ON-DEMAND WEBINAR

The Top Cybersecurity Threats In 2018

Original Broadcast Date: January 16th, 2018
Josh Zelonis, Principal Analyst
Josh Zelonis Principal Analyst

Purchase Webinar

Get access to a single webinar that is currently outside of your subscription.

Price: $300 (USD)

Become a Client

Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.

  • Top Cybersecurity Threats In 2018
    Trend Report
    November 27th, 2017

    Security and risk (S&R) professionals have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to use historical attack trends to pr

    Josh Zelonis  
  • The Forrester Wave™: Digital Risk Monitoring, Q3 2016
    Wave Report
    September 28th, 2016

    In our 27-criteria evaluation of digital risk monitoring (DRM) solutions, we identified the nine most significant ones — BrandProtect, Crisp Thinking, Digital Shadows, DigitalStakeout, ListenLogic, LookingGlass, Proofpoint, RiskIQ, and ZeroFOX — and resea

  • Ransomware Protection: Five Best Practices
    Trend Report
    July 27th, 2017

    Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By focusing on the basics and implementing proper controls, howe

    Chris Sherman Salvatore Schiano  
  • Vendor Landscape: Third-Party Risk Intelligence
    Trend Report
    October 20th, 2017
    11 min read

    The third-party risk intelligence market covers a broad set of vendors with offerings; here we cover three of the most common solution categories.

    Claire O'Malley  
  • Vendor Landscape: Vulnerability Management, 2017
    Trend Report
    April 21st, 2017

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in enterprise breaches. Identifying vulnerable systems on your n

    Josh Zelonis