
This report provides security leaders with recommendations for handling the challenges they will encounter in the next 12 months.
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
To be a vital part of business growth, security leaders must embrace change and lead teams and stakeholders through it by being open to new possibilities while being explicit about potential risks. Join us for an interactive peer discussion to preview our report on the most important recommendations for your security program in 2025. Discuss the findings with the report’s lead authors and understand the rationale behind them. Additionally, you’ll have the opportunity to leverage your peers’ insights, challenges, and priorities to guide your security strategy for the next year.
Peer discussions are available exclusively to Forrester Decisions VIP Leaders and Leader license holders for their own participation.
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
This report provides security leaders with recommendations for handling the challenges they will encounter in the next 12 months.
This report includes our top recommendations for 2023 to help CISOs solve the problems they will encounter in the next 12 months.
Digital sovereignty is changing the IT and cloud market with ever-evolving regulations and new requirements. But unlike in other areas, there is no single body of legislation that ordains what directives organizations and vendors should abide by in planning their sovereign IT deployments. In this webinar, we explore the global state of digital sovereignty, regulations that apply worldwide, and what to do about them.Key takeaways: Discover the state of digital sovereignty globally.Understand global digital sovereignty regulations.Learn how to comply with ever-changing sovereignty needs.Learn how to plan for digital sovereignty in the long term.Target audience level: intermediate
Learn about the four key phases of the development, security, and operations (DevSecOps) journey (prepare, crawl, walk, and run) as well as the best practices in each phase to either jump-start your transformation or move to the next level.Key takeaways: Learn the four DevSecOps phases.Learn the role that people, process, technology, and governance play at each phase.Learn how to get started or level up on your journey!Target audience level: all levels
Anyone who sells software or digital goods online and wants to grow through globalization will at least consider a third-party Merchant Of Record model. Merchant of Record (MOR) solutions have existed for decades, but the industry has made headlines recently with some notable departures: Digital River, a former heavyweight in the market, is closing up shop, and a relative newcomer in the category, Lemon Squeezy, was acquired by payments heavyweight Stripe, which, per its founder, will “scale Merchant Of Record selling in a big way.”In this webinar, Forrester analyst Lily Varon is joined by a panel of CEOs from three major players in the MOR solution space: David Nachman, CEO of FastSpring; Jimmy Fitzgerald, CEO of Paddle; and Wendi Sturgis, CEO of Cleverbridge. Key takeaways: Understand what is really going on with the Merchant Of Record market right now.Learn how to avoid common pitfalls of MOR selling.Discover the best ways for digital leaders to prepare for the future of MOR selling.Target audience level: all levels
The increasing prevalence of deepfakes in digital, online interactions has become a serious problem. They can wreak havoc on organizations by causing fraud losses, compliance issues, and reputational damage. But while deepfakes are getting harder to detect, there’s hope for organizations to manage and defeat them. Join Forrester for this webinar discussing protecting your organization from deepfakes and find out what works —and what doesn’t.Key takeaways: Discover why deepfakes are problematic in digital business.Understand why deepfakes are hard to fight.Learn how your organization can get started.Discover what vendors are doing.Target audience level: beginner and intermediate
The world woke up to a new tremor: DeepSeek’s partially open-source model, DeepThink (R1), by a company in China. With benchmarks comparable to other state-of-the-art models, reasoning explained by default, and low-cost development (less than US$6 million), it serves as another wake-up call. It opens the door to more disruption as smaller footprint models can run without the need for specialized hardware, accelerating edge computing use cases like autonomous vehicles and industrial automation. But risks abound in the form of data collection, storage, and release to regulatory authorities. The promise lies in model creation opportunities for many more startups and enterprises.Key takeaways: Learn what DeepSeek’s new model, DeepThink (R1), can do.Learn about its impact on the AI model market and on your enterprise AI ambitions.Discover which use cases are most impacted by this release. Understand the risks involved and how to navigate them.Target audience level: all levels
In our 23-criterion evaluation of attack surface management (ASM) providers, we identified the most significant ones and researched, analyzed, and scored them. This webinar shows how each provider measures up and helps security and risk (S&R) professionals select the right one for their needs.Key takeaways:Understand the ASM market.Identify the key vendors you should consider.Learn about the future of the ASM market.Target audience level: intermediate