
This report explores Forrester’s five predictions for cybersecurity, privacy, and risk in 2024.
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
Security, risk, and privacy leaders must balance the speed of innovation with governance and accountability beyond regulatory mandates amidst a backdrop of interconnected risks. In 2024, Zero Trust (ZT) will get dedicated resources; flaws in AI-generated code will be exploited; the handling of personally identifiable information (PII) will draw regulatory scrutiny; cyberinsurers will become more selective; and firms will recognize that we can’t train our way out of a breach. This webinar explores Forrester’s five predictions for cybersecurity, privacy, and risk in 2024.
Key takeaways:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
The increasing prevalence of deepfakes in digital, online interactions has become a serious problem. They can wreak havoc on organizations by causing fraud losses, compliance issues, and reputational damage. But while deepfakes are getting harder to detect, there’s hope for organizations to manage and defeat them. Join Forrester for this webinar discussing protecting your organization from deepfakes and find out what works —and what doesn’t.Key takeaways: Discover why deepfakes are problematic in digital business.Understand why deepfakes are hard to fight.Learn how your organization can get started.Discover what vendors are doing.Target audience level: beginner and intermediate
Digital sovereignty is changing the IT and cloud market with ever-evolving regulations and new requirements. But unlike in other areas, there is no single body of legislation that ordains what directives organizations and vendors should abide by in planning their sovereign IT deployments. In this webinar, we explore the global state of digital sovereignty, regulations that apply worldwide, and what to do about them.Key takeaways: Discover the state of digital sovereignty globally.Understand global digital sovereignty regulations.Learn how to comply with ever-changing sovereignty needs.Learn how to plan for digital sovereignty in the long term.Target audience level: intermediate
Machinery-of-government (MoG) changes restructure agencies, eliminating or splitting up some, combining others, and often causing radical shifts in mission. The US is currently facing significant upheaval across federal agencies, as the current administration has intensified these changes.In this webinar, we explore best practices, examples, and considerations that you should be aware of to successfully weather these changes.Key takeaways: Learn how to facilitate successful organizational transformations.Create a plan to address upheaval and change.Understand best practices for MoG change.Target audience level: all
The world woke up to a new tremor: DeepSeek’s partially open-source model, DeepThink (R1), by a company in China. With benchmarks comparable to other state-of-the-art models, reasoning explained by default, and low-cost development (less than US$6 million), it serves as another wake-up call. It opens the door to more disruption as smaller footprint models can run without the need for specialized hardware, accelerating edge computing use cases like autonomous vehicles and industrial automation. But risks abound in the form of data collection, storage, and release to regulatory authorities. The promise lies in model creation opportunities for many more startups and enterprises.Key takeaways: Learn what DeepSeek’s new model, DeepThink (R1), can do.Learn about its impact on the AI model market and on your enterprise AI ambitions.Discover which use cases are most impacted by this release. Understand the risks involved and how to navigate them.Target audience level: all levels
In our 23-criterion evaluation of attack surface management (ASM) providers, we identified the most significant ones and researched, analyzed, and scored them. This webinar shows how each provider measures up and helps security and risk (S&R) professionals select the right one for their needs.Key takeaways:Understand the ASM market.Identify the key vendors you should consider.Learn about the future of the ASM market.Target audience level: intermediate
In May 2023, Forrester CEO and chairman George Colony said: “You can’t wait on this technology. Study it, experiment with it, have a vision.” We took our own advice and within six weeks had a working prototype of what became Izola [eye-ZO-la], Forrester’s generative AI (genAI) tool for clients. Since Izola was made broadly available to all clients in March, it is now one of the most used features on the Forrester platform.In this panel-style webinar, learn from the team that built Izola about the business and technology strategies and decisions that led to its inception and continual evolution. The team also shares key Forrester research and analysts they leveraged that you should take advantage of, too.Key takeaways:Discover Izola and how it works.Understand the business and technology strategy that led to Izola and its continual evolution.Learn best practices and lessons learned from the team that built Izola.Identify key Forrester resources the Izola team used that are also available to you.Target audience level: beginner and intermediate