Security Forum
-
Upload
riccardoburgio -
Category
Documents
-
view
218 -
download
0
Transcript of Security Forum
-
8/8/2019 Security Forum
1/12
FORRESTERS SECURITY
FORUM EMEA 2010
Navigating The New Security & Risk RealityMarch 11-12, 2010 Guoman Tower Hotel London
www.forrester.com/security2010emea
-
8/8/2019 Security Forum
2/12
FORRESTERS SECURITY
FORUM EMEA 2010
Dear Colleague,
In 2010, Security & Risk professionals will face a new landscape unlike any weve seen before.
Weve been discussing change for years: how the future of IT will bring dramatic changes
to workplace dynamics, sourcing models, and application portfolios. But this year will be
different. The confluence of the changing threat landscape, economy, and new technology
requirements are forcing more change than weve seen in a decade. We need to move beyond
discussions of the economy plunging into freefall and the resulting decrease in budgets, jobs,
and discretionary security projects. Security & Risk professionals need to understand how to
navigate this new security reality and continue to drive the business forward, moving beyond
focusing on security for the rapidly changing technology and instead focusing on mastering
two major shifts: 1) a shift in business expectations, and 2) a shift in ownership.
Forresters Security Forum EMEA will bring together industry experts and analysts to hold
practical sessions and panels on todays most difficult security and risk struggles. Together,
we will work to rethink the role of security within your enterprise by finding ways to get close to
the business, create efficiencies with governance, risk, and compliance (GRC), establish the
right set of priorities, and implement an architecture that responds to these security shifts.
I look forward to seeing you in London!
Two Forums For The Price Of One
Attendees of Forresters Security Forum EMEA 2010 will have access to Forresters co-located
Infrastructure & Operations Forum EMEA 2010. For more information, please see page 10.
Rob Whiteley
Vice President, Research DirectorForrester Research
Contents
Role-Based Forum
Speakers
Expert Advice
Agenda
Track Sessions
Forresters Co-LocatedInfrastructure &OperationsEMEA Forum 2010
Registration
Venue & Sponsors
3
4
6
7
8
10
11
12
2 www.forrester.com/security2010emea
-
8/8/2019 Security Forum
3/12
-
8/8/2019 Security Forum
4/12
POWERFUL CONTENT. EXCEPTIONAL SPEAERS
Building Trust As The Business Shifts To Online Services
Eirik Time, CISO, Statoil
Eirik Time is currently the Chief Information Security Officer (CISO) for Statoil. He is responsible for corporate information
management and IT risk management, compliance, and monitoring. Mr. Time joined Statoil as an engineer in 1997 and
has held many IT management positions, which included eBusiness, ICT security, security and usability, and Internet
technology responsibilities. Pr ior to joining Statoil, Mr. Time worked for companies such as Cambridge Technology Partners, Computas
AS, and TDI in consulting and management positions.
Key session takeaways:
Learn the value of building trust and implementing security controls for SaaS and other online services.
Identify the value of public key infrastructure (PKI), identity management, and establishing centralized digital identities for users
consuming online services.
Discuss recommendations and lessons learned with these technologies
How Changing Business Expectations Require CISOs To Own Even More
im Aarenstrup, Group Head of Information Security, A.P. Moller Maersk, and Council and
Executive Chairman, Internet Security Forum (ISF)
Kim Aarenstrup is the Group Head of Information Security/CISO of A.P. Moller Maersk and sits on the Council of the
Information Security Forum (ISF) as Executive Chairman. Mr. Aarenstrup is also the Deputy Chairman and Founder of
the public Danish IT-Security Council. He has a background in the police force as a criminal investigator and was a key player in
establishing the first national High Tech Crime unit in Denmark.
Key session takeaways: Examine Mr. Aarenstrups view of the CISO position from both his day-to-day role as Group Head of Information Security at Maersk
and Council and Executive Chairman at ISF.
Discuss why changing business needs require that CISOs own more, not less, security responsibility.
Hear some thought-provoking advice and future recommendations for reshaping your security and risk leadership role.
Where Is The EMEA Cloud?
James Staten, Principal Analyst, Forrester Research
With the economy beginning its slow recovery, does the value proposition behind the new outsourcing options such as
cloud computing still apply? Or should enterprise Infrastructure & Operations pros look to return services to the data
center? The evolution toward cloud computing isnt just about economics its about strategic right-sourcing, and cloud
services play a key role in making you more efficient and effective. Come learn what other leading enterprises are putting in the cloud
and why you should too. This session will cover:
What is real in the cloud and what still needs more work.
How others are transitioning to the cloud.
What services they are transitioning and why.
Industry eynotes
Forrester eynotes
This is a joint Keynote session with Forresters co-located Infrastructure & Operations Forum EMEA 2010
4
-
8/8/2019 Security Forum
5/12
Navigating The New Security & Risk Reality
halid ark, Principal Analyst, Forrester Research
Shift happens. And you need to deal with the consequences. Weve been discussing change for years: dramatic changesto workplace dynamics, new sourcing models, and evolving application portfolios. But change is no longer hypothetical
its real. This session will move beyond discussions of the economy and help you understand how to navigate the new
security reality. Session attendees will learn:
The major business trends you need to prepare for before the inevitable upturn in the global economy.
How to master three major shifts: 1) a shift in business expectations; 2) a shift in ownership; and 3) a shift in security architecture.
Why you need to move beyond asking questions of your CIO and business peers to providing guidance and evolving your SRM
practice.
Visible Clouds: How To Master A Shift To Cloud Computing
Chenxi Wang, Ph.D., Principal Analyst, Forrester Research
Cloud computing promises tremendous business and operational efficiencies but has fundamentally changed the way IT
procures capacity, software, and expertise. As a result, the way to the cloud is not without inhibitors. Lack of visibility into
cloud operations, possibility of non-compliance, and privacy concerns are only a few of the challenges. This session will
equip you with the best practices to empower information security to embrace cloud computing. Key takeaways from this session will be:
Learn where cloud computing may be a fit and where it is not.
Get concrete steps to prepare for the move to the cloud.
Discuss best practices to approach cloud security, privacy, and compliance.
Attend A Pre-Forum
Workshop
For added value, join a small group of
peers and work closely with Forrester
analysts during a full-day, hands-on
Workshop. Special discounted rates
for paying Security Forum EMEA 2010
attendees!
Pre-Forum Workshop pricing:
795 for paying Security Forum EMEA
2010 attendees (1295 regular rate)
to register call: +31 (0)20 305 4848.
Measuring The Effectiveness Of Your Security Organization
March 10, 2010Led by Principal Analyst Khalid Kark and Senior Analyst Andrew Jaquith
In the past, the ever-changing threat landscape ensured healthy budgets for
information security. But in today's economic climate, senior managers are no longer
willing to write blank checks for IT security. As a result, security and risk management
executives must increasingly find ways to measure and communicate the success of
their information security programs to senior management. Security metrics are the
keys to doing this successfully.
Through facilitated sessions and presentations, you will discuss:
Best practices for developing an effective strategy for IT security.
Marketing the value of security to build awareness with the business.
Essential strategies for improving security performance.
Measuring the effectiveness of the security program.
Turning operational metrics into business metrics.
Creating a Balanced Security Scorecard that communicates program effectiveness.
http://www.forrester.com/securityforumworkshop2010
5
-
8/8/2019 Security Forum
6/12
Meet One-On-One With Forrester Analysts.
Participating Forrester Analysts And Coverage Areas:
Consistently rated as one of the most popular features of Forrester events, One-On-One Meetings give you the opportunity to discuss unique security and risk
issues facing your organization with Forrester analysts. Security Forum EMEA 2010 attendees may schedule two 20-minute One-On-One Meetings with the
Forrester analysts of their choice, depending on availability.
Andras Cser, Senior Analyst
Role Served: Security & Risk professionalsEnterprise Single Sign-On, Entitlement Management, Financial Services,
Healthcare & Life Sciences, Identity & Access Management, Mobile Services,
Passwords, Professional Services, Security & Risk, Strong Authentication,
Telecommunications Services, User Account Provisioning, Web Single Sign-On
Glenn ODonnell, Senior Analyst
Role served: Infrastructure & Operations professionalsApplication Development, Application Management, Application Performance
Monitoring, Business Service Management, CMDB, Capacity Modeling & Planning,
Data Center Automation, Data Center Management, IT Asset Management,
IT Infrastructure & Operations, IT Management, IT Organization, IT Process Automation, IT
Service Management, IT Services, IT Strategy, Planning, & Governance, ITIL, Infrastructure
Change Management, Infrastr ucture Configuration Management, Infrastructure Measurement,
Infrastructure Metrics, Integrated I T Management, Networking, Organizational Design & Change
Management, Server Management, Server Provisioning, Service-Level Management, Software
Distribution, Systems Management
Brad Day, Vice President, Principal Analyst
Role served: Infrastructure & Operations professionalsComputer Architectures, IT Infrastructure & Operations, Midrange Systems,Server Consolidation, Server Hardware, Server Operating Systems, Systems
Management, Unix Ser vers
Andrew Reichman, Senior Analyst
Role served: Infrastructure & Operations professionalsConsumer Electronics, Consumer Technology, Data Archiving, Data Protection, IT
Infrastructure & Operations, Next Generation DVDs, Storage & Data Management,
Storage Management, Storage Networking
James Staten, Principal Analyst
Role served: Infrastructure & Operations professionals
Blade Servers, Capacity On Demand & Utility Computing, Cloud Computing,Computer Architectures, Data Center Architecture, Data Center Consolidation,
Data Center Management, Grid Computing, IT Infrastructure & Operations, Server
Consolidation, Server Hardware, Server Virtualization, Systems Management, X86 Servers
Christopher Voce, Analyst
Role served: Infrastructure & Operations professionalsApplication Management, B2B Sales & Marketing, Clustering, Computer Architectur es,
Data Center Management, IT Infrastructure & Operations, L icense Management, Server
Hardware, Server Management, Server Operating Systems, Server Virtualization,
Software Distribution, Systems Management, Systems Partitioning & Virtualization, X86 Servers
Doug Washburn, Analyst
Role served: Infrastructure & Operations professionalsClient Computing Hardware, Data Center Management, Green IT, IT Infrastructure &
Operations, IT Management, IT Organization, Server Hardware, Server Management,
Storage & Data Management, Storage Management
Simon Yates, Vice President, Research Director
Role served: Infrastructure & Operations professionals
Application Management, Client Computing Hardware, Client Operating Syst ems & Software,Client Security & Management, Computer Displays, Enterprise Laptops, Enterprise Mobile
Devices, Enterprise Mobility, IT Infrastructure & Operations, Mobile Operating Systems,
Mobile Software & Platforms, PC Support, Peripheral Devices, Server-Based Computing
Galen Schreck, Principal Analyst
Role served: Enterprise Architecture professionalsCloud Computing, Computer Architectures, Data Center Management, Enterprise
Architecture, Enterprise Architecture Domains, High Availability/Fault Tolerance,
IT Infrastructure & Operations, IT Management, IT Strategic Planning, IT Strategy,
Planning, & Governance, Processor Architectures, Server Virtualization, Systems Management,
Systems Partitioning & Vir tualization, Technical Architecture
Chris Silva, Senior Analyst
Role served: Infrastructure & Operations professionalsBroadband & Remote Access, Convergence Services, Enterprise Mobile Devices,
Enterprise Mobility, Fixed-Mobile Convergence, IT Infrastructure & Operations,
LAN/WAN Performance Optimization, Local Area Networks, Mobile Operating
Systems, Mobile Phones, Mobile Software & Platforms, Network Performance & Security,
Networking, PDAs, Remote Access Infrastructure, Remote Work & Telecommuting, Smartphones,
Telecommunications Services, VPN - Internet/IPSec/SSL, Voice Services, Wide Area Networks,
Wide Area Wireless Networks/Wireless Broadband, Wireless LAN Infrastructure Hardware,
Wireless LAN Protocols & Standards, Wireless Voice Services - Mobile Voice & VoWi-Fi
Benjamin Gray, Senior Analyst
Role served: Infrastructure & Operations professionalsClient Computing Hardware, Client Operating Systems & Software, Enterprise
Desktops, Enterprise Laptops, Enterprise Mobile Devices, Enterprise Mobility, IT
Infrastructure & Operations, Mobile Operating Systems, Mobile Services, Mobile
Software & Platforms, Telecommunications Services
Evelyn Hubbert, Senior Analyst
Role served: Infrastructure & Operations professionals
Business Service Management, CMDB, Data Center Management, IT AssetManagement, IT Infrastructure & Operations, IT Process Automation, IT Service
Management, ITIL, Infrastructure Change Management
Elizabeth Herrell, Vice President, Principal Analyst
Role served: Infrastructure & Operations professionalsCall & Contact Center Outsourcing, Communications Infrastructure, Contact
Center Technologies & Processes, IT Services, Networking, Outsourcing, SIP/
SIMPLE Protocols, Speech Technologies, Unified Communications
Onica ing, Researcher
Role served: Infrastructure & Operations professionalsAlign people and processes with business needs, Data Center Management, Green
IT, IT Asset Management, IT Infrastructure & Operations, IT Process Automation,
ITIL, Make smarter infrastructure choices by balancing technical and business
justifications, Make your infrastructure more efficient, Navigate the evolving ecosystem of IT suppliers
Bill Nagel, Analyst
Role Served: Security & Risk profes sionalsAuthentication, Authentication, Authorization, & Audit, Biometrics, Digital &
Electronic Signatures, Digital Certificates & Digital Signatures, Financial Services,
Fraud Management, Governance, Risk, & Compliance, Government, Healthcare &
Life Sciences, High-Tech, Identity & Access Management, Infrastructure Security, Mobile Security,
Passwords, Privacy, Security & Risk, Security Operations, Security Policies, Security Program
Governance, Smart Cards, Strong Authentication
Usman Sindhu, Researcher
Role Served: Security & Risk profes sionalsEndpoint Security, Infrastructure Security, Network Access Control, Network
Performance & Security, Network Security, Net working, Regulations & Legislation,Security & Risk, Security Operations, Security Standards, Regulations, &
Legislation, Vulnerability & Threat Management
Rob Whiteley, Vice President, Research Director
Role Served: Security & Risk profes sionalsNetwork Access Control, Network Performance & Security, Networking, Security
& Risk
Chenxi Wang, Ph.D., Principal Analyst
Role Served: Security & Risk profes sionalsApplication Security, Content Security, Security & Risk, Security Operations, Threat
Management, Vulnerability & Threat Management
Andrew Jaquith, Senior Analyst
Role Served: Security & Risk professionalsData Classification, Data-Centric Security, Electronic Signatures, Encryption,
& Rights Management, Encryption, Information Leak Prevention, Information
Protection, Security & Risk
halid ark, Principal Analyst
Role Served: Security & Risk professionalsGovernance, Risk, & Compliance, IT Compliance Management, IT Risk
Management, Regulations & Legislation, Security & Risk, Security Performance
Management, Security Policies, Security Program Governance, Security Services,
Security Standards, Regulations, & Legislation, Security Strategy
John indervag, Senior Analyst
Role Served: Security & Risk professionalsData Classification, Data-Centric Security, Encryption, Enterprise Firewalls,
Information Leak Prevention, Information Protection, Infrastructure Security,
Mobile Security, Network Security, Personal Firewalls, Protect Your Organization's
Information, Regulations & Legislation, Security & Risk, Security Appliances, Security
Architecture, Security Configuration Management, Security Event Management, Security
Operations, Security Performance Management, Security Program Governance, Security
Services, Security St andards, Regulations, & Legislation, Security Strategy, Threat Management,
Vulnerability & Threat Management
Chris McClean, Analyst
Role Served: Security & Risk profes sionalsCorporate Governance, Corporate Social Responsibility, Enterprise Compliance
Management, Enterprise Risk Management, Governance, Risk, & Compliance,
Green Business Strategy, IT Compliance Management, IT Management, IT Risk
Management, IT Strategy, Planning, & Governance, Security & Risk
EXPERT ADVICE
Security Forum EMEA 2010 attendees can also choose to meet with analyst from the co-located Infrastructure & Operations EMEA Forum including:
6
-
8/8/2019 Security Forum
7/12
AGENDA
All session speakers, themes, and times are subject to change. 7
-
8/8/2019 Security Forum
8/12
-
8/8/2019 Security Forum
9/12
The Security Of B2B: Enabling An UnboundedEnterpriseUsman Sindhu, Researcher, Forrester Research
The need to work with third-party organizations is
accelerating. Todays global economy requires more
interactions with suppliers, partners, and even customers.
But how do you make sure youre not exposing the businessto new risks? This session will explore how organizations
are putting security controls and policies in place to protect the
blurring enterprise boundary. Attendees will:
Learn best practices in securing todays business-to-businessinteractions.
Understand the right security controls that protect your businesswithout sacrificing flexibility.
Discuss updated policies and contractual language to reflect newbusiness risks.
Building An Identity Strategy To HarnessConsumerization And Cloud ComputingBill Nagel, Analyst, Forrester Research
Consumer technologies have invaded the workplace, and
enterprise boundaries are expanding outward into the
cloud. This loss of control can be a daunting prospect
for security pros charged with employee authenticationand authorization. This session will discuss ways to
safely harness the consumer electronics revolution using identity
management technologies and cloud services. Attendees at this
session will:
Learn how technologies and processes for both enterprise andconsumer authentication are being used today.
Help you understand the challenges and opportunities offederation and user-centric identity.
Identify how authentication can help organizations integratepersonal mobile computing, telecommunications, and storage
devices into the workplace.
Find out how organizations are working on securely movingcorporate information resources into the cloud.
Securing Bring-Your-Own-PC (BYOPC) ProgramsRobert Whiteley, Vice President & Research Director, Forrester Research
Bring-your-own-PC (BYOPC) programs lower IT costs,
decrease complaints from employees, and produce fewer
conflicts with the business. Employees require more
flexibility and better technology from IT, and IT has no
choice but to give in. This session will describe a security
architecture using endpoint security, virtualization, and management
technologies to secure this IT inevitability. This session will cover:
Why organizations are desperate to make BYOPC work. The underlying technologies required to make BYOPC a reality.
How to design a new security architecture that enables this levelof employee flexibility.
Protecting Information When You Dont Own The AssetsAndrew Jaquith, Senior Analyst, Forrester ResearchOutsourcing, offshoring, Tech Populism, and executive
bling present a common problem: sensitive data stored
on assets your company does not own. In this session, we
reveal key strategies for extending the reach of the data
security controls so that data stays secure regardless of
who owns the asset. In this session, you will:
Hear essential strategies for future-proofing data protection.
Get guidelines for working with business partners and gear-totingemployees.
Understand lessons learned from pioneering enterprises.
Assessing Cloud Security: Examining Top ProvidersSecurity And Privacy Practices
Chenxi Wang, Ph.D., Principal Analyst, Forrester Research
IT professionals remain skeptical and concerned about
security and privacy of outsourcing to the cloud. In this
session, we will take a look at how top cloud providers like
Salesforce, Google, and Microsoft handle security and privacy issues;
go through mock case studies of security/privacy requirements; and
conclude with best practices for protecting your data in the cloud.
At this session you will:
Learn how the top cloud providers handle security and pr ivacy.
Understand how to assess risk and reward tradeoffs of cloudoutsourcing.
Examine best practices for dealing with cloud providers andtrusting your data to the cloud.
IN-DEPTH TRACS
Track B Shift In Ownership: Protecting Data Outside Your Four WallsA new generation of outsourcing and the consumerization of IT are usurping control from IT. The introduction of cloud computing gives
IT the flexibility to tactically outsource IT services. At the same time, your workforce is demanding more flexibility, and employees
sporting consumer-grade gear are eroding traditional security controls. The result? You dont own your data anymore. Moreover,
enterprises know the weakening security perimeter is no longer sufficient for companies to embrace cloud computing, hosted services,
Web 2.0, consumer devices, and vir tualized assets. To help, well get you up to speed on how to: govern and secure data housed with
external providers and employees; rethink new outsourcing and employee contracts; embrace Tech Populism; extend audit controls to
third parties; and determine which security services belong in the cloud.
9
-
8/8/2019 Security Forum
10/12
FORRESTERS INFRASTRUCTURE & OPERATIONS FORUM EMEA 2010
Postponed, delayed, curtailed, or outright canceled you heard these words too often in the past 18 months. But as the global
economy recovers, your company wants to come out of the starting gate fast with new applications and new market initiatives. Is yourfirms infrastructure ready to answer the call? Will you need to refresh network, server, or storage gear to meet the demand? Should you
consider cloud or other strategic outsourcing alternatives? Do you have the skills you need to leverage new virtualization and automation
tools? Can you finally fulfill that long-held dream of transforming the infrastructure and operations (I&O) function from an organization
based on technology silos to a true service delivery team? These are the tough questions you need to prepare for as 2010 arrives.
This years I&O Forum will focus on the enormous tasks of planning, prioritizing, justifying, and carefully executing the wide range of people,
process, and technology projects needed to get your firm back in the black. Specifically, the Forum will answer questions such as:
How will I&O drive a fast recovery for firms by planning and prioritizing infrastructure initiatives that best align with business goals?
How will I&O teams adapt and apply the recessionary behaviors of business case justification and financial acumen and tune
them to the new norm for communicating with business leaders?
How will I&O assess the post-recession readiness of its infrastructure to meet current and future business needs?
ey Questions The Infrastructure & Operations Forum Will Answer
Attendees of the Infrastructure & Operations Forum will learn how to manage and optimize I&O people, processes, and technologies
to fuel growth and improve efficiency in the post-recession era. They will learn the answers to questions such as:
How do I prioritize new I&O opportunities that will drive business growth and reduce the cost of operations against the backlogof projects already on the list?
How do I effectively plan, justify, select, and optimize critical I&O solutions over the next five years?
What impact will these technology investments have on people, skills, and the process of running I&O teams?
How do I accelerate the transformation of I&O from an organization led by technology silos to one that emphasizes service delivery?
Who Should Attend?
Forresters Infrastructure & Operations Forum EMEA 2010 will examine crucial ways to make I&O organizations successful and well
aligned with business objectives. This years theme, Back In Black: Planning And Executing Your Post-Recession Initiatives addresses
issues relevant to all technology professionals, but its content will focus most closely on these roles:
Infrastructure & Operations professionals.
Enterprise Architecture professionals.
Sourcing & Vendor Management Professionals focusing on infrastructure issues.
CIOs.
IT professionals involved in consolidation and virtualization projects, automating IT processes, building business continuity plans,
and hiring and training the next generation of I&O professionals.
TWO FORUMS, ONE PRICE
Attendees of Forresters Security Forum EMEA 2010 will have access to
Forresters co-located Infrastructure & Operations Forum EMEA 2010.
The Forums will open with a joint keynote session and then attendees
can choose which keynotes and track sessions they wish to attend.
Twice the content, twice the value!
Track Sessions Give You Takeaways You Can Use Immediately
Now that we are looking beyond the recession to the next period of growth and investment, IO leaders face some tough decisions
about their priorities, as not every project will come back.
Track A: Building An I&O Technology Plan For The Post-Recession Era.
Track B: Embracing The New Norm To Plan, Prioritize, And Execute I&O Projects.
www.forrester.com/infrastructure2010emea
Back In Black: Planning And ExecutingYour Post-Recession Initiatives
CO-LOCATED WITH SECURITY FORUM:
March 11-12, 2010 Guoman Tower Hotel London
0
-
8/8/2019 Security Forum
11/1211
-
8/8/2019 Security Forum
12/12
VENUE & SPONSORS
Sponsors
Guoman TowerSt Katharine's Way, London E1W 1LD, UK
Phone: +44 845 305 8335http://www.guoman.com
The Tower is a uniquely calm and tranquil place to stay in. Inspired by the slow roll
of the Thames just outside, this four-star London hotel provides a feeling of serenity
and peace, away from the bustle of London and the city. The hotel offers a range of
bedrooms, suites, and apartments.
Enterprise Architecture Forum USFebruary 11-12, San Diego
Enterprise Architecture ForumEMEAMarch 2-3, London
Security Forum EMEAMarch 11-12, London
Infrastructure & Operations ForumEMEAMarch 11-12, London
Infrastructure & Operations Forum US
March 17-18, Dallas
Marketing Forum USApril 22-23, Los Angeles
IT Forum USMay 26-28, Las Vegas
IT Forum EMEAJune 9-11, Lisbon
Customer Experience Forum USJune 2010
Security Forum USSeptember 16-17, 2010
Services & Sourcing Forum USOctober 2010
Business Technology Forum USOctober 2010
Consumer Forum USOctober 2010
Marketing Forum EMEANovember 2010, London
Services & Sourcing ForumEMEANovember 2010, London
For details of accommodation at the Guoman Towers or other hotels in the area, please go to:
www.forrester.com/security2010emea and select the Venue tab
Forrester Events 2010UPCOMING...
Gold Sponsors Silver Sponsor Platinum Sponsors
For a complete list of all upcoming Forrester Forums, including Workshops, please visit www.forrester.com/events.
Be Visible. Create Excitement. Generate New Business.
Sponsor A Forrester Event
Sponsors of the co-located Security Forum EMEA 2010 and Infrastructure & Operations Forum EMEA 2010 are:
For sponsorship information, please contact us at: [email protected] or call the event sponsorship lines on +31 (0)20 305 4351 (4337)
Forrester Blog
Join the conversation on The Forrester Blog For Security & Risk Professionals: http://blogs.forrester.com/srm.
Forum Venue