Uploaded by Cuan Ham

A CISO's Guide To Successfully Leading Change

advertisement
LICENSED FOR INDIVIDUAL USE ONLY
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
by Jinan Budge
January 9, 2020
Why Read This Report
Key Takeaways
Cybersecurity is getting ever more scrutiny
from boards, execs, and customers. Many
CISOs need to launch large change programs
to transform their cybersecurity capabilities
amidst unprecedented organizational, technical,
and business complexity. As these change
programs may be larger than anything the CISO
has driven to date, it’s essential to have a clear
plan and committed sponsors so you can seize
the opportunity when it comes and deliver. This
report helps you identify, align with, and influence
critical stakeholders whose support you’ll need to
embark on change programs.
Feed Your Supporters And Manage Your
Detractors
You can have the best strategy in the world, but it
will go nowhere unless you feed your supporters
and manage your detractors.
This an update of a previously published report;
Forrester reviews and updates it periodically for
continued relevance and accuracy.
Politics Can Be Done Ethically, And It’s Your
Greatest Opportunity
Stop seeing politics as a necessary evil. Done
correctly, ethically, and with dignity, politics is
your opportunity to listen to different perspectives
and take people on the journey with you.
Decide To Be An Executive, Not A Techie
You have a choice: Continue down the technical
path or shift gears and become a business
leader. If you choose to be a leader, you’ll find
that vision, personal courage, and effective
communication are more crucial than ever to
drive change in the business.
This PDF is only licensed for individual use when downloaded from forrester.com or reprints.forrester.com. All other distribution prohibited.
FORRESTER.COM
FOR SECURITY & RISK PROFESSIONALS
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
by Jinan Budge
with Joseph Blankenship, Seles Sebastin, and Bill Nagel
January 9, 2020
Table Of Contents
2 CISOs Are Unprepared For Implementing
Large-Scale Change
Cybersecurity Change Requires More Than
Technical Knowledge
4 Successful Change Requires The 3 P’s:
People, Process, And Politics
Related Research Documents
How To Talk To Your Board About Cybersecurity
Instill A Security Culture By Elevating
Communication
Top Recommendations For Your Security
Program, 2019
Transform Your Cybersecurity Capability
Feed Your Supporters And Manage Your
Detractors
Embrace Politics For What It Is: An
Opportunity To Understand And Engage
People
8 Be A Leader Of Change First And Foremost,
A Technician Second
Share reports with colleagues.
Enhance your membership with
Research Share.
What It Means
10 “Being Political” Does Not Mean
“Backstabbing”
11 Supplemental Material
Forrester Research, Inc., 60 Acorn Park Drive, Cambridge, MA 02140 USA
+1 617-613-6000 | Fax: +1 617-613-5000 | forrester.com
© 2020 Forrester Research, Inc. Opinions reflect judgment at the time and are subject to change. Forrester®,
Technographics®, Forrester Wave, TechRadar, and Total Economic Impact are trademarks of Forrester Research,
Inc. All other trademarks are the property of their respective companies. Unauthorized copying or distributing
is a violation of copyright law. Citations@forrester.com or +1 866-367-7378
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
CISOs Are Unprepared For Implementing Large-Scale Change
Security pros are heading into an intensifying storm where both the infrastructure they secure and
threats to that infrastructure are getting more complex. Businesses’ digitization efforts introduce
complexity even as customers expect companies to better protect their data. In this new normal, the
old way of running security — as the department of “No,” as an IT issue, or as a siloed function that
represents itself with locks and keys — is long gone.1 Security is garnering increased attention and
scrutiny because:
›› Cybersecurity is a recognized business issue. Business leaders now see cybersecurity as
fashionable, significantly raising the issue’s profile internally.
›› Consumers demand trust. Your customers want to trust you before they engage with you.
Forrester data shows that 23% of US online adults are Skeptical Protectionists who are very
informed about and concerned with privacy and highly skeptical that companies — especially
social networks and media firms — will keep their information secure.2
›› Cyberattacks have a significant business impact. More than ever, attacks have the potential to
cripple business, endanger customers, and crush strategy.
Cybersecurity Change Requires More Than Technical Knowledge
In the midst of this complex landscape, CISOs are running significant initiatives including cloud
migration; Zero Trust architecture; technology upgrades; proactive threat hunting; and insider threat,
digital identity, and security awareness programs. Far from being purely technology programs, these
initiatives require a fair dose of people, process, oversight, and technology knowledge. As CISOs seek
to transform security, they must fundamentally change the way security has been operating and ensure
that it is an embedded and holistic function (see Figure 1). The opportunity to implement broad change
in an organization doesn’t come along frequently and requires a new breed of skills. Yet many CISOs
are caught unaware of the intricacies of organizational change and are faced with:
›› Dealing with complexity. Most organizations are being digitized in some form — a process that
is disrupting entire industries. In some markets, retirement funds have had to deal with digitally
native, direct-to-customer offerings that are far more streamlined, free of legalese, and which make
it easier to take out a policy. The pace of digitization and disruption has organizations moving
rapidly and shifting to agile ways of working. CISOs have to keep up with this complexity, engaging
and understanding business dynamics in unfamiliar ways. Compounding this problem are two top
challenges for CISOs: the changing nature of IT threats and the complexity of the IT environment.3
›› Responding to tactical requests. Security leaders have historically been technicians attending to
low-level tactical requests and responding to audit findings or breaches. CISOs’ immersion in a sea
of tactical considerations have left them unable to take a step back and think strategically, let alone
implement significant changes. In a Forrester survey, 25% of security decision makers reported
that day-to-day tactical activities taking up too much time is a significant IT security challenge.4
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
2
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
“After a data breach, the organization commissioned three consulting firms to review us, some
without my involvement. My small team ended up responding to 68 recommendations. These
tactical activities consumed all of our resources.” (CISO)
›› Addressing security’s image problem. While security has finally emerged as a crucial topic for
boards, CIOs, and business leaders, don’t mistake awareness for understanding. Decades of
alienating the business mean that it still sees security teams as a roadblock. As Robert Carey, VP
and GM of global public sector solutions at RSA, told us: “The perception is that security is an
impediment and the bane of convenience.” This makes change efforts difficult, as CISOs grapple to
correctly position security as a business enabler and their teams as change agents.
›› Avoiding politics — to their disadvantage. Security pros are generally busy protecting the
organization from bad actors and see politics as ugly and unnecessary. Some lack charisma or
confidence or are shy, technically focused, or impatient with nontechnologists. Security pros’
reluctance to engage in positive politics has put CISOs in a position where they cannot influence
key business decisions.
“Politics is a dirty word because you see the politicians on TV and the image they create. Even the
political environment we have around us is very negative, and it is about pulling people down.”
(Chief risk officer, financial institution)
›› Managing security detractors. Change is uncomfortable for most people. This discomfort
exposes detractors who continuously try to impede progress. CISOs are surprised by this criticism
and who it’s coming from. They take detractors’ actions personally instead of acknowledging
that they are a natural part of change. You may have inherited a team that’s been there for a long
time and wants to maintain the status quo; the business may be afraid of having to do things it
doesn’t want to do; or IT may feel exposed after years of neglect. Detractors can come at you from
anywhere in the organization, including your own team — taking up a lot of your energy, slowing
progress, and at times undermining your efforts.
“In security, the key detractors don’t tend to be senior executives. They’re generally supportive
because they have direct interaction with the board and audit and risk committee.” (Sheridan Ware,
chief information and technology officer, Charter Hall)
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
3
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
FIGURE 1 Cybersecurity Change Requires More Than Technical Knowledge
From
To
A technical IT problem
An issue of customer trust
“No, you can’t.”
“Yes, and . . . ”
Technically focused
Holistic concern for people, process, and technology
Sitting in the basement
Engaged with the business
Lock and key
Freedom and agility
Siloed
Embedded
Successful Change Requires The 3 P’s: People, Process, And Politics
Excelling at security transformation requires leadership, business insight, and people skills, supported
by drive, determination, and pragmatism. But remember that you can’t do it alone. You will need
a significant amount of momentum and preparation. To create that momentum and prepare your
organization to accept the change programs you are implementing, you need to address the most
challenging element of any strategic delivery: people.
Feed Your Supporters And Manage Your Detractors
You can have the best strategy in the world, but you’ll go nowhere unless you’re able to execute it.
Executing your strategy requires not only technical and staffing components, but also convincing
many different stakeholders to go on the journey with you or at least support your journey. Change
introduces detractors, who introduce a lot of noise, which is distracting, consumes a lot of energy, and
can slow down or block your progress. Your key to success is to manage your detractors and feed
your sponsors. Do this methodically by:
›› Identifying the key players. Before taking any action, ensure that you have a clear idea of who
needs to be on board with the strategy and what role they may assume in the approval, delivery,
and maintenance of the plan. Take time to develop a deep understanding of each player’s
perspective and their role in your transformation. Plan your actions using seven key personas (see
Figure 2).
›› Preparing the ground. Culture change happens one conversation at a time, so plant the seed of
the need for change and its potential benefits early. Work to understand the remit of each of your
stakeholders and their level of awareness of and support for security. Your CFO will be much more
concerned about financial impact of your program, whereas your CEO will want to understand the
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
4
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
risks and the impact of security on customer trust. These are different conversations, so have them
separately. Depending on their level of awareness, you may need to have one or more socialization
meetings with them. Don’t surprise stakeholders with a strategy document without going through
a methodical socialization process. Socializing your strategy and gaining buy-in early will position
you as an insightful, business-conscious leader with a compelling strategy.
›› Growing, learning, and turning criticism into a solution. Paradoxically, you will improve your
chances of influencing and persuading your constituents more by listening to them than by talking
at them.
“The most powerful tool when you rise to the level of CIO is that you know that you don’t know
everything and to listen. Being able to listen allows you to integrate all these thoughts and reach
a decision that is effective for the organization.” (Robert Carey, VP and GM of global public sector
solutions, RSA)
“Be open to not always being right and having a growth mindset. I don’t have all the answers, and
actually that gives me freedom to ask questions and adapt solutions to our various stakeholders.”
(Sheridan Ware, chief information and technology officer, Charter Hall)
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
5
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
FIGURE 2 Identifying The Key Players
Player
Description
Example
The leader
Ultimate decision points
CEO
Influencers
Have influence over senior people and can bring
them on board by vocally advocating your plans.
Lose engagement here and support may fall away
rapidly.
CRO, chief people
officer, COO, audit, CIO
Visionaries
In any organization, certain individuals are
responsible for the future vision of the enterprise.
Ensure that your strategy aligns with their long-term
vision, or your plans may fall at the first hurdle.
CMO, head of
transformation
Champions
The role that will publicly support this strategy and
defend it in high-level meetings.
CIO, heads of business
Budget holder
The person who holds the budget that will fund the
transformation.
CIO
The team
The individual or team that will maintain the process
or technology once deployed. Dissent at this level
could seriously undermine the value delivered despite
a perfect implementation.
Operational business
and technology teams
The security leader
The person who can realize this strategy and
maintain momentum until it is fully implemented.
CISO, program director
Budget approver
The person who controls the entire organization’s
finances and will ultimately approve the funding for
this program.
CFO
Embrace Politics For What It Is: An Opportunity To Understand And Engage People
It’s essential to understand how people at different levels are likely to react to the strategy and steer
them toward the correct outcome once you present it for consideration. If this seems like politics to
you, you’re right! But you must realize that, in a corporate environment, politics is not an optional
activity. People play politics every time they send an email or chat at the water cooler, so get with the
program. To use politics to your advantage, you need to:
›› Turn internal politics into your greatest opportunity. Many successful business leaders have
evolved to see politics not only as a necessary evil in business; they also see it as an opportunity to
understand and engage.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
6
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
“For me, politics is an opportunity. If you understand what people are actually saying as part of
raising their comments, and you take that as an opportunity to turn their concern into a solution, it
becomes a different conversation.” (Chief risk officer, financial institution)
›› Use the art of persuasion to build influence. As a leader, you need to ask the right questions to
influence, and this requires exceptional articulation. And take care: Persuasion isn’t the “begging
on your knees” type of influence that some managers resort to. This is professional political
maneuvering at its finest that, even if exposed, is ethical and acceptable (see Figure 3).
›› Sit down and listen without judgement. Politics goes awry when you stop listening to other
perspectives and offer your opinion without considering the other party’s. As the business classic
The 7 Habits of Highly Effective People notes, “Seek first to understand, then to be understood.”5
This doesn’t happen by accident. You need to practice the fine art of listening to understand
where your stakeholders are coming from. Once you have that understanding, spend time working
through their issues with your team, distinguish fact from fiction, and come back with a solution.
FIGURE 3 Utilize Your Persuasion And Influence Toolkit To Persuade And Influence
Tool
How to use this tool
Collective
momentum
Socialize the security vision, strategy, and change program and build momentum
so that when it’s formally presented you can list the engaged sponsors.
Authority
Influence from the top down for the greatest effectiveness. If the CEO believes
something, most other staff will immediately fall in line.
Mutual exchange
If you provide a service, resource, or assistance to a potential sponsor over and
above that required from your job role, you will build up goodwill, which may be
repayable when you need it.
Scarcity
Use this carefully, as repetition will undermine its value. Valid and externally
imposed time or resource limits, such as a regulatory deadline or vendor discount,
can initiate actions that may otherwise have languished.
Foresight
Keep your sponsors briefed, even if that brief is that the future will be difficult.
They would rather face a bad outcome than uncertainty.
Relationship
Build a positive relationship with the key players ahead of time and highlight
commonalities. When the time comes, this relationship will influence the response.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
7
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
Be A Leader Of Change First And Foremost, A Technician Second
The pace of the change you’re embarking on will be relentless, and your technical and security skills
are not what will get you through. As transformation speaker, author, and facilitator Julia Steel told us:
“CISOs need to have an honest conversation with themselves: Do you want to be a leader or a security
expert? If you want to be a leader, then you need to invest in leadership skills.” Be clear about your role
as a leader and what it means. There are many lessons you can learn from people in other professions
who have gone on similar change journeys. When leading a transformation:
›› Sharpen your skills by engaging support. Becoming a leader means that you may need to
develop skills that are unfamiliar to you. To do this, you will require support from mentors, executive
coaches, and sponsors. These supporting roles mean very different things; you may engage one or
more of them depending on the support that you need (see Figure 4).
›› Create a strong following within your team. CISOs need to reach everyone from the CEO to
individuals in the security operations center. Managing upward is not enough; security leaders also
need to manage laterally. Build your team’s capabilities so you don’t always have to be the leader.
You’ll need to take a vacation at some point — so empower your team by following them. You also
need your team to advocate for you as a person and CISO and be a change agent in the same way
that you are. To create this positive internal culture, mentor and work with your team by giving them
examples of how things can work. Provide instructional coaching about specific situations.
›› Manage your mental health to avoid burnout. All leaders experience stress, which they need
to manage. You’re likely to feel the pressure of expectations. Perhaps you don’t feel trusted,
constantly deal with detractors, or have to continuously work to placate people. As an executive,
you have to perform at a high level in the face of all of this. In “The Making of a Corporate Athlete,”
researchers addressed the role of the body, emotions, mind, and spirit in high performance.6 Invest
in self-care, exercise, healthy eating, and other activities to reach your ideal performance state.
“There is a productive level of stress where you’re energized and positively challenged by what
you’re doing, but not overwhelmed. That’s the level you have to hold on to,” (Sheridan Ware, chief
information and technology officer, Charter Hall)
›› Build your communication and public speaking skills. You need to master talking to your board
about cybersecurity and building trust with its members. This isn’t just about crafting the perfect
presentation; it’s about creating dialogue and trust with this important stakeholder group.7 You
don’t want your first board presentation to be the first time you’ve spoken in public. Being a CISO
is a high-profile role with many outward-facing duties, even if those duties are confined to your
organization. You need communication skills to persuade an audience to act or adopt a point of
view. Seek the appropriate presentation skills coaching and courses to learn these valuable skills —
and practice.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
8
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
›› Recruit change management resources. You need to recruit people to spearhead change
management on your team and be instrumental in overcoming organizational challenges. They
need expertise in organizational behavior and developing change and communications plans.
In particular, security teams at $1 billion-plus companies are large enough to require these
individuals — permanently. As Julia Steel told us: “I’m amazed at how many security programs
don’t have some element of change. These resources are critical to the success of any program,
and even more so for security.” Strive to make everyone on the team a change agent; quash toxic
negative security behaviors by creating clear performance metrics, modeling positive security
behavior, and promptly managing bad behavior.
FIGURE 4 Distinguish The Different Types Of Leadership Support That You Need
Executive
coach
Mentor
Someone you can learn from
and has more experience than
you in the area in which you
want mentoring.
Use formal programs inside or
outside of your workplace to
look for mentors who are
interested in engaging in a
mentor/mentee relationship.
Someone who can help you
home in on specific areas of
development such as
personal resilience, public
speaking, or work/life
integration.
Look for recommendations
from your network to find
someone who has
demonstrated competence in
your chosen area.
Sponsor
Someone in the organization
who is responsible for
promoting and guiding you
through the organization.
This person doesn’t come
easily; look for someone who
understands and believes in
your capabilities. Don’t be
shy; you need to be forward
and ask for this level of
sponsorship.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
9
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
What It Means
“Being Political” Does Not Mean “Backstabbing”
Change happens all the time, everywhere, whether you notice it or not. This leaves the CISO with a
simple choice: Drive change or follow it. Within the next 18 to 24 months, an increasing number of
CISOs will have the opportunity to shape their own future by transforming cybersecurity within their
organization. While office politics has occasional flashes of brutality and deceit, it’s possible to play the
game in an ethical and dignified manner. To play politics effectively, you have to:
›› Understand that everything comes downs to human interaction. CISOs with ambitions for a
better future must reach out to key players and correctly position both themselves and their vision.
By its nature, politics is all about people, and neither humans nor their behavior are always rational.
Rational decision making is simple, but political decision making requires taking personalities,
feelings, and other external factors into account.
›› Decide if you’re primarily a leader or a techie. Ask yourself how much of your current success is
a result of your technical knowledge and how much is the result of your ability to collaborate and
persuade. Think how that will change as your role develops further. With breaches occurring at
unprecedented levels, you will inevitably be required to lead your team through a crisis. You’ll need
to stand up as a leader, not hunker down behind a keyboard.
›› Build relationships with open hearts, minds, and ears. Approach your relationships up, down,
across, and outside of your organization with questions that are designed to address basic human
needs. This is all about humans and appealing to their needs. Changing the culture of security
doesn’t happen by accident; nor does it happen by buying an awareness tool. Culture change
happens one conversation and relationship at a time. If you wish to seize the opportunity to
reinvent security when it eventually arises, start building those relationships now — it will serve
your career well, and you can leave the dagger and poison at home.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
10
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
Engage With An Analyst
Gain greater confidence in your decisions by working with Forrester thought leaders to apply
our research to your specific business and technology initiatives.
Analyst Inquiry
Analyst Advisory
Webinar
To help you put research
into practice, connect
with an analyst to discuss
your questions in a
30-minute phone session
— or opt for a response
via email.
Translate research into
action by working with
an analyst on a specific
engagement in the form
of custom strategy
sessions, workshops,
or speeches.
Join our online sessions
on the latest research
affecting your business.
Each call includes analyst
Q&A and slides and is
available on-demand.
Learn more.
Learn more.
Learn more.
Forrester’s research apps for iOS and Android.
Stay ahead of your competition no matter where you are.
Supplemental Material
Companies Interviewed For This Report
We would like to thank the individuals from the following companies who generously gave their time
during the research for this report.
Charter Hall
RSA
A large Australian bank
Endnotes
1
See the Forrester report “Transform Your Cybersecurity Capability.”
2
Source: Forrester Analytics Consumer Technographics® North American Online Benchmark Survey (Part 2), 2019. See
the Forrester report “Understand Your Customers To Build Trust: Forrester’s 2019 Consumer Privacy Segmentation.”
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
11
FOR SECURITY & RISK PROFESSIONALS
January 9, 2020
A CISO’s Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
3
We asked 3,890 security decision makers to select the biggest information or IT security challenges facing their
firm. At 34%, the changing or evolving nature of internal and external IT threats was the answer chosen most often,
followed by 31% who chose the complexity of their IT environment. Source: Forrester Analytics Global Business
Technographics Security Survey, 2019.
4
Source: Forrester Analytics Global Business Technographics Security Survey, 2019.
5
Source: Stephen R. Covey, The 7 Habits of Highly Effective People, Free Press, 1989.
6
Source: Jim Loehr and Tony Schwartz, “The Making of a Corporate Athlete,” Harvard Business Review, January 2001
(https://hbr.org/2001/01/the-making-of-a-corporate-athlete).
7
See the Forrester report “How To Talk To Your Board About Cybersecurity.”
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law.
Citations@forrester.com or +1 866-367-7378
12
We work with business and technology leaders to develop
customer-obsessed strategies that drive growth.
PRODUCTS AND SERVICES
››
››
››
››
››
››
Core research and tools
Data and analytics
Peer collaboration
Analyst engagement
Consulting
Events
Forrester’s research and insights are tailored to your role and
critical business initiatives.
ROLES WE SERVE
Marketing & Strategy
Professionals
CMO
B2B Marketing
B2C Marketing
Customer Experience
Customer Insights
eBusiness & Channel
Strategy
Technology Management
Professionals
CIO
Application Development
& Delivery
Enterprise Architecture
Infrastructure & Operations
›› Security & Risk
Sourcing & Vendor
Management
Technology Industry
Professionals
Analyst Relations
CLIENT SUPPORT
For information on hard-copy or electronic reprints, please contact Client Support at
+1 866-367-7378, +1 617-613-5730, or clientsupport@forrester.com. We offer quantity
discounts and special pricing for academic and nonprofit institutions.
Forrester Research (Nasdaq: FORR) is one of the most influential research and advisory firms in the world. We work with
business and technology leaders to develop customer-obsessed strategies that drive growth. Through proprietary
research, data, custom consulting, exclusive executive peer groups, and events, the Forrester experience is about a
singular and powerful purpose: to challenge the thinking of our clients to help them lead change in their organizations.
61489
For more information, visit forrester.com.
Download