
AI’s rapid evolution demands a secure, trusted foundation. This report identifies the top 10 emerging technologies that balance these forces.
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
If you couldn’t attend RSAC Conference 2025 (or even if you did), the Forrester Security & Risk Team has you covered. Join us for a roundtable on the key themes from the conference, takeaways from the show floor, and insights from some of the biggest sessions.
Key takeaways:
Target audience level: all levels
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
AI’s rapid evolution demands a secure, trusted foundation. This report identifies the top 10 emerging technologies that balance these forces.
Improve your security and privacy programs based on lessons learned from the top global breaches and worst privacy abuses of 2024.
This annual report offers security and risk leaders advice on changing roles and organizational consequences, changing and emerging tech, and the ever-evolving threat landscape.
Organizations are moving quickly to embrace agentic AI for a myriad of use cases. Agentic AI, however, introduces cybersecurity challenges that traditional security frameworks and approaches can’t adequately address. Agentic technologies shift cybersecurity paradigms by promoting emergent behaviors to meet objectives, making it essential for security leaders to control intent at scale. As these technologies spread across organizations, establishing enterprise guardrails is critical for secure deployment.This webinar explores the unique cybersecurity challenges posed by agentic AI and strategies to effectively address them. The session will introduce Forrester’s AEGIS Framework, a comprehensive security model based on six domains: governance, identity and access management, data security, application security, threat management, and Zero Trust architecture principles. Attendees will learn best practices for securing agentic AI, emphasizing phased processes, human oversight, “least agency” principles, and dynamic security adjustments as AI systems evolve.Key takeaways: Why securing agentic AI is a challenge security teams must address nowHow the AEGIS framework helps security leaders secure agentic AIWhy intent is as important as outcomesWhat the core principles of securing agentic AI areHow to implement and mature AEGIS in a phased approachTarget audience level: intermediate
Every B2B sales rep wants professional development, but no one wants to take time from selling to participate in learning. For years, both HR and sales leaders defaulted to traditional learning management systems to provide sales training for reps, only to see invitations ignored and attendance embarrassingly low.In this webinar, learn how HR-owned LMS tools differ from revenue enablement platforms and how the latter better suit real-time training delivery to improve your sellers' competencies most effectively.Key takeaways: Learn how to reverse-engineer your sales training technology environment to suit learner needs.Discover what high-performing B2B sales organizations do to optimize learning participation and adoption.Identify which best practices in adult learning are best supported by properly integrated technologies.Target audience level: intermediate
Accelerate innovation with deeper insights about why TuringBots are important, when they will likely pay off, and how others are using them; we feature the latest expert insights, practical tips, and key steps you and your team can take with this rapidly evolving technology. TuringBots can potentially automate complex decision-making and enhance machine learning capabilities over a short- to mid-term horizon. Join this session to learn more about how this technology will mature and steps you can take to maximize your investment in it.Key takeaways: Learn how TuringBots are reshaping AI and machine learning.Understand their role in decision-making automation.Explore tools and platforms for TuringBot development.Target audience level: all levels
Generative AI (genAI) has distinct security-, efficiency-, and agility-boosting effects in customer identity and access management (IAM), anti-money laundering (AML), and fraud management. This webinar highlights how to use these capabilities.Key takeaways: Learn the uses of genAI in customer IAM.Discover the uses of genAI in fraud management and AML.Explore the risks of genAI and how to overcome them.Target audience level: intermediate and advanced
The CISO is the arbiter of confidence and protection for the business in a world of geopolitical strife and shifting allegiances; regulatory hurdles and changes to AI and tech; quickly emerging and changing technologies in generative AI (genAI); and constantly evolving cybercriminal activity, including deepfakes. In 2025, five threats will affect security teams more than any other: global regulatory disruptions, high-quality deepfakes, tech exuberance over genAI, job loss radicalization, and genAI-driven extortion. Security pros need to prepare in advance.Key takeaways: Global regulatory disruptions: Data-related policies, regulations, and standards are becoming less aligned between domains and across countries.High-quality deepfakes: Attackers are increasingly using deepfakes because of their ability to cast doubt on security, trust in the media, and brand reputation. Deepfakes impact verification and authentication for almost every user group, including customers, business partners, and workforce members.Tech exuberance over genAI: Enterprise adoption of genAI continues to accelerate as models proliferate, training costs come down, and deployment options increase. But tech and security leaders are learning hard lessons about how different models behave — and the work required to make them secure — as new models emerge.Job loss radicalization: A new economic reality has emerged in 2025 with a flurry of activity that saw job cuts to 4% of the US federal government workforce, massive tech layoffs, and job cuts in Europe. Employees who remain after layoffs are not happy.GenAI-driven extortion: Between continued law enforcement disruption of ransomware gangs and enterprises’ greater focus on business resilience and data backups, ransomware became less lucrative for cybercriminals in 2024. Before genAI, stealing data was only so useful — reviewing millions of emails takes far too much time. Now, with genAI, attackers can perform a quick sentiment analysis on troves of stolen data for extortion schemes.Target audience level: intermediate
Machinery-of-government (MoG) changes restructure agencies, eliminating or splitting up some, combining others, and often causing radical shifts in mission. The US is currently facing significant upheaval across federal agencies, as the current administration has intensified these changes.In this webinar, we explore best practices, examples, and considerations that you should be aware of to successfully weather these changes.Key takeaways: Learn how to facilitate successful organizational transformations.Create a plan to address upheaval and change.Understand best practices for MoG change.Target audience level: all