE)? The two most popular analysts of the modern era break down the differences, help you choose a vendor, and finally unite networking and security!Key takeaways:Understand the differences between SASE, ZTE, and SSE.Learn how to choose the architecture and vendor that is right for your organization.Target audience level: intermediateVendors: Broadcom, Cisco Systems, Cloudflare, Forcepoint, Fortinet, iBoss, Lookout, Netskope, Microsoft, Palo Alto Networks, Skyhigh Security, Zscaler
In 2023, the top 35 global data breaches exposed about 1.5 billion records, and the top 35 global privacy abuses led to almost $2.6 billion in fines. What can security leaders learn from these incidents? Join several members of Forrester’s security and risk team for a deep dive into key trends and a robust discussion of lessons learned.Key takeaways: Discover key trends in the top data breaches and privacy abuses of 2023.Use lessons learned from these events to support proposed security initiatives with your executive team.Learn how to justify your team’s involvement in key partnerships and business initiatives and manage your own risk as a security leader.Target audience level: beginner