Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
The biggest issue facing information security professionals is that our traditional trust model is broken. Security devices have two interfaces: One interface is labeled "trusted," and the other is labeled "untrusted." In today's threat environment, which interface goes to the Internet? Threats from malicious insiders are growing at a rapid pace, but information security professionals are conditioned to think of the internal network as safe and the Internet as evil. Companies have invested great sums of money in technologies designed to protect them, but attacks still happen. To deal with this issue, Forrester has developed a secure network architecture that embraces the concept of the Zero Trust Model of information security." The Zero Trust Model is built on the idea that security must become ubiquitous throughout your infrastructure.
Agenda:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
Digital sovereignty is changing the IT and cloud market with ever-evolving regulations and new requirements. But unlike in other areas, there is no single body of legislation that ordains what directives organizations and vendors should abide by in planning their sovereign IT deployments. In this webinar, we explore the global state of digital sovereignty, regulations that apply worldwide, and what to do about them.Key takeaways: Discover the state of digital sovereignty globally.Understand global digital sovereignty regulations.Learn how to comply with ever-changing sovereignty needs.Learn how to plan for digital sovereignty in the long term.Target audience level: intermediate
Learn about the four key phases of the development, security, and operations (DevSecOps) journey (prepare, crawl, walk, and run) as well as the best practices in each phase to either jump-start your transformation or move to the next level.Key takeaways: Learn the four DevSecOps phases.Learn the role that people, process, technology, and governance play at each phase.Learn how to get started or level up on your journey!Target audience level: all levels
Anyone who sells software or digital goods online and wants to grow through globalization will at least consider a third-party Merchant Of Record model. Merchant of Record (MOR) solutions have existed for decades, but the industry has made headlines recently with some notable departures: Digital River, a former heavyweight in the market, is closing up shop, and a relative newcomer in the category, Lemon Squeezy, was acquired by payments heavyweight Stripe, which, per its founder, will “scale Merchant Of Record selling in a big way.”In this webinar, Forrester analyst Lily Varon is joined by a panel of CEOs from three major players in the MOR solution space: David Nachman, CEO of FastSpring; Jimmy Fitzgerald, CEO of Paddle; and Wendi Sturgis, CEO of Cleverbridge. Key takeaways: Understand what is really going on with the Merchant Of Record market right now.Learn how to avoid common pitfalls of MOR selling.Discover the best ways for digital leaders to prepare for the future of MOR selling.Target audience level: all levels
In May 2023, Forrester CEO and chairman George Colony said: “You can’t wait on this technology. Study it, experiment with it, have a vision.” We took our own advice and within six weeks had a working prototype of what became Izola [eye-ZO-la], Forrester’s generative AI (genAI) tool for clients. Since Izola was made broadly available to all clients in March, it is now one of the most used features on the Forrester platform.In this panel-style webinar, learn from the team that built Izola about the business and technology strategies and decisions that led to its inception and continual evolution. The team also shares key Forrester research and analysts they leveraged that you should take advantage of, too.Key takeaways:Discover Izola and how it works.Understand the business and technology strategy that led to Izola and its continual evolution.Learn best practices and lessons learned from the team that built Izola.Identify key Forrester resources the Izola team used that are also available to you.Target audience level: beginner and intermediate
Mobility is changing across all three categories of personal transportation (e.g., cars, scooters), public transportation (e.g., buses, trains), and the movement of goods (e.g., trucks, ships, planes, drones). Electrification and increasing levels of autonomy may grab the headlines, but there’s more to the shift than that. Join this webinar to hear about the future of mobility and to understand its implications for your business.Key takeaways:Understand the impact of vehicles that are increasingly connected, autonomous, shared, and electric.Explore the implications for transport infrastructure and the very different challenges facing urban and rural mobility.Learn about the three innovation horizons shaping the future of mobility, from short-term innovations to longer-term rethinking of entire business models.Target audience level: all levels
In our 22-criterion evaluation of mobile threat defense (MTD) providers, we identified the 11 most significant ones — Blackberry, Broadcom, Check Point, ESET, IBM, Jamf, Lookout, Pradeo, Sophos, Trend Micro, and Zimperium — and researched, analyzed, and scored them. This webinar reviews the results of the report and shows how each provider measures up to help security and risk professionals select the right one for their needs.Key takeaways:Understand the MTD market.Identify the key vendors you should consider.Learn about the future of the MTD market.Target audience level: intermediate