Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
After achieving initial success with BPM, Information and Knowledge Management Professionals are often pushed to accelerate and scale their efforts to develop and deliver multiple BPM projects in parallel. To meet these demands, BPM development teams and business analysts increasingly turn to agile development strategies that emphasize collaborative design, evolutionary requirements, and shared development. During this session, we will explore best practices for delivering Agile BPM projects.
Agenda
Vendors mentioned:Lombardi, Oracle
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
Enterprise architecture is an important organizational interlock for security teams. To help better understand this, Vice President, Research Director Charlie Betz and Senior Analyst Carlos Rivera walk us through their research on the opportunities for collaboration between enterprise architecture and security to help security professionals better understand what the crossover is and what CISOs need to know to have a collaborative partnership. In this fireside chat, we identify links between Charlie’s research on enterprise architecture with the priorities of the security organization.Key takeaways:How enterprise architecture can help support the security teamHow security can help support enterprise architectureHow enterprise architecture can be an important stakeholder in Zero TrustTarget audience level: intermediate
So, your enterprise wants to become data-driven. You can implement the best data platforms, hire great people, and use the most sophisticated analysis techniques, but it’s all for naught if faulty analysis and human cognitive biases get in the way. The result? Poor business insights and data-driven decisions. Join this webinar to learn about seven data analysis failures to avoid. How many of these seven do you and/or your organization succumb to?Key takeaways: How human cognitive biases can lead to poor data analysis Seven data analysis failures to avoid (or exploit) Target level audience: beginner and intermediate
Cloud workload security (CWS) — including cloud security posture management, container security, and cloud workload protection — plays a very important role in migrating and maintaining security for cloud workloads. This webinar provides a market overview and high-level best practices for CWS deployment. Key takeaways: Get an overview of Forrester's cloud workload security evaluation. Review vendor profiles. Learn best practices. Discover Forrester’s predictions. Target audience level: beginner and intermediate