Jinan Budge
VP, Principal Analyst
Author Insights
Blog
Three Things To Know About How Security Team Toxicity Can Increase Breach Risk
New research finds that engaged, healthy, psychologically safe, and collaborative security teams experience fewer breaches. Find out why.
Blog
Deconstruct Human-Element Breaches To Protect Your Workforce
Risks posed by and to humans such as deepfakes, data exfiltration by insiders, and misuse of generative AI are expected to accelerate and become more complex. Learn how to discern and manage these human-element risks in this preview of an upcoming report.
Blog
Who Is Your CISO? Understand Their Background To Reduce Risk And Bolster Trust
One of the three principles of high-performance IT (HPIT) is to build trust on a foundation of security, privacy, and resilience. As a CIO, executing your strategy will be much easier if you unleash the talent of the person who plays an outsized role in building a trusted business: your chief information security officer (CISO). […]
Blog
Overcome The Five Poisons (Kleshas) Of Human Risk Management
We started our evaluation of human risk management solutions knowing that vendors and customers were at different stages of adoption. We faced resistance – the level of which depended on where vendors were in achieving their own vision of HRM.
Blog
Build An Alliance With Your CIO
Learn how to build, improve, repair, or elevate your relationship with your technology counterparts in this preview of our upcoming Security & Risk Summit in Baltimore, December 9–11.
Blog
APAC CISOs Need More Tools In Their Leadership Swiss Army Knife
APAC CISOs face many common workplace challenges and have similar opportunities as in other roles, but in addition, they encounter lesser-discussed gender, cultural, and geographic impacts that affect the CISO role.
Blog
CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog
What We Can Learn From 2023’s Most Notable Breaches
Cybersecurity breaches continued to rise in 2023. Learn the eight most common incident types and get four key takeaways from our new report.
Blog
Forrester’s RSAC 2024 Themes, Takeaways, And Observations
More than 41,000 attendees, 600 exhibitors, and 425 sessions. Get some of the key themes and takeaways from the Forrester security & risk analysts who attended RSA Conference (RSAC) 2024.
Blog
Five Things You Should Know About Burnout In Cybersecurity But Probably Don’t
The cybersecurity industry continues to focus almost exclusively on technology at the expense of dealing with the heart of cyberdefenses: the people. Yet the stress of expectations, limited resources, and detriments to well-being continues to cause havoc with the mental and physical health, productivity, and retention of the cybersecurity workforce.
Blog
Forrester’s Not-So-TayTay Southeast Asia Cybersecurity Trends Roundtable Tour
Get six key learnings about Southeast Asia cybersecurity trends and challenges following a series of roundtables with CISOs and security leaders in the region.
Blog
The Future Is Now: Introducing Human Risk Management
The market that used to be called the security awareness and training (SA&T) is now human risk management. This blog explains why.
Blog
Cybersecurity Consultancies Face Goldilocks-Style Expectations From APAC CISOs
What should APAC CISOs look for from cybersecurity consulting providers? Find out in our latest Wave report which evaluates the 10 most significant cybersecurity consulting providers in Asia Pacific.
Blog
T&I APAC Wrap-Up: The Good Stuff You Missed From The ForrWomen Session
Women remain underrepresented in the tech and security fields. Get five tips from the recent T&I APAC ForrWomen session on how to change that in your organization.
Blog
Get A Head Start On The “Easier Said Than Done” Elements In The 2023–2030 Australian Cyber Security Strategy
Find which Forrester research can help navigate, manage, and prepare for the newly announced Australian Cyber Security Strategy.
Blog
Break The Cycle Of Security And Technology Intergenerational Trauma
Learn what's creating the silos between technology and security teams and how to avoid or remove them.
Blog
Security Team Culture Matters
Our research in 2020 dissected the causes of toxicity in cybersecurity and outlined that, in a practical sense, a toxic culture in cybersecurity looks like a team rife with infighting, unhappiness, and aggression between team members. Not only will this cultivate an unpleasant environment, but it also has the potential to ruin your security team’s […]
Blog
Win The Hearts And Minds Of Security-Fatigued Stakeholders
Get practical tips for building a stronger security culture by influencing three key stakeholder groups.
Blog
Zero Trust Finally Moves From Concept To Reality For Asia Pacific Firms
Forrester started covering Zero Trust (ZT) adoption in APAC in early 2020, when Zero Trust was largely touted as a buzzword in our region. At the time, this inaugural APAC-specific ZT research showed that, while ZT was already mainstream in the US and Europe, it was slowly but surely gaining adoption in APAC. Fast-forward two […]
Blog
We Need To Talk More About Burnout In Cybersecurity
Forrester predicted that in 2023, a Global 500 firm will be exposed for burning out its cybersecurity employees. In 2022, we saw at a very practical level in Australia that weaknesses in our cyberdefenses can impact society at mass levels. Impacts of breaches at Optus, Medibank, EnergyAustralia, and MyDeal include fines, exposure of millions of […]
More posts