Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
The executive order doesn't directly touch the private sector, but major transformative efforts like this will lead to change well beyond government for security vendors and enterprise organizations. This webinar dives into the different sections of this new executive order and how it will modernize security for the federal government, putting Zero Trust front and center and creating downstream impacts on the private sector.
Key takeaways:
Target audience level: intermediate
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
The increasing prevalence of deepfakes in digital, online interactions has become a serious problem. They can wreak havoc on organizations by causing fraud losses, compliance issues, and reputational damage. But while deepfakes are getting harder to detect, there’s hope for organizations to manage and defeat them. Join Forrester for this webinar discussing protecting your organization from deepfakes and find out what works —and what doesn’t.Key takeaways: Discover why deepfakes are problematic in digital business.Understand why deepfakes are hard to fight.Learn how your organization can get started.Discover what vendors are doing.Target audience level: beginner and intermediate
Digital sovereignty is changing the IT and cloud market with ever-evolving regulations and new requirements. But unlike in other areas, there is no single body of legislation that ordains what directives organizations and vendors should abide by in planning their sovereign IT deployments. In this webinar, we explore the global state of digital sovereignty, regulations that apply worldwide, and what to do about them.Key takeaways: Discover the state of digital sovereignty globally.Understand global digital sovereignty regulations.Learn how to comply with ever-changing sovereignty needs.Learn how to plan for digital sovereignty in the long term.Target audience level: intermediate
Learn about the four key phases of the development, security, and operations (DevSecOps) journey (prepare, crawl, walk, and run) as well as the best practices in each phase to either jump-start your transformation or move to the next level.Key takeaways: Learn the four DevSecOps phases.Learn the role that people, process, technology, and governance play at each phase.Learn how to get started or level up on your journey!Target audience level: all levels
The world woke up to a new tremor: DeepSeek’s partially open-source model, DeepThink (R1), by a company in China. With benchmarks comparable to other state-of-the-art models, reasoning explained by default, and low-cost development (less than US$6 million), it serves as another wake-up call. It opens the door to more disruption as smaller footprint models can run without the need for specialized hardware, accelerating edge computing use cases like autonomous vehicles and industrial automation. But risks abound in the form of data collection, storage, and release to regulatory authorities. The promise lies in model creation opportunities for many more startups and enterprises.Key takeaways: Learn what DeepSeek’s new model, DeepThink (R1), can do.Learn about its impact on the AI model market and on your enterprise AI ambitions.Discover which use cases are most impacted by this release. Understand the risks involved and how to navigate them.Target audience level: all levels
In our 23-criterion evaluation of attack surface management (ASM) providers, we identified the most significant ones and researched, analyzed, and scored them. This webinar shows how each provider measures up and helps security and risk (S&R) professionals select the right one for their needs.Key takeaways:Understand the ASM market.Identify the key vendors you should consider.Learn about the future of the ASM market.Target audience level: intermediate
In May 2023, Forrester CEO and chairman George Colony said: “You can’t wait on this technology. Study it, experiment with it, have a vision.” We took our own advice and within six weeks had a working prototype of what became Izola [eye-ZO-la], Forrester’s generative AI (genAI) tool for clients. Since Izola was made broadly available to all clients in March, it is now one of the most used features on the Forrester platform.In this panel-style webinar, learn from the team that built Izola about the business and technology strategies and decisions that led to its inception and continual evolution. The team also shares key Forrester research and analysts they leveraged that you should take advantage of, too.Key takeaways:Discover Izola and how it works.Understand the business and technology strategy that led to Izola and its continual evolution.Learn best practices and lessons learned from the team that built Izola.Identify key Forrester resources the Izola team used that are also available to you.Target audience level: beginner and intermediate