Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Accountability

Below you will find reports with the tag of “Accountability”

image from Combating False Declines Through Customer Engagement

Combating False Declines Through Customer Engagement

Based on quantitative consumer research, the report looks at the likelihood that false declines at the point of sale (POS) will prompt consumers to leave their financial institution (FI). The report also looks at technologies that can reduce false declines as well as consumers’ propensity to proactively engage with these technologies.

(more available)
Added: October 26, 2018
image from Data Privacy: How Boards Can Safeguard Digital Assets Today For Success Tomorrow

Data Privacy: How Boards Can Safeguard Digital Assets Today For Success Tomorrow

In this Cyber Security series, Amrop collaborates with some of the industry’s most innovative companies as they trailblaze through the digital landscape. This first insight piece is co-authored with Jason du Preez, CEO of Privitar, a leader in the development and adoption of privacy engineering technology.

(more available)
Added: October 26, 2018
image from Functional Model Representation of the Identity Ecosystem

Functional Model Representation of the Identity Ecosystem

The Identity Ecosystem Functional Model deliverable was developed by the IDESG Security Committee to provide context to discussions of identity ecosystems and a consistent model upon which to center descriptions of identity solutions. This is not a model of the IDESG as an organization but a representation of online identity interactions and the various components needed to execute those interactions.

(more available)
Added: October 26, 2018
image from Security Sector Reform In Ukraine

Security Sector Reform In Ukraine

This report provides a series of recommendations for the reform of Ukraine’s security and defense institutions. It covers a wide range of topics including cyber warfare. This research was under- taken in response to a request by the presidential administration of Ukraine and in participation with the National Security and Defense Council and sponsored by Ukraine Investment Alliance, a 501(c)(4) foundation. Research for this report was completed in the fall of 2015. Although some minor updates have been made, the analysis predomi- nantly reflects the situation as of that time.

(more available)
Added: October 26, 2018
image from The 2018 Global Cloud Data Security Study

The 2018 Global Cloud Data Security Study

This year’s study reveals the increasing risk of noncompliance with new global privacy and data protection regulations. Another important trend over the past three years is IT security’s continuing loss of control over cloud security practices and budget.

(more available)
Added: October 26, 2018
image from The Key Things Your Whole Business Needs To Know To Be GDPR Ready

The Key Things Your Whole Business Needs To Know To Be GDPR Ready

This paper asks 5 key questions that should help your organization know what to do with their data and GDPR compliance.

(more available)
Added: October 26, 2018
image from Addressing The Australian Signals Directorate Essential Eight

Addressing The Australian Signals Directorate Essential Eight

In 2017, the Australian Signals Directorate (ASD) updated its list of mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. In this new version, the directorate extended its core policies known as the Top 4 to encompass eight essential mitigation strategies. This paper seeks to provide assistance with privileged access security under these new guidelines.

(more available)
Added: October 25, 2018
image from Strengthening Digital Society Against Cyber Shocks

Strengthening Digital Society Against Cyber Shocks

This report is based on the key findings from The Global State of Information Security Survey.

Added: October 25, 2018
image from A Framework For Exploring Cybersecurity Policy Options

A Framework For Exploring Cybersecurity Policy Options

The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other.

(more available)
Added: October 23, 2018
image from GDPR Advisory #1: Protecting The Pathways To Personal Information

GDPR Advisory #1: Protecting The Pathways To Personal Information

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 23, 2018
image from Security Operations Centers - Helping You Get Ahead of Cybercrime

Security Operations Centers - Helping You Get Ahead of Cybercrime

This report discusses the necessity of Security Operations Centers, and how they can help with Cyber Events.

Added: October 23, 2018
image from From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

Banking and capital markets firms have several things to be happy about in Accenture Security‘s comprehensive research study. Compared with the findings from last year’s report, the percentage of successful security breaches has decreased. The number of cybersecurity capabilities in banking increased from 15 to 19. Give this report a read.

(more available)
Added: October 22, 2018
image from NFP Governance And Performance Study

NFP Governance And Performance Study

This report analyzes non-profit organizations in Australia and in particular, sought to understand how important cybersecurity issues were to those organizations.

(more available)
Added: October 22, 2018
image from Tone at the Top and Third Party Risk

Tone at the Top and Third Party Risk

A key takeaway from this research is that accountability for managing third party risk is dispersed throughout the organization. Not having one person or function with ownership of the risk is a serious barrier to achieving an effective third part risk management program.

(more available)
Added: October 21, 2018
image from 21st CEO Survey: The Anxious Optimist In The Corner Office

21st CEO Survey: The Anxious Optimist In The Corner Office

This survey report offers insights into the thoughts and experiences of CEO’s including what threats keep them up at night.

(more available)
Added: October 20, 2018
image from 360 Degrees Cyber Risk Survey

360 Degrees Cyber Risk Survey

The 360° Cyber Risk Survey Report provides rich benchmarked data, informed analysis, and actionable best practices to help middle-market organizations, senior leaders, and boards of directors obtain a better understanding of the operational and financial impacts of cyber risks. In today’s ever-changing cyber threat landscape, knowing how your organization stacks up against others is key in the fight to stay ahead of the next threat.

(more available)
Added: October 20, 2018
image from ISP DDoS Protection May Not Cover All Bases

ISP DDoS Protection May Not Cover All Bases

This short article gives a 10 reasons why an ISP’s DDoS Protection may not be able to actually protect an organization.

(more available)
Added: October 20, 2018
image from Lack Of Visibility Drives Public Cloud Security Risk

Lack Of Visibility Drives Public Cloud Security Risk

Ixia recently commissioned Dimensional Research to conduct a survey of cloud users to understand their top concerns about managing cloud operations. This report provides details about their findings.

(more available)
Added: October 20, 2018
image from Privacy by Design & GDPR

Privacy by Design & GDPR

This paper provides a clearly articulated look at the GDPR.

Added: October 20, 2018
image from The Path To Rapid GDPR Compliance

The Path To Rapid GDPR Compliance

This white paper looks at some insights into the journey of reaching compliance with the GDPR and its May 2018 deadline. It seeks to share best practice guidelines for all businesses that have clients in Europe.

(more available)
Added: October 20, 2018
image from GDPR Compliancy: A Global Change Is On Its Way

GDPR Compliancy: A Global Change Is On Its Way

In this short article, they provide a quick ability to understand the GDPR and how it will impact the world.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 24, 2025 20:08 UTC (build b1d7be4)