Below you will find reports with the source of “Optiv” 2019 Security Technology Spend Insights Report This paper discusses the top five Cybersecurity Technology Buying Trends. Added: September 18, 2019 What A Hacker Sees: Top 20 CIS Critical Security Controls This paper discusses the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC) come into play, providing organizations with 20 key controls that they can implement to mitigate some of the threats they are facing. (more available) Added: October 23, 2018 The Five Steps To Managing Third Party Risk This white paper tackles the subject of how outsourced labor can cause cybersecurity risk. Added: October 22, 2018 2018 Cyber Threat Intelligence Estimate This report is based on security digital footprint assessments conducted in 2017. It offers predictions for 2018 and analysis of 2017. (more available) Added: October 21, 2018
2019 Security Technology Spend Insights Report This paper discusses the top five Cybersecurity Technology Buying Trends. Added: September 18, 2019
What A Hacker Sees: Top 20 CIS Critical Security Controls This paper discusses the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC) come into play, providing organizations with 20 key controls that they can implement to mitigate some of the threats they are facing. (more available) Added: October 23, 2018
The Five Steps To Managing Third Party Risk This white paper tackles the subject of how outsourced labor can cause cybersecurity risk. Added: October 22, 2018
2018 Cyber Threat Intelligence Estimate This report is based on security digital footprint assessments conducted in 2017. It offers predictions for 2018 and analysis of 2017. (more available) Added: October 21, 2018