Agenda

Monday

Sep 21
  • 12:00 pm – 5:00 pm Super Monday

Tuesday

Sep 22
  • 10:00 am – 10:15 am Opening Remarks
  • 10:15 am – 10:50 am Forrester Keynote: The Future CISO
  • 10:50 am – 11:00 am Marketplace Energizer
  • 11:00 am – 11:20 am Breakout Sessions
  • 11:25 am – 11:45 am Case Study Presentations — Sponsors
  • 11:50 am – 12:20 pm Forrester Keynote Session: How To Become Customer Obsessed
  • 12:25 pm – 12:45 pm Breakout Sessions
  • 12:45 pm – 1:30 pm Marketplace
  • 1:30 pm – 1:50 pm Case Study Presentations — Sponsors
  • 1:55 pm – 2:15 pm Breakout Sessions
  • 2:15 pm – 2:45 pm Marketplace Energizer
  • 2:45 pm – 3:15 pm Forrester Keynote Session: Maintaining Privacy In The Face Of Emerging Technologies
  • 3:15 pm – 3:45 pm Zero Trust Certification Live! – Session 1 : Use a five-step road map to realize the benefits of a Zero Trust strategy.
  • 3:15 pm – 3:15 pm Close Of Day 1
  • 3:00 pm – 5:30 pm 1-On-1 Analyst Sessions With Attendees

Wednesday

Sep 23
  • 7:30 am – 10:00 am 1-On-1 Analyst Sessions With Attendees
  • 9:15 am – 9:45 am Zero Trust Certification Live! – Session 2 : Zero Trust is the Blueprint for your Security Architecture Engage in facilitated video lessons sampled from our Zero Trust Strategy Certification course.
  • 10:00 am – 10:30 am Forrester Keynote Session: Managing The Biggest Global Risks Of The Next Decade
  • 10:35 am – 11:05 am End-User Panel Discussion — Hosted By Forrester
  • 11:05 am – 11:25 am Marketplace Energizer
  • 11:25 am – 11:45 am Breakout Sessions
  • 11:50 am – 12:10 pm Case Study Presentations — Sponsors
  • 12:15 pm – 12:35 pm Breakout Sessions
  • 12:40 pm – 1:10 pm Forrester Keynote: You Survived ZT Day . . . Now What?
  • 1:10 pm – 1:55 pm Marketplace
  • 1:55 pm – 2:05 pm Breakout Sessions
  • 2:30 pm – 3:00 pm Forrester Keynote: Culture Matters — Put People At The Center Of Your Security Program
  • 3:05 pm – 4:05 pm Special Session: Hackers Versus Executives

Monday Sep 21

12:00 pm – 5:00 pm

Super Monday

Join your colleagues, Forrester Analysts and other thought leaders for exclusive content prior to the official opening!  This is also the perfect time to build your personal agenda for the following days and familiarize yourself with the features of the platform.   Don’t miss this opportunity to optimize your conference experience!

Tuesday Sep 22

10:00 am – 10:15 am

Opening Remarks

Speakers:
Stephanie Balaouras, VP, Group Director, Forrester

10:15 am – 10:50 am

Forrester Keynote: The Future CISO

The most successful future chief information security officers (CISOs) will: 1) know their CISO type; 2) make sure they have CISO-company fit; and 3) prepare for what’s next. There are six different types of CISO: transformational, postbreach, tactical/operational, compliance/risk, steady-state, and customer-facing evangelist. In this session, Jeff Pollard will show how CISOs can build a roadmap for transitioning from one type to another and explore strategies for obtaining future CISOs and related roles.

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

10:50 am – 11:00 am

Marketplace Energizer

Speakers:
Renee Murphy, Principal Analyst, Forrester

11:00 am – 11:20 am

Breakout Sessions

In-depth sessions led by Forrester analysts. Attendees will have the choice to attend one of the following:

Secure the Customer
Secure The New Storefront

Organizations have adopted new development models, such as APIs and low code, to create new business opportunities, captivate their customers, and generate new revenue streams. These development models extend the definitions of “developer,” “application,” and “code” and offer previously unimaginable access to the corporate infrastructure. This session will look at how to navigate these changing definitions and apply the combination of tried-and-true security techniques and emerging tools to help you give your customers a secure and engaging experience.

Speakers:
Sandy Carielli, Principal Analyst, Forrester

READ MORE +READ LESS -
Amp up Security
Reduce Security Software Costs Through Effective Negotiations

The average organization has products from dozens of security vendors, all adding cost and complexity. In a recessionary environment, security professionals are being asked to reduce spending and conduct effective security software negotiations to get the best deals. This session will provide you with proven tips for negotiating security software purchases and renewals.

Speakers:
Paul McKay, Senior Analyst, Forrester

READ MORE +READ LESS -
Revolutionize Risk
Digitally Transform The GRC Function

Despite innovations in governance, risk, and compliance (GRC) automation, such as AI, machine learning, and predictive analytics, risk management teams are still struggling to keep pace with the digitally enabled business. While technologies have become smarter, the processes associated with GRC have remained virtually the same. This session will explore how risk and compliance pros can finally transform the GRC function.

Speakers:
Alla Valente, Analyst, Forrester

READ MORE +READ LESS -
11:25 am – 11:45 am

Case Study Presentations — Sponsors

Forum sponsors will be presenting case studies that offer real-world perspective.

11:50 am – 12:20 pm

Forrester Keynote Session: How To Become Customer Obsessed

Customer obsession is the great idea that everyone agrees with and no one knows how to do. In this session, we’ll consider how an enterprisewide focus on the customer — customer obsession — will sustain you through the current recession and give security and risk professionals a clear beacon for day-to-day efforts. Get ready: This session is about action, not theory. We’ll introduce you to Forrester’s operations review, a template to guide your roadmap to the manifestation of customer obsession that’s right for your firm’s capabilities and customers.

12:25 pm – 12:45 pm

Breakout Sessions

In-depth sessions led by Forrester analysts. Attendees will have the choice to attend one of the following:

Secure the Customer
Empower Your Customers' Security Experience
You can offer your customers security tips and guidance about protecting their accounts or identities, but does this actually help them? And is this advice they want to or can take? Understand who your customers are, and learn the why behind their actions. Rethink how you design the security experience to enable — and even nudge — your customers to make better security choices and choices that matter to them.

Speakers:
Heidi Shey, Principal Analyst, Forrester

READ MORE +READ LESS -
Amp up Security
ATT&CK Your Threat Mitigation Strategy
Many organizations have heard of the MITRE ATT&CK framework but don’t fully understand what it is. This session provides an introduction into the ATT&CK framework and helps organizations understand why they should utilize it in their security operation centers (SOCs).

 

Speakers:
Brian Kime, Senior Analyst, Forrester

READ MORE +READ LESS -
Revolutionize Risk
Climate Action: Plan, Adapt, And Thrive
Too often, people assume the impact of climate change is still decades away. From the increasing frequency of droughts, wildfires, and other extreme weather to rising temperatures and sea levels to biodiversity loss, the climate crisis is already here. It’s time to develop detailed climate adaptation and action plans. Adaptation consists of the strategies and actions your enterprise takes to adjust to and mitigate the risks of climate change on your organization’s ability to deliver on its mission. Do it right, and your organization will thrive where others fail.

Speakers:
Stephanie Balaouras, VP, Group Director, Forrester

READ MORE +READ LESS -
12:45 pm – 1:30 pm

Marketplace

1:30 pm – 1:50 pm

Case Study Presentations — Sponsors

Forum sponsor will present case studies offering real-world perspective.

1:55 pm – 2:15 pm

Breakout Sessions

In-depth sessions led by Forrester analysts. Attendees will have the choice to attend one of the following:

Secure the Customer
Connected Homes Are Leaving The Doors Open To Enterprise Data Theft
Attackers are targeting the connected home as a weak point into the enterprise. Given the increase in remote work and the number of critical vulnerabilities in an increasing number of connected devices per household, accounting for and mitigating consumer internet-of-things device risk must be part of an enterprise’s overall endpoint security governance.

Speakers:
Christopher Sherman, Senior Analyst, Forrester

READ MORE +READ LESS -
Amp up Security
Trust Is The Vulnerability: Stopping Insider Threats With Zero Trust

 

Insider incidents are responsible for 25% of data breaches, according to Forrester survey respondents. Many insider incidents are enabled by the “trust all internal traffic” model of the past that gave users free rein to access and take sensitive data. In this session, Joseph Blankenship will discuss the risks posed by insider threats and demonstrate how Forrester’s Zero Trust model of security can stop them.

Speakers:
Joseph Blankenship, VP, Research Director, Forrester

READ MORE +READ LESS -
Revolutionize Risk
Introducing Forrester’s New Information Security Maturity Model
This isn’t your granddad’s maturity model. Updated for the digitally transformed organization, the Forrester Information Security Maturity Model delivers useful data to bridge security data with businesses’ goals. Join the irreverent, effervescent, and always entertaining Renee Murphy, principal analyst and author of the FISMM, for a tour of the new model and learn how to leverage your information to prove your value and create opportunities to collaborate. Will it change your life? Maybe not. Will it make your life a lot easier? Yes. Yes, it will.

Speakers:
Renee Murphy, Principal Analyst, Forrester

READ MORE +READ LESS -
2:15 pm – 2:45 pm

Marketplace Energizer

2:45 pm – 3:15 pm

Forrester Keynote Session: Maintaining Privacy In The Face Of Emerging Technologies

Business leaders and their IT counterparts agree that their most critical priority is to accelerate innovation within their company. From improving the experience of their customers and employees to encouraging faster time-to-market to increasing brand differentiation, these organizations increasingly rely on emerging technologies — such as AI, machine learning, and automation — to deliver on their innovation needs. But emerging technologies also increase the risk of privacy abuses and ethical pitfalls and require a new approach to risk identification and mitigation strategies. Security, risk, and privacy professionals must evolve their current privacy posture and adopt new privacy governance frameworks that increase business and IT leaders’ risk awareness and privacy responsiveness as they select, deploy, and use emerging technologies.

Speakers:
Enza Iannopollo, Senior Analyst, Forrester

3:15 pm – 3:45 pm

Zero Trust Certification Live! – Session 1 : Use a five-step road map to realize the benefits of a Zero Trust strategy.

Engage in facilitated video lessons sampled from our Zero Trust Strategy Certification course.
Watch as Forrester Vice President and Principal Analyst, Chase Cunningham reviews a road map for implementing Zero Trust that aligns the framework to the organization. Continue on to Forrester’s dynamic learning experience platform for hands-on exercises that make it easy to apply this framework in your own context.

 

Speakers:
Chase Cunningham, VP, Principal Analyst, Forrester

Close Of Day 1

3:00 pm – 5:30 pm

1-On-1 Analyst Sessions With Attendees

Please reserve your session early as availability is limited! This is the perfect opportunity to get personalized advice about a current or planned initiative in a private conversation with a Forrester analyst.

Wednesday Sep 23

7:30 am – 10:00 am

1-On-1 Analyst Sessions With Attendees

Please reserve your session early as availability is limited! This is the perfect opportunity to get personalized advice about a current or planned initiative in a private conversation with a Forrester analyst.

9:15 am – 9:45 am

Zero Trust Certification Live! – Session 2 : Zero Trust is the Blueprint for your Security Architecture Engage in facilitated video lessons sampled from our Zero Trust Strategy Certification course.

Watch as Forrester Vice President and Principal Analyst, Chase Cunningham continues to take us through the five step roadmap.  Join this session to also explore best practices for implementing Zero Trust. Continue on to Forrester’s dynamic learning experience platform for hands-on exercises that make it easy to apply this framework in your own context.

Speakers:
Chase Cunningham, VP, Principal Analyst, Forrester

10:00 am – 10:30 am

Forrester Keynote Session: Managing The Biggest Global Risks Of The Next Decade

Trade wars, pandemics, and record unemployment have led to corporations adapting and rethinking their delivery models, employees adapting to new working challenges, and kids learning that their parents aren’t smarter than a fifth grader. The decade is off to a rocky start, and we’re only nine months into this journey. How do you navigate such an uncertain future and prepare for even more challenges that lie ahead? First, know your risk. Join Renee Murphy, principal analyst serving security and risk professionals, for a look at the biggest global risks of the next decade and learn how you can prepare for the expected.

Speakers:
Renee Murphy, Principal Analyst, Forrester

10:35 am – 11:05 am

End-User Panel Discussion — Hosted By Forrester

Speakers:
Laura Koetzle, VP, Group Director, Forrester

11:05 am – 11:25 am

Marketplace Energizer

11:25 am – 11:45 am

Breakout Sessions

In-depth sessions led by Forrester analysts. Attendees will have the choice to attend one of the following:

Secure the Customer
Improving Physical Security And Customer Experience
Every customer interaction plays a vital role in shaping that customer’s confidence in your brand. While many businesses have heavily invested in optimizing the digital customer experience (CX), they’ve overlooked rising customer concerns regarding security of the physical environment. When done poorly, physical security reduces customer trust, which leads to attrition, and it triggers customers’ sensitivities to personal privacy. This session will review the key security technologies that organizations can leverage to secure their physical locations without compromising CX.

Speakers:
Merritt Maxim, VP, Research Director, Forrester

READ MORE +READ LESS -
Amp up Security
Securing OT Environments: The Same But Different
As organizations undergo digital transformation efforts, they often have to integrate operational technology (OT) with their traditional IT systems. While this integration can deliver significant business value and efficiency, it also introduces new security issues. This session will review key OT security threats and discuss how organizations can leverage Zero Trust principles to secure their OT environments effectively.

Speakers:
Brian Kime, Senior Analyst, Forrester

READ MORE +READ LESS -
Revolutionize Risk
Supply Chain Risk: You Can´t Take Your Eye Off The Ball
Global uncertainty and change create more risk for supply chains. Despite the abundance of intelligence tools and analytics, supply chains are unnecessarily disrupted by internal and external events that are predictable and avoidable. Without a formal risk management strategy and well-defined process, public- and private-sector organizations leave supply chains susceptible to risks that negatively impact operations, profitability, and the customer experience.

Speakers:
Alla Valente, Analyst, Forrester

READ MORE +READ LESS -
11:50 am – 12:10 pm

Case Study Presentations — Sponsors

Forum sponsors will be presenting case studies that offer real-world perspective.

12:15 pm – 12:35 pm

Breakout Sessions

In-depth sessions led by Forrester analysts. Attendees will have the choice to attend one of the following:

Secure the Customer
Ditch The Password And Get Rid Of Phishing: Passwordless Authentication
The password is dead: It uses crackable, snoopable, phishable, and stuffable credentials that hackers and fraudsters exploit while 1) attempting to gain access to sensitive data and 2) committing fraud by account takeover (ATO). In this session, we will assess methods and deployment best practices for password replacements, including push notifications, biometrics, and behavioral biometrics.

Speakers:
Andras Cser, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Amp up Security
How 5G Can Benefit Security In Enterprise Use Cases
5G networks are being deployed globally in 2020. Enterprises and service providers are currently evaluating the use cases that will add value to their businesses and consumers. And yet, 5G deployments have been overshadowed by security concerns with 5G equipment. However, this debate misses the point and overlooks some of the potential security benefits of 5G over existing technologies. Join this session to learn more about opportunities for improving security by leveraging the built-in security controls that 5G standards offer and how to ensure these are implemented in 5G use cases.

Speakers:
Paul McKay, Senior Analyst, Forrester

READ MORE +READ LESS -
Revolutionize Risk
Shift From Readiness To Sustained Compliance
Forward-looking firms understand that a “checklist” approach to compliance only delivers limited value. To meet regulators’ demands and maintain compliance over time, these firms operationalize their privacy programs and shift from an episodic approach to privacy compliance to one that is more holistic and sustained. This approach delivers not just sustained compliance, but also promotes customer trust, engagement, and brand reputation. Join this session to learn about: 1) lessons from enforcement trends; 2) key milestones to shift from readiness to sustained compliance; and 3) best practices from delivering business value through a solid privacy program.

Speakers:
Enza Iannopollo, Senior Analyst, Forrester

READ MORE +READ LESS -
12:40 pm – 1:10 pm

Forrester Keynote: You Survived ZT Day . . . Now What?

March 13, 2020, was ZT Day — the day the world was forced to adopt the Zero Trust (ZT) model. Whether you were ready or not, the perimeter was obliterated that day due to the work-from-home requirements the COVID-19 pandemic thrust upon us. In 24 hours, the remnants of the old perimeter security model became indefensible. Network operators and security pros had to “make it work” using overloaded VPNs, hope, and baling wire. Somehow, we survived, but now ZT is a global necessity for secure access. How do we enable this approach for the future? In this session, Dr. Chase Cunningham will walk you through what ZT means for the future of our organizations and detail how we can leverage a variety of ZT technologies to not just survive, but also thrive in the post-pandemic world.

Speakers:
Chase Cunningham, VP, Principal Analyst, Forrester

1:10 pm – 1:55 pm

Marketplace

1:55 pm – 2:05 pm

Breakout Sessions

In-depth sessions led by Forrester analysts. Attendees will have the choice to attend one of the following:

Secure the Customer
Preparing Your IAM Program For The Workforce
Machine identities (especially robotic process automation and API-driven workloads) are proliferating in number, variety, and velocity. Humans are responsible for creating and operating these robotic processes to ensure that these nonhuman entities don’t expose sensitive information or create other identity-related risks. Securing these identities requires a Zero Trust eXtended (ZTX) approach for identity and access management (IAM) applied to the unique attributes and behaviors of machine identities.

Speakers:
Sean Ryan, Senior Analyst, Forrester

READ MORE +READ LESS -
Amp up Security
Transform Your Enterprise Security With The Zero Trust Edge (ZTE)
Enterprise security architecture has struggled because we have to interface with the most toxic network ever built: the public internet. It was designed to withstand nuclear attack and to trust every packet, but not to withstand millions of malicious users. There is a better way: the Zero Trust Edge (ZTE). ZTE applies the principles of Zero Trust to an edge network that connects and secures individual users, the main office, branch and remote locations, and cloud-based assets. In this session, learn how ZTE is already operationalizing Zero Trust for organizations adapting to the work-from-home user exodus and parting ways with their antiquated VPNs.

Speakers:
David Holmes, Senior Research Analyst, Forrester

READ MORE +READ LESS -
Revolutionize Risk
Business Resiliency As A Competitive Advantage
In an effort to prepare for the future, people have relied on oracles, soothsayers, fortune-tellers, Magic 8 Balls, and futurists — just to name a few. But what if implementing proper business resiliency meant that not only could you meet your brand’s promise but also be able to pivot during crippling events to exceed your brand’s promise? Come learn the pillars of business resiliency that keep the lights on and help your firm prosper no matter what the future brings.

Speakers:
Amy DeMartine, VP, Research Director, Forrester

READ MORE +READ LESS -
2:30 pm – 3:00 pm

Forrester Keynote: Culture Matters — Put People At The Center Of Your Security Program

Whether the human element means creating a toxic-free environment for your people to stay and flourish, navigating the maze of organizational politics and detractors, building a human firewall, or engaging with business or marketing security, people and culture are central to a successful security program. They’re at the heart of your success or failure. This session will elevate the often-neglected human side of security and help you approach your culture change strategically as you would any other part of your security program.

Speakers:
Jinan Budge, Principal Analyst, Forrester

3:05 pm – 4:05 pm

Special Session: Hackers Versus Executives

When bots attack! In this year’s Hackers vs. Executives, we will delve into the range of bot attacks that security professionals must defend against and explore how bad bots cause havoc for security, marketing, and business leaders. Top security experts will demonstrate tools and techniques used by cybercriminals to create bots and evade basic detection.

Speakers:
Sandy Carielli, Principal Analyst, Forrester

Security & Risk · September 22 – 23 · Live Virtual Experience