INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

12
INFRASTRUCTURE & OPERATIONS FORUM and SECURITY FORUM 2012 Leapfrog Your Global Competition June 19-20, 2012 Marriott Rive Gauche Hotel Paris France Register by April 27 and save €200! Visit: www.forrester.com/ioemea2012, www.forrester.com/scemea2012 or call +31.(0).20.305.4848.

Transcript of INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

Page 1: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

INFRASTRUCTURE & OPERATIONS FORUM and SECURITY FORUM 2012Leapfrog Your Global CompetitionJune 19-20, 2012 Marriott Rive Gauche Hotel Paris France

Register by April 27 and save €200! Visit: www.forrester.com/ioemea2012, www.forrester.com/scemea2012 or call +31.(0).20.305.4848.

Page 2: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

2 FORRESTER’S INFRASTRUCTURE & OPERATIONS FORUM AND SECURITY FORUM 2012

Dear Colleague,

To grow, your company has to outperform the competition — globally. Your customers can’t afford to stay loyal to you if a competitor can meet their needs better, faster, and more cheaply. And meeting that challenge means that as Infrastructure & Operations (I&O) Professionals, you’ll need to help your business stakeholders pursue productivity with new technologies by capitalizing on your “greenfield” opportunities across the data center, desktop, mobile, and IT operations environments. And as Security & Risk (S&R) Professionals, you must handle borderless networks of cybercriminals, thick-ets of contradictory security and privacy regulations, and a tech-savvy population of work-anywhere employees and business partners.

This year’s Infrastructure & Operations and Security Forums will give you practical but forward-looking advice on how to leapfrog your global competition.

Key questions that the Infrastructure & Operations Forum will answer are: What global business priorities require Infrastructure & Operations leaders to do things differently in 2012 and beyond?

How can Infrastructure & Operations leaders plan, prepare, build, and manage greenfield opportunities effectively?

What specific greenfield Infrastructure & Operations people, processes, and technologies support business growth, innovation, and customer experience in a cost-effective manner?

Key questions that the Security Forum will answer are: How can you rethink security to simplify your architecture and your infrastructure while repelling more sophisticated threats?

How can you understand, evaluate, and treat more and different types of risk safely?

How can your security and risk efforts help your company differentiate itself from the global competition and win new customers?

Through a combination of industry speakers, best practices, case studies, analyst briefings, group discussions, peer-to-peer networking events, and analyst One-On-One Meetings, you will leave this conference better equipped to leapfrog your global competition.

We look forward to seeing you in Paris!

Doug WashburnPrincipal Analyst & Research Director — Infrastructure & Operations

Laura KoetzleVice President & Practice Leader — Security & Risk

“Your customers can’t afford to stay

loyal to you if a competitor can

meet their needs better, faster, and

more cheaply.”

WELCOME

REVIEW FROM FORRESTER’S INFRASTRUCTURE & OPERATIONS AND SECURITY FORUMS 2011 ATTENDEE:

“Once again this year, a great

conference, with a good mix of

thought-provoking, “look at the

future” of information security

and real life experience from

large organizations.”Stephane C., Senior Team Leader, IT Security, Risk, and Compliance

Page 3: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

WWW.FORRESTER.COM/IOEMEA2012, WWW.FORRESTER.COM/SCEMEA2012 3

INFRASTRUCTURE & OPERATIONS FORUM 2012Leapfrog Your Global Competition: Design Your Greenfield Infrastructure Today

“Greenfield” opportunities can present themselves even in the most established and mature businesses. Forrester’s Infrastructure & Operations Forum will tackle every-thing you need to capitalize on your greenfield opportunities of every scale across data center, desktop, mobile, and IT operations environments.

WHO SHOULD ATTEND:

Infrastructure & Operations Professionals responsible for strategic decisions on data centers; end user computing and mobility; and IT service management, operations, and resiliency. Enterprise Architecture Professionals who focus on infrastructure architecture. Application Development & Delivery Professionals looking to better partner with their I&O peers.

Sourcing & Vendor Management Profes-sionals focusing on infrastructure issues. CIOs looking to transform their business through greenfield opportunities.

IT professionals involved in consolidation and virtualization projects, automating IT processes, building business continu-ity plans, and hiring and training the next generation of Infrastructure & Operations Professionals

Ian OliverInfrastructure & Operations Professional

Sean RhodesSecurity & Risk Professional

Forrester uses personas like these to represent clients in their professional roles and deliver a uniquely relevant and solution-oriented experience.

SECURITY FORUM 2012Leapfrog Your Global Competition: Rethink Security; Run At The Threat

Security & Risk Professionals must face threats head on in order to compete on a global scale. Forrester’s Security Forum will tackle everything you need to simplify your security architecture and repel sophisticated threats in order to help your company differentiate itself from global competition and win new customers.

WHO SHOULD ATTEND:

Senior-level IT security and information security executives. Executives and senior-level practitioners responsible for information risk, compliance, or privacy. Senior-level Infrastructure & Operations Professionals responsible for information security operations, cloud, or mobile device strategy.

Sourcing & Vendor Management Professionals responsible for sourcing IT and information security products and services.

Page 4: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

4 FORRESTER’S INFRASTRUCTURE & OPERATIONS FORUM AND SECURITY FORUM 2012

KEYNOTE SESSIONSPowerful Content. Exceptional Industry Speakers.

*Eve

nt a

gend

a is

con

firm

ed a

s of

th

e da

te o

f thi

s pu

blic

atio

n.

INDUSTRY KEYNOTE SPEAKERS

Ian Clayton, AuthorIan Clayton has over 35 years experience in IT and service management and is the author of the Universal

Service Management Body of Knowledge (USMBOK).

Dave Cullinane, Chief Information Security Officer, Vice President, eBayDave Cullinane is responsible for global fraud, risk, and

security strategy and programs to protect eBay and its many global businesses.

Françoise Gilbert, Founder and Managing Attorney, IT Law GroupFrançoise Gilbert is the Founder of IT Law Group,

a firm that focuses on information privacy and security, cloud computing, and data governance.

Christophe Guillard, Associate VP, Global Infra-structure Services, SanofiChristophe Guillard is responsible for the strate-

gic, financial, and process excellence of the New Global Infrastructure Services organization.

Rachel Marbus, Privacy Advisor, KPMG Advisory N.V.Rachel Marbus has a background in Journalism,

has been a legal adviser in the field of ICT and Law for 7 years, and is specialised in (data) privacy law and compliance.

Neil Matthews, CSMB CRM Data Protection and Privacy Manager – EMEA and APJ, DellNeil Matthews is responsible

for introducing corporate policy into the CSMB CRM business — advising on new technology and ensuring privacy-compliant solutions.

Fredrik Sjöblom, Head of Knowledge Management & Information Security, ScaniaFredrik Sjöblom combines the challenges and cultures of

two worlds – knowledge management and information security – that are traditionally organized in different units.

FORRESTER KEYNOTERedefine Your Greenfield OpportunitiesJennifer Belissent, Ph.D., Principal Analyst

Greenfield opportunities aren’t just for startups or emerging markets. Even the most established and mature companies have greenfield oppor-

tunities to reinvent themselves. We can rethink our infrastructure decisions and security architecture through greenfields that are incremental, iterative, and agile.

INFRASTRUCTURE & OPERATIONS FORUM KEYNOTESIt’s Time To Change Your Homogenous Approach To Workforce ComputingChristopher Voce, Principal Analyst, Research Director

Your workers are increasingly mobile, global, and diverse — and they’re bringing in their own technology to create real business value. As a result, the tried-and-true approach of driving efficiency by managing a single PC or laptop across your enterprise is breaking down, and you’re going to have to rethink how you support them.

Design Your Infrastructure Around Workloads, Not TechnologyAndrew Reichman, Principal Analyst

Forrester encourages IT infrastructure and operations (I&O) professionals to adopt a workload-centric infrastructure that designs, deploys, and staffs

around the thing that matters most — the applications and workloads being supported.

The Role Of Mobile Device Management In Customer-Centricity Moderator: Doug Washburn, Principal Analyst & Research Director — Infrastructure & OperationsPanelists: TBA

In this panel discussion learn how I&O Professionals are adopting mobile device management (MDM) solutions to manage and secure enterprise mobile strategy.

SECURITY FORUM KEYNOTESControlling And Using Big Data To Your AdvantageJohn Kindervag, Principal Analyst

As organizations aggregate more and more data, Security & Risk (S&R) Professionals need to be aware that much of it could be financial, per-

sonal, and other types of sensitive data that are subject to global laws and regulations and that need advanced security. S&R Pros can take advantage of big data processing capabilities to finally develop their own advanced threat intelligence capabilities.

Privacy In The Era Of Borderless InnovationModerator: Eve Maler, Principal AnalystPanelists: Rachel Marbus, Advisor, KPMGNeil Matthews, Data Protection and Privacy Manager – EMEA and APJ, DellFrançoise Gilbert, Founder & Managing Attorney, IT Law Group

This keynote panel examines the impact of privacy laws and government policies on innovation and cross-border collaboration. The panel will look at true stories and les-sons learned from navigating the complex web of global privacy laws and regulations.

Not Your Bermuda Triangle: The Convergence Of Identity Management, Data Protection, And Fraud ManagementAndras Cser, Principal Analyst

Fraud affects not just banks but all firms that have customer- and business-partner-facing channels: The result is rising costs of identity theft, employee fraud, and data breaches. You can only manage fraud and protect information adequately if you: 1) fully understand the permissions of identities accessing data, and 2) can separate normal transactions from fraudulent activities and anomalies in user behavior.

Page 5: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

WWW.FORRESTER.COM/IOEMEA2012, WWW.FORRESTER.COM/SCEMEA2012 5

TUESDAY JUNE 19, 2012

INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM

08:00–09:00 Registration And Refreshments In The Solutions Showcase09:00–09:10 Opening Remarks Laura Koetzle, VP & Practice Leader - Security & Risk

Doug Washburn, Principal Analyst & Research Director - Infrastructure & Operations09:10–09:40 Forrester Keynote

Jennifer Belissent, Ph.D., Principal Analyst09:40–10:10 Industry Keynote

Dave Cullinane Chief Information Security Officer, VP, eBay10:10–10:15 Forrester Remarks10:15–10:50 Morning Networking Break In The Solutions Showcase10:50–11:30 Industry Keynote

Ian Clayton, AuthorPlatinum Sponsor Keynote

TBA11:30–12:00 Forrester Keynote

Christopher Voce, Principal Analyst, Research DirectorForrester Keynote

John Kindervag, Principal Analyst12:00–12:10 Intermission12:10–12:40 Premier Sponsor Sessions

12:40–13:40 Networking Lunch

13:40–14:00 Dessert In The Solutions Showcase

14:00–14:45 TRACK A: A Mindset Change Is Needed: Support The People,

Not The Technology

TRACK B: DCIM: Fertilizer For Your Greenfield Data Center

TRACK C: Goin’ Mobile: A Look At Forrester’s

TechRadar™ Research On Strong Authentication

TRACK D: Mastering The “Yes, And Here’s How” Response

14:45–14:55 Intermission14:55–15:25 Guest Executive Forum Guest Executive Forum Guest Executive Forum Guest Executive Forum

15:25–15:55 Networking Break15:55–16:40 TRACK A: Cloud Computing

Readiness Assessment: How Ready Is Your Organization?

TRACK B: Mobile Metrics Are Critical To

A Successful Mobile Strategy

TRACK C: Plug The Holes In Your Security

Strategy Through Effective Endpoint Protection

TRACK D: Cyber Liability Insur-ance: Is It Worth The Paper It Is

Written On?

16:40–16:50 Intermission16:50–17:35

TRACK A: Build An I&O Strate-gic Plan

TRACK B: How To Improve Service Management And Auto-mation Maturity — Roundtable

Discussion

TRACK C: The Mobile Cloud – Securing

Enterprise Collaboration

TRACK D: Calculating The Real And Hidden Costs Of A Data

Breach

17:35–18:45 Drinks Reception In The Solutions Showcase

WEDNESDAY JUNE 20, 2012

08:00–09:00 Registration & Refreshments in The Solutions Showcase09:00–09:10 Day Two Opening Remarks

Doug Washburn, Principal Analyst & Research Director - Infrastructure & Operations

Day Two Opening RemarksLaura Koetzle, VP & Practice Leader - Security & Risk

09:10–09:40 Forrester KeynoteAndrew Reichman, Principal Analyst

Forrester KeynoteAndras Cser, Principal Analyst

09:40–10:10 Industry KeynoteChristophe Guillard, Associate VP, Global Infrastructure Services, Sanofi

Industry KeynoteFredrik Sjöblom, Head of Knowledge Management & Information Security,

Scania

10:10–10:50 Morning Networking Break In The Solutions Showcase

10:50–11:40 Industry KeynoteTBA

Industry PanelModerator: Eve Maler, Principal Analyst

11:40–11:50 Forrester Remarks Forrester Remarks

11:50 - 12:50 Networking Lunch12:50 - 13:10 Dessert In The Solutions Showcase13:10–13:55 TRACK A: The Consum-

erization Of Workforce Computing Technology: The

Biggest And Greenest Field of Them All

TRACK B: How Your Peers Are Getting Private Cloud Right (Or

Wrong)TRACK C: Know Your Enemy —

Hackers Versus Executives

TRACK D: Integrating Continu-ity And Information Security For

Business Resiliency

13:55–14:05 Intermission Intermission14:05–14:50 TRACK A: Disaster Recovery In

The Cloud: Myths And Realities

TRACK B: Is Software-Defined Networking Ready For The

Enterprise?

TRACK D: Managed Security Services: What’s Next?

14:50–15:00 Intermission15:00–15:45 TRACK A: Are Cloud-

Hosted Desktops And Applications The Answer

To Your Consumerization Challenge?

TRACK B: Communications And Training Programs To Drive Adoption Of New Technologies

TRACK C: Securing Enterprise Databases Inside Out

TRACK D: International Con-siderations For Information Archiving And Governance

15:45 Close Of Forum

Mobile & Workforce Computing Spotlight Track SessionsUnderstand the trends and best practice to provision and manage desktop, mobile and consumer devices securely and efficiently.

Day 1 Day 2

One-On-One Meetings With Forrester Analysts 10:30-17:30 9:00-15:00

AG

EN

DA

Page 6: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

6 FORRESTER’S INFRASTRUCTURE & OPERATIONS FORUM AND SECURITY FORUM 2012

TRACK A: Prepare And Plan For Your Greenfield Opportunities

I&O FORUM 2012 TRACK SESSIONSSelect And Attend Value-Rich Sessions.

Build An I&O Strategic PlanJean-Pierre Garbani, Vice President, Principal Analyst

Strategic planning is an exercise in defining the resources needed to support and align with the enterprise’s business objectives. It is an opportunity for I&O Professionals to uncover the greenfield opportunities that will fit into the resources available and support the empowerment of customers.

IN THIS SESSION, I&O LEADERS WILL:

Build a strategic plan, including stakeholders and methods.

Define and refine the plan.

Keep the plan alive, with periodic revisions and evolution.

Cloud Computing Readiness Assessment: How Ready Is Your Organization?Vanessa Alvarez, AnalystJames Staten, Vice President, Principal Analyst

We’ve found that enterprises are at different phases of private cloud deployment and at the same time, public cloud is seeping into enter-prises in one way or another. What are your metrics for determining where your organization is in its cloud computing maturity?

THIS SESSION WILL EXPLORE:

An assessment framework.

Use cases for public cloud services.

How to become an enabler, not a bottleneck, for the delivery of internal and public cloud services.

A Mindset Change Is Needed: Support The People, Not The Technology Stephen Mann, Senior AnalystGlenn O’Donnell, Principal Analyst

Corporate IT has evolved significantly over the past 30-plus years and I&O’s traditional technology-centric, or even device-centric, approach will struggle to meet the expectations and needs of empowered employees going forward.

IN THIS SESSION, YOU WILL LEARN THAT:

End users are “customers.”

Your customers have a choice — so why would or should they choose you?

Internal and external customers consume business services, not IT.

Are Cloud-Hosted Desktops And Applications The Answer To Your Consumerization Challenge?Dave Bartoletti, Senior AnalystBenjamin Gray, Principal Analyst

With Macs, Android tablets, and iPads threatening most I&O Profes-sionals’ plans for client virtualization, it’s time to rethink your strategy. Are cloud-hosted desktops and applications the answer?

THIS SESSION WILL ANSWER:

What are the benefits and risks associated with cloud-hosted desktops and applications?

What is the impact of consumerization on client virtualization plans?

Are cloud-hosted desktops and applications the future?

Disaster Recovery In The Cloud: Myths And RealitiesRachel A. Dines, Senior AnalystLauren E. Nelson, Researcher

Protecting business-critical applications is a greenfield opportunity for I&O Professionals to find an innovative method of providing continuity. Enter disaster recovery in the cloud, a new model promising low-cost, highly automated, and more flexible recovery solutions.

ATTENDEES WILL:

Learn what disaster recovery in the cloud is.

Hear about the lessons learned from early adopters of disaster recovery in the cloud.

Gain an overview of the vendor landscape.

The Consumerization Of Workforce Computing Technology: The Biggest And Greenest Field Of Them AllDavid K. Johnson, Senior AnalystMichele Pelino, Principal Analyst

Consumerization isn’t just another buzzword-enhanced technology fad. In this session we will share precisely what’s changing in the industry that matters and how I&O Professionals can adapt quickly with client virtualization, on-demand software, and Macs to stay ahead.

THIS SESSION WILL COVER:

Why a mindset change is needed to embrace consumerization.

Why your “consumerizers” are your business’ competitive advantage.

Which policies and technologies are best equipped to help you make better tradeoffs.

Page 7: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

WWW.FORRESTER.COM/IOEMEA2012, WWW.FORRESTER.COM/SCEMEA2012 7

TRACK B: Build And Manage Your Greenfield Investments

DCIM: Fertilizer For Your Greenfield Data CenterRichard Fichera, Vice President, Principal Analyst

Power and cooling aren’t new concepts, but the integration of them into technology infrastructure and operations is new. This session will cover DCIM as a fundamental enabler of efficient data center operations, includ-ing fundamental drivers, basic DCIM concepts, the DCIM landscape, and key action items.

THIS SESSION WILL HELP YOU UNDERSTAND:

The need for DCIM and its key value proposition.

The major DCIM vendors.

The key metrics and actions to start taking advantage of DCIM.

Mobile Metrics Are Critical To A Successful Mobile StrategyChristian Kane, AnalystMichele Pelino, Principal Analyst

Firms are crafting Bring Your Own Device (BYOD) strategies and adopting a multitude of mobile technologies, such as mobile device management solutions and enterprise application stores, to overcome access, cost, security, legal liability, and compliance challenges. But how do I&O leaders know they’re on the right path?

THIS SESSION WILL COVER:

Workforce trends related to supporting employee-owned smartphones, slates/tablets, and laptops.

Mobile policy and technology considerations.

Best practices to measure the impact of mobile initiatives.

How Your Peers Are Getting Private Cloud Right (Or Wrong) Lauren E. Nelson, Researcher

In “the age of the customer,” I&O must deliver agile compute resources to its end users or risk being circumvented. This session presents mul-tiple enterprise private cloud examples and dives into some key issues faced in the deployment and management process.

THIS SESSION WILL COVER:

Current data on private cloud adoption and usage.

Case studies of private cloud deployments.

Recommendations for addressing common private cloud challenges.

Is Software-Defined Networking Ready For The Enterprise?Andre Kindness, Senior Analyst

More now than ever, I&O teams are pointing to the network as the problem. The rise of OpenFlow and software-defined networking prom-ises to turn the world on its head — taking the controls of the network and giving them to the applications.

IN THIS SESSION, YOU WILL LEARN:

Why software-defined networking is so attractive to everyone except networking personnel.

The best environments in which to deploy software-defined networking.

How software-defined networking will evolve and what that means for you.

How To Improve Service Management And Automation Matu-rity — Roundtable DiscussionEvelyn Hubbert, Principal Analyst

This roundtable of analysts and users will function as a brainstorming session on what research, best practices, models, and details need to be explored to improve your ITSM maturity. This session will allow our cli-ents to collaborate and connect with the lead analysts and discuss what they need and want to see as research in the future.

THIS SESSION WILL ADDRESS:

Why is it so hard to implement service portfolio management?

Why are IT service catalogs so difficult?

What do you need to do and what vendors are out there to help?

Communications And Training Programs To Drive Adoption Of New TechnologiesHenry Dewing, Principal AnalystGuest Speaker: TBA

Most business cases for technology adoption have a key sensitivity to employee adoption — if the workforce doesn’t use a new solution, its benefits don’t accrue and the business results don’t justify the invest-ment. Yet few I&O Professionals have a concrete plan to educate the workforce about planned new deployments or how to use those new solutions and drive business advantage.

IN THIS SESSION, YOU WILL LEARN HOW TO:

Educate and excite the workforce about coming solutions.

Deploy solutions to trial and early-adopter populations.

Communicate with executives and business leaders about business process requirements.

MOBILE & WORKFORCE COMPUTING SPOTLIGHT TRACK SESSIONSUnderstand the trends and best practices to provision and manage desktop, mobile

and consumer devices securely and efficiently.

Page 8: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

8 FORRESTER’S INFRASTRUCTURE & OPERATIONS FORUM AND SECURITY FORUM 2012

TRACK C: Rethink Security: Simplify Your Infrastructure; Increase Your Sophistication

Goin’ Mobile: A Look At Forrester’s TechRadar™ Research On Strong AuthenticationEve Maler, Principal Analyst

Strong authentication technologies have undergone lots of churn as new mobile-fueled technologies have come online, regulations in the financial sector have tightened, and classic methods have experienced breaches. Learn the trends and understand how to match strong authentication methods to the right risk mitigation use cases and usability needs.

THIS SESSION WILL EXPLORE:

What makes authentication strong?

In what ways is “authentication by mobile device” playing a role?

How should you think about your strong authentication requirements and constraints?

Know Your Enemy — Hackers Versus ExecutivesModerator: Rick Holland, Senior AnalystModerator: John Kindervag, Principal AnalystPanelist: TBA

This session will include a live hacking demonstration, with noted security experts demonstrating the tools and techniques that cybercrim-inals use. Corporate CISOs will then join these “hackers” on-stage for a highly interactive and entertaining panel discussion regarding what Security & Risk (S&R) Professionals need to know about their enemies.

IN THIS SESSION, YOU WILL LEARN:

What happens in a real-life cyberattack?

What do hackers think about the state of enterprise security?

What should S&R Professionals do to protect themselves from attacks?

Plug The Holes In Your Security Strategy Through Effective Endpoint ProtectionChenxi Wang, Ph.D., Vice President, Principal AnalystChris Sherman, Researcher

Your organization is not safe without endpoint protection. PCs and laptops are and will almost always be the primary entry point for hackers look-ing to gain entry to a corporate network, so choosing the right endpoint security technologies is a crucial part of any IT security strategy.

ATTENDEES WILL LEARN ABOUT:

The wide range of threats to the endpoint, with multiple technologies used to protect against them.

A number of key vendors who have brought these technologies together in integrated suites.

Future trends in endpoint security.

Securing Enterprise Databases Inside Out Noel Yuhanna, Principal Analyst

Databases are critical components in the application stack. With the growing number of databases and increasing system complexity, enter-prises need to look at simplified database security approaches yet increase sophistication to defend against attacks.

THIS SESSION WILL EXPLORE:

Where does database security fit in the overall data security strategy?

What works and what doesn’t when it comes to database security?

How can you simplify database security implementation yet increase sophistication?

The Mobile Cloud – Securing Enterprise CollaborationChenxi Wang, Ph.D., Vice President, Principal Analyst

Collaboration services, such as Dropbox and Box are firmly established in enterprises, with or without IT’s consent. In this session, we will look at strategies IT can take to enable the mobile cloud for your users, but still remain secure and compliant to your regulatory requirements.

THIS SESSION WILL EXPLORE

Ways to enforce data protection into the cloud and onto mobile devices.

Strategies to enabling access across multiple clouds without doing point-to-point integration work.

New technology layers to invest in or develop.

SECURITY FORUM 2012 TRACK SESSIONSSelect And Attend Value-Rich Sessions.

MOBILE & WORKFORCE COMPUTING SPOTLIGHT TRACK SESSIONSUnderstand the trends and best practices to provision and manage desktop, mobile

and consumer devices securely and efficiently.

Page 9: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

WWW.FORRESTER.COM/IOEMEA2012, WWW.FORRESTER.COM/SCEMEA2012 9

TRACK D: Run At The Threat: Embrace (The Right Amount Of) Risk Safely

Mastering The “Yes, And Here’s How” ResponseChris McClean, Senior Analyst

Risk management is seen as a roadblock; in many cases, it is purposely being kept out of the conversation when there are projects with looming deadlines and meager budgets. This means that when a risk review finally occurs, the results are rarely good and the response is rarely pleasant.

THIS SESSION WILL HIGHLIGHT:

How mature risk management programs have turned themselves into solution organizations.

How to avoid simply putting up controls and barriers.

How to respond to business requirements with recommendations that meet demands in a safe and controlled manor.

Cyber Liability Insurance: Is It Worth The Paper It Is Written On?Andrew Rose, Principal AnalystGuest Speaker: TBA

In 2012, CISOs need to be planning for failure and recovery. Cyber liability insurance is an interesting risk mitigant that is rapidly gain-ing credibility and attention from large corporations. This session will explore the available products and their value to an organization.

KEY TAKEAWAYS WILL INCLUDE:

An insight into the cyber liability products available.

A review of the costs and benefits of insurance.

A Q&A session asking the tough questions of a cyber liability insurance underwriter.

Integrating Continuity And Information Security For Business ResiliencyStephanie Balaouras, Vice President, Research DirectorAndrew Rose, Principal Analyst

Business continuity, IT disaster recovery, and information security are essential elements of business resiliency. While all have traditionally oper-ated as separate silos, they follow very similar business impact analysis and risk assessment processes, with heavy reliance on controls documentation, monitoring, and testing.

IN THIS SESSION, YOU WILL LEARN:

How to apply a common risk-based approach to these disciplines.

How this approach will streamline processes and improve cross-discipline collaboration.

How to provide a common system of managing risk.

Managed Security Services: What’s Next?Moderator: Ed Ferrara, Principal AnalystPanelists: TBA

Four respected executives from the managed security space will discuss the state of managed security services, what the cloud means to the industry, and what companies should ask when using these types of services now.

THIS SESSION WILL HELP YOU UNDERSTAND:

The technical and business issues of working with managed security service providers.

The challenges that both IT clients and providers will face in the future.

Calculating The Real And Hidden Costs Of A Data BreachEd Ferrara, Principal AnalystHeidi Shey, Researcher

What’s the cost of a data breach for your organization? Tackling this question will help bring greater financial and risk management disci-pline to your organization in assessing risk and justifying investments.

THIS SESSION WILL HELP YOU UNDERSTAND:

What other organizations have (and are) paying out after being breached.

The types of costs that you should consider in your own assessment.

A framework for calculating costs.

International Considerations For Information Archiving And GovernanceBrian W. Hill, Principal Analyst

Enterprises face major challenges in effectively addressing information archiving and governance on a global basis. Application gaps, big varia-tions in cross-border privacy, regulatory, and eDiscovery environments, are major obstacles to successful global programs.

THIS SESSION WILL:

Outline international information archiving and governance challenges.

Describe case studies on how enterprises tackle archiving, records management, and eDiscovery globally.

Provide best practices for successful worldwide programs.

Page 10: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

10 FORRESTER’S INFRASTRUCTURE & OPERATIONS FORUM AND SECURITY FORUM 2012

SERVING INFRASTRUCTURE & OPERATIONS PROFESSIONALSVanessa Alvarez, AnalystDave Bartoletti, Senior AnalystHenry Dewing, Principal AnalystRachel A. Dines, Senior AnalystRichard Fichera, VP, Principal AnalystJean-Pierre Garbani, VP, Principal AnalystBenjamin Gray, Principal AnalystEvelyn Hubbert, Principal AnalystDavid K. Johnson, Senior Analyst

Christian Kane, AnalystAndre Kindness, Senior AnalystStephen Mann, Senior AnalystLauren E. Nelson, ResearcherGlenn O’Donnell, Principal AnalystMichele Pelino, Principal AnalystAndrew Reichman, Principal AnalystJames Staten, VP, Principal AnalystChristopher Voce, Principal Analyst, Research Director

SERVING SECURITY & RISK PROFESSIONALSStephanie Balaouras, VP, Research DirectorJinan Budge, Global Council ManagerAndras Cser, Principal AnalystEd Ferrara, Principal AnalystBrian W. Hill, Principal AnalystJohn Kindervag, Principal Analyst

Eve Maler, Principal AnalystChris McClean, Senior AnalystAndrew Rose, Principal AnalystChris Sherman, ResearcherHeidi Shey, ResearcherChenxi Wang, Ph.D., VP, Principal Analyst

ATTEND A PRE-FORUM WORKSHOP

During this one-day interactive Workshop of presentations, hands-on exercises, and discussions, attendees learn about the methodology behind the Balanced Score-card and then begin to build their own Bal-anced Scorecard under the guidance of a Forrester analyst.

THE IT BALANCED SCORECARD: MEASURING AND COMMUNICATING THE IT VALUEJune 18th, 2012 • ParisCraig Symons, Vice President, Principal Analyst

The IT Balanced Scorecard is a powerful framework that goes beyond being just another metrics system; it's a strategic management and measurement system capable of transforming an organization and delivering breakthrough performance. Using the IT Balanced Scorecard creates a common language between IT and business stakeholders, making it easier to align strategies and measure and communicate value.

BUILDING A SOURCING STRATEGYJune 18th, 2012 • ParisLutz Peichert, VP-Consulting-IT EMEA & Wolfgang Benkel, Principal Analyst

In this Workshop, Forrester walks through the current challenges and trends facing SVM Professionals and where a sourcing strategy fits in. Leveraging this context, For-rester offers frameworks around gathering appropriate stakeholder input to define the sourcing life cycle and its primary constituents. With the need established and data gathering started, Forrester helps attendees work through exercises to build a strategy appropriate to the business' mandate, discusses portfolio analysis to examine service categories, presents organizational strategies to operationalize the sourcing strategy, and helps start road map creation to establish execution milestones.

SPONSORSGain Insight Into Technology Solutions From Leading Technology Vendors.

If you are interested in sponsoring

a Forrester Event please call

+1 888 34 FORUM (3-6786) or email

us at [email protected].

Premier Sponsor

Gold Sponsors

Silver Sponsors

EXPERT ADVICEMeet With Forrester Analysts.

Consistently rated as one of the most

popular features of Forrester Events,

Forrester Analyst Meetings give you

the opportunity to discuss the unique

issues facing your organization. Work

one-on-one with the analyst of your

choice, subject to availability.

* Analyst participation is confirmed as of the date of this publication.

SERVING APPLICATION DEVELOPMENT & DELIVERY PROFESSIONALSNoel Yuhanna, Principal Analyst

BUSINESS TECHNOLOGY FUTURES, SERVING CIOS:Jennifer Belissent, Ph.D., Principal Analyst

Page 11: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

WWW.FORRESTER.COM/IOEMEA2012, WWW.FORRESTER.COM/SCEMEA2012 11

REGISTRATION

On or before April 27 After April 27 4 For The Price Of 3

Clients €1995 €2195 €6585

Nonclients €2195 €2395 €7185

Nonprofit/ Government €1895 €2095 €6285

PRE-FORUM WORKSHOP:€1500 for paying paying Infrastructure & Operations Forum and Security Forum 2012 attendees (€1975 regular rate).

If your company is a Forrester client, you may have prepaid Event Seats or Service Units available to cover the cost of attendance. Please contact Forrester Events or your account manager to inquire. Visit www.forrester.com/events for pricing and registration details, terms, and conditions.Forrester’s infrastructure & Operations and Security are collocated with CIO Forum, Enterprise Architecture Forum, Sourcing & Vendor Management Forum, at Paris Marriott Rive Gauche Hotel & Conference Center to allow you to network with more business leaders, bring additional team members, and access valuable additional content relevant to your challenges and responsibilities. Attendees receive complimentary access to sessions in all five Forums.

WEB:

www.forrester.com/ioemea2012 www.forrester.com/scemea2012

PHONE:

+31.(0).20.305.4848

EMAIL:

[email protected]

REVIEW FROM FORRESTER’S INFRASTRUCTURE & OPERATIONS AND SECURITY FORUMS 2011 ATTENDEE:

“The keynotes were terrific

and the ‘Know Your Enemy’

sessions were very useful.”Patrick C., Director, Information Systems

HOTEL & TRAVEL

Situated in downtown Paris, France, approx. 45mins from Charles de Gaulle Airport, the Paris Marriott Rive Gauche Hotel & Conference Center is conveniently located for the Latin Quarter and Saint-Germain-des-Pres. The nearby metro station takes you directly to the Eiffel Tower, Champs Elysees, Montparnasse business dis-trict and Notre Dame in less than half an hour.

PARIS MARRIOTT RIVE GAUCHE HOTEL & CONFERENCE CENTER17 Boulevard Saint Jacques, Paris, 75014, France

Phone:+33.1.4078.7980

Web:Register through Forrester’s private webpage under the Travel Info tab at www.forrester.com/ioemea2012 and www.forrester.com/scemea2012

SPECIAL RATE INFO:

Forrester has negotiated a group room rate at the Marriott Rive Gauche Hotel for Event sponsors and attendees. The discounted group rate is €207.58 per room per night, including breakfast and excluding applicable taxes based on single occupancy. The negotiated group rates are based on availability and apply to reservations for the nights of 18 and 19 June 2012. The cost of accom-modation and travel is not included in the Event registration price. The discounted rate can only be booked through Forrester’s private webpage under the travel info tab at www.forrester.com/ioemea2012 or www.forrester.com/scemea2012.Please note: It is not possible to book the discounted rate by calling or emailing the hotel directly.

Page 12: INFRASTRUCTURE & OPERATIONS FORUM SECURITY FORUM 2012

INFRASTRUCTURE & OPERATIONS FORUM and SECURITY FORUM 2012Leapfrog Your Global Competition

JUNE 19-20, 2012 MARRIOTT RIVE GAUCHE HOTEL PARIS FRANCE

These two events will help you leapfrog your global competition by designing your greenfield infrastructure today and facing security threats head on.

JOIN FORRESTER FOR THESE 2012 EVENTS FEATURING:

Compelling keynotes by industry executives and Forrester analysts. In-depth track sessions designed for your role. Personalized meetings with Forrester analysts. Networking with 200 peers, analysts, and industry executives. Technology solutions from leading agencies and solution providers.

CONNECT WITH FORRESTER AND EVENT ATTENDEES

Twitter #IOFE12, #SFE12Follow the forum buzz and ask questions during forum keynotes.

LINKEDIN IO; http://linkd.in/x6ORfw SC; http://linkd.in/xPQhz

Network with other attendees.

Blogs http://blogs.forrester.comFollow analysts covering your role.

Communities http://community.forrester.comExtend conversations through your role community.

Facebook http://www.facebook.com/forresterStay connected through Forrester Events pages.

UPCOMING EVENTSVisit www.forrester.com/events to view a complete listing of Forrester Events.

Application Development & Delivery Summit, and Busi-ness Process SummitOctober 4, 2012 London

Marketing Leadership ForumNovember 6-7, 2012 London

REVIEWS FROM FORRESTER’S INFRASTRUCTURE & OPERATIONS AND SECURITY FORUMS 2011 ATTENDEES:

“This was my first experience at a Forrester event,

and I found the content helpful and the Forrester

employees professional and accommodating.

Great Job!”Theresa T., Regional Sales Manager