Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Osterman Research

Below you will find reports with the source of “Osterman Research”

image from What Decision Makers Can Do About Data Protection

What Decision Makers Can Do About Data Protection

Protecting data to ensure appropriate usage and avoid unauthorized or inappropriate usage is a major task for decision makers with responsibility for protecting the integrity of corporate data assets. This report tries to show decision makers how to go about this.

(more available)
Added: September 25, 2020
image from Life Inside The Perimeter: Understanding The Modern CISO

Life Inside The Perimeter: Understanding The Modern CISO

Nominet commissioned Osterman Research to conduct a survey of 408 CISOs overseeing security for organisations with a mean average of 8,942 employees. This comprises 207 companies in the USA and 201 companies in the UK, spread across a range of sectors. The objective was to collect and analyse a large enough dataset to make valid conclusions into the opinions, behaviours and mindset of those making cyber security decisions at large organisations.

(more available)
Added: February 17, 2019
image from The State of AI in Cybersecurity: The Benefits, Limitations and Evolving Questions

The State of AI in Cybersecurity: The Benefits, Limitations and Evolving Questions

Osterman Research conducted an in-depth survey of decision makers and influencers. To qualify for the survey, individuals had to be knowledgeable about the security operations in their organizations and their organizations had to have at least 1,000 employees. A total of 404 surveys were conducted during June and July 2018. This white paper discusses the results of that research and our analysis of the survey data.

(more available)
Added: January 15, 2019
image from A Practical Guide for GDPR Compliance

A Practical Guide for GDPR Compliance

This paper is a simple yet practical guide to understanding and becoming GDPR Compliant.

Added: October 26, 2018
image from IT Security at SMBs: 2017 Benchmarking Survey

IT Security at SMBs: 2017 Benchmarking Survey

This report presents the results of an in-depth primary market research survey of cyber security decision-makers in small to mid-sized businesses in the United States, conducted during August and September 2017. The goal of their research was to understand how SMBs, undertake decision-making in the context of their internet security, how they evaluate security solutions, and their budgetary concerns.

(more available)
Added: October 25, 2018
image from Understanding the Depth of the Global Ransomware Problem

Understanding the Depth of the Global Ransomware Problem

This report presents the results of a survey undertaken in the United States, Canada, Germany and the United Kingdom on ransomware and related issues. The survey was conducted during June 2016 with 165 organizations in the United States, and 125 each in the other nations for a total of 540 surveys completed.

(more available)
Added: October 25, 2018
image from Reporting to the Board: Where CISOs and the Board are Missing the Mark

Reporting to the Board: Where CISOs and the Board are Missing the Mark

This report details how IT reports are not effectively communicating the dangers of cyber threats so that the boards of organizations can make good decisions.

(more available)
Added: October 22, 2018
image from How Boards of Directors Really Feel About Cyber Security Reports

How Boards of Directors Really Feel About Cyber Security Reports

This paper sets out to reveal if IT data reported to boards of directors, enables them to make good decisions.

(more available)
Added: October 21, 2018
image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017.

(more available)
Added: October 18, 2018
image from Internet Of Things Cybersecurity Readiness

Internet Of Things Cybersecurity Readiness

This report provides the results of a unique survey designed to analyze their IoT technologies and the struggles and challenges of providing and preparing for security issues related to thos devices.

(more available)
Added: October 17, 2018
image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
image from The Evolving State Of Network Security

The Evolving State Of Network Security

ProtectWise partnered with Osterman Research to interview more than 400 security analysts in the United States in order to uncover the state of network security today across organizations with 1,000 or more employees. The research looked at the biggest security challenges from the inside out, from staffing priorities to the need for specialized roles.

(more available)
Added: October 16, 2018
image from White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime.

(more available)
Added: October 15, 2018
image from Identifying Critical Gaps in Database Security

Identifying Critical Gaps in Database Security

This white paper provides the results of a survey that looked to understand the weaknesses in the current state of database security.

(more available)
Added: October 13, 2018
image from Best Practices For Protecting Your Data When Employees Leave Your Company

Best Practices For Protecting Your Data When Employees Leave Your Company

When employees leave a company, whether voluntarily or involuntarily, it is quite common for them to take sensitive and confidential data with them. This paper examines this problem in detail and provides solutions for employers to mitigate the risks.

(more available)
Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)