Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Accountability

Below you will find reports with the tag of “Accountability”

image from 2022 US Cybersecurity Census Report

2022 US Cybersecurity Census Report

This report, Keeper’s second annual U.S. Cybersecurity Census, maps the transforming landscape of cybersecurity based on these expert insights. It provides leaders with a forensic assessment of the threats their businesses face, and details the urgent strategies necessary to overcome them. (more available)
Added: September 29, 2022
image from The CISO's New Dawn

The CISO's New Dawn

This report looks at the roles and responsibility CISO’s have, highlighting changes over the past 12-18 months.
Added: February 24, 2021
image from Internet Risk Surface in the Financial Sector

Internet Risk Surface in the Financial Sector

A deep dive into the nature of the finance sector’s public risk surface. Reviewing subsectors of the finance ecosystem, including supply chains. (more available)
Added: December 9, 2020
image from State of Third-Party Risk Management 2020

State of Third-Party Risk Management 2020

A survey-driven report of over 150 third-party risk practitioners to understand the challenges facing their programs, the actions those professionals are taking to address the challenges, and identify success factors. (more available)
Added: November 5, 2020
image from Cybersecurity Skills Gap Threatens Job Effectiveness Amidst Global Talent Shortage

Cybersecurity Skills Gap Threatens Job Effectiveness Amidst Global Talent Shortage

A June 2020 survey to assess the current challenges and perceptions of the oft-mentioned cybersecurity skills gap problem faced by IT and security teams worldwide. (more available)
Added: September 27, 2020
image from The CISO Current Report

The CISO Current Report

This document institutes the third edition of the CISO Current report and contains data gathered from direct interviews surveying almost 40 cybersecurity executives at leading enterprises. (more available)
Added: May 8, 2020
image from Cisco Data Privacy Benchmark Study 2020

Cisco Data Privacy Benchmark Study 2020

Using survey data from 2,500 security professionals who indicated they have some measure of privacy responsibilities, this report provides analysis on the ROI for privacy efforts, maturity of privacy programs, vendor selection, and other topics. (more available)
Added: February 17, 2020
image from Exploring Coordinated Disclosure: Shedding Light on Perceptions and Experience in How Software Vulnerabilities are Reported

Exploring Coordinated Disclosure: Shedding Light on Perceptions and Experience in How Software Vulnerabilities are Reported

Veracode commissioned this survey from 451 Research to understand how widely accepted andpracticed coordinated disclosure – whereby a security researcher identifies a flaw and notifiesthe company, then the two work together to fix and publicly disclose the flaw – really is andwhere the pain points reside. (more available)
Added: February 12, 2020
image from Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

This report from Pew Research Center goes over how and where the average person’s personal information is used online. It goes over the lack of control most people feel, who collects your data, the lack of understanding people have over who uses their data, and how people think about the privacy and vulnerability of their personal data. (more available)
Added: February 12, 2020
image from Consumer Privacy Survey

Consumer Privacy Survey

This is a survey conducted by Cisco, mainly talking about their findings that people care about privacy, and a surprisingly large number have already taken actions to protect it. (more available)
Added: February 9, 2020
image from Privileged Access Threat Report 2019

Privileged Access Threat Report 2019

In this fourth edition of BeyondTrust’s annual Privileged Access Threat Report, we’ll be exploring the 2019 threat landscape in detail, with a focus on how security decision makers are utilizing Privileged Access Management (PAM) solutions to mitigate these risks. (more available)
Added: February 6, 2020
image from 2019 Endpoint Security Trends Report

2019 Endpoint Security Trends Report

This report outlines the findings from extensive primary research analyzing more than six million enterprise devices over a one year period. (more available)
Added: July 10, 2019
image from The PSD2 Tracker: March 2019

The PSD2 Tracker: March 2019

This monthly report offers insight into PDS2 regulations and devleopments.
Added: May 18, 2019
image from What Will The Future of GRC Look Like?

What Will The Future of GRC Look Like?

From the Report, “In this new world, GRC has tremendous opportunity to add value. For instance, by pushing for higher standards of corporate governance and integrity, GRC can help a business strengthen its reputation, and inspire trust. (more available)
Added: March 6, 2019
image from The State Of Cybersecurity At Financial Institutions

The State Of Cybersecurity At Financial Institutions

The survey upon which this report is based was fielded by the Financial Services Information Sharing and Analysis Center, in conjunction with Deloitte’s Cyber Risk Services practice. (more available)
Added: February 7, 2019
image from Will EU Regulation Aid Cyber Criminals?

Will EU Regulation Aid Cyber Criminals?

From the report, “During the last few months, global corporations have been extremely busy with implementing the needed changes in order to be compliant with the upcoming GDPR regulation. (more available)
Added: January 31, 2019
image from The 5 Foundational DevOps Practices: How To Establish And Build On Them

The 5 Foundational DevOps Practices: How To Establish And Build On Them

From the report, “The Puppet 2018 State of DevOps Report took a new tack this year, seeking prescriptive guidance for teams to follow. (more available)
Added: January 24, 2019
image from DevSecOps Community Survey 2017

DevSecOps Community Survey 2017

This report offers insight into the DevSecOps Community.
Added: January 15, 2019
image from The Impact Of Cloud On ERP

The Impact Of Cloud On ERP

The “Impact of Cloud on ERP” survey report was designed to assess the impact of ERP solutions on organizations and better understand cloud preparation and data migration needs to implement ERP solutions in the cloud. (more available)
Added: January 15, 2019
image from A House Divided: The Cost of Dysfunction Between Network & Cybersecurity Teams

A House Divided: The Cost of Dysfunction Between Network & Cybersecurity Teams

From the Report, “A new study by IDG shows 86% of organizations have suffered repercussions, including increased security breaches and data loss, due to lack of collaboration between Network & Cybersecurity teams. (more available)
Added: January 15, 2019
image from Outsmarting the Smart: Entering The Age of Threat Hunting

Outsmarting the Smart: Entering The Age of Threat Hunting

This report provides insight into threat hunting and the challenge of returning the balance of power for security from the attackers to the defenders. (more available)
Added: January 1, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)