This report includes our top recommendations for 2023 to help CISOs solve the problems they will encounter in the next 12 months.
Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week of sessions and perspectives on today’s emerging security challenges and how organizations are addressing these trends.
In this webinar, Forrester’s Merritt Maxim, a VP and research director on the security and risk (S&R) team, leads a discussion with several of his S&R analyst colleagues to recap the 2023 RSA Conference. In this session, the S&R team highlights the key trends, announcements, and observations from this year’s event and provides practical guidance and recommendations on how organizations should respond to and address these cybersecurity trends.
Key takeaways:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
This report includes our top recommendations for 2023 to help CISOs solve the problems they will encounter in the next 12 months.
This report describes the top five cybersecurity threats organizations will face in 2023 and strategies to address them.
Harness the advantages of AI with help from this webinar series featuring the latest expert insights, practical tips, and key steps you and your team can take with this rapidly evolving technology.Discover the core ingredients of successful AI architecture in this engaging panel discussion. Our panel of experts dive into the intricacies of AI architecture, focusing on AI workloads and infrastructure encompassing clouds, chips, and models, as well as the right mix for different use cases and for seamless and efficient AI operations.Key takeaways:Explore the different components of AI architectures.Understand how these components work together in different types of workloads to deliver efficient AI.Determine how you can adjust your organization’s architecture to better build for AI.Target audience level: all levels
In our 22-criterion evaluation of mobile threat defense (MTD) providers, we identified the 11 most significant ones — Blackberry, Broadcom, Check Point, ESET, IBM, Jamf, Lookout, Pradeo, Sophos, Trend Micro, and Zimperium — and researched, analyzed, and scored them. This webinar reviews the results of the report and shows how each provider measures up to help security and risk professionals select the right one for their needs.Key takeaways:Understand the MTD market.Identify the key vendors you should consider.Learn about the future of the MTD market.Target audience level: intermediate
Harness the advantages of AI with help from this webinar series featuring the latest expert insights, practical tips, and key steps you and your team can take with this rapidly evolving technology.Forrester coined the TuringBots term years ago to discuss code automation by bot. Generative AI (genAI) has brought us to the TuringBot moment! GenAI has the potential to transform software development like no other use case by impacting the full software development lifecycle (SDLC). From code development, to testing and operations, to documentation, the impacts are immense, and our panelists discuss the myriad ways in which enterprises are using genAI for software development.Key takeaways:Understand what TuringBots are.Learn how genAI is accelerating the use of TuringBots.Determine potential ways genAI will be used in the software lifecycle development process.Target audience level: all levels
In this webinar, we discuss key findings and recommendations from our latest application security research.Key takeaways:Learn about key trends in application security attacks, leadership priorities, and budgets.Discover which application security technologies are at the top of the list for adoption in the coming year.Explore steps you can take to level up your application security program.Target audience level: all levels
After the immediate crisis is over, the long-term crisis will just be unfolding. Given the magnitude and impact of the event, every Security and Tech leader must be prepared to respond to urgent questions from their executives, their board, and even their customers and employees. To ensure the organization isn’t susceptible to such an event again, Security and Tech Leaders will need to reexamine their overall concentration risk, third party and supply chain risk, and overall security strategy. It will also demand a reexamination of how IT manages and monitors its critical IT infrastructure, and how robust and automated its capabilities are for incident response, remediation, and crisis management and communication.Key takeaways: Learn about the short-term and long-term implications of this event for Security Leaders, Tech Leaders, and the security industry itself.Hear key recommendations from Forrester analysts on next steps.Ask the analysts for insights and advice live.Target audience level: all levels
Join us for an exclusive webinar featuring leading experts in cybersecurity as they unpack the latest trends and insights from the Infosecurity Europe Conference in London. Research associate Zaklina Ber, research director Paul McKay, and senior analysts Tope Olufon and Madelein van der Hout discuss findings from their research on cybersecurity trends and their conference visit. This session is designed for tech executives seeking to stay ahead of the curve in the ever-evolving landscape of cybersecurity. Discover what these trends mean for your organization and how to strategically navigate the challenges and opportunities they present. Don't miss this opportunity to gain valuable knowledge and practical advice!Key takeaways:Discover the latest findings in information security.Gain insights into broader market trends.Learn what these trends mean for your organization.Target audience level: all levels