Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Accountability

Below you will find reports with the tag of “Accountability”

image from Global Insurance and Regluatory Bulletin

Global Insurance and Regluatory Bulletin

This paper discusses the global regulations placed on the insurance industry. Of note, it does discuss cyber insurance in the United States.

(more available)
Added: October 18, 2018
image from Vendor Selection & GDPR Compliance

Vendor Selection & GDPR Compliance

This report offers a unique approach to understanding GDPR compliance. The report is a presentation of an interview with two individual CEO’s from two seperate companies.

(more available)
Added: October 18, 2018
image from GDPR: A Europe Based Regulation With A Global Impact

GDPR: A Europe Based Regulation With A Global Impact

This report takes a look at the GDPR, and what it means for the world.

Added: October 17, 2018
image from Six Best Practices For Securing Amazon Web Service

Six Best Practices For Securing Amazon Web Service

This paper offers some solutions to the best practices for securing Amazon Web Services.

Added: October 16, 2018
image from The Evolution And Revolution Of The CISO

The Evolution And Revolution Of The CISO

This report explores both the incremental and transformational skills required for current and future CISO success, examining which fundamental technology and security capabilities matter most and which unexpected skills CISOs will need to acquire to help organizations reshape security to drive business success.

(more available)
Added: October 16, 2018
image from The Moral Component Of Cross Domain Conflict

The Moral Component Of Cross Domain Conflict

This is the final report of a study commissioned by the UK Ministry of Defence (MOD) through the Defence Human Capability Science and Technology Centre (DHCSTC) framework. The study was conducted over a period of six weeks and examines the academic debate pertaining to the moral landscape of conflict that spans different military domains (air, maritime, land, space, cyber). The investigation which is the subject of this report was commissioned by the Programme and Delivery Directorate of the Defence Science and Technology Laboratory (Dstl).

(more available)
Added: October 16, 2018
image from GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 15, 2018
image from The GDPR:Key Themes And Challenges

The GDPR:Key Themes And Challenges

This helpful report provides analysis of the GDPR, some misconceptions, and some helpful tips for becoming compliant.

Added: October 15, 2018
image from Implications Of Using Privileged Access Management To Enable Next Generation Technology

Implications Of Using Privileged Access Management To Enable Next Generation Technology

To better understand how security issues, such as privileged access management (PAM), affect the adoption of next-generation technologies, BeyondTrust – the leader in PAM – commissioned the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology survey. The results are a wake-up call for anyone looking to leverage these next-generation technologies.

(more available)
Added: October 14, 2018
image from Stateless Attribution: Toward International Accountability In Cyberspace

Stateless Attribution: Toward International Accountability In Cyberspace

In this report, they review the state of cyber attribution and they consider alternative mechanisms for producing standardized and transparent attribution that may overcome concerns about credibility. In particular, this exploratory work considers the value of an indepen- dent, global organization whose mission consists of investigating and publicly attributing major cyber attacks.

(more available)
Added: October 14, 2018
image from Cyber Risk Appetite Survey January 2017

Cyber Risk Appetite Survey January 2017

The primary objective of the RSA Cyber Risk Appetite Survey is to understand the behaviors and practices of organizations in regard to cyber risk. More specifically, the report aims to calculate the risk appetites of different respondent organizations. The global research is based on responses from 272 risk and security professionals at organizations.

(more available)
Added: October 13, 2018
image from A Technical Solutions Guide For Privileged Password And Session Management Use Cases

A Technical Solutions Guide For Privileged Password And Session Management Use Cases

Despite the number of data breach stories in the news, many IT organizations fall into the easy trap of using shared accounts for users, administrators, or applications. While this practice means that, when access is needed, everyone can easily pitch in to get the work done, it comes with massive, unjustifiable security and compliance tradeoffs. This paper seeks to provide assistance with these situations.

(more available)
Added: October 12, 2018
image from IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions widespread, trusted identity exchanges using federated methods that are secure, interoperable, privacy-enhancing and easy to use. Realization of that vision will require companies, agencies and individuals to perform at a new level. The Requirements are our first step towards that goal, by describing a set of functions that parties must be able to fulfill, and a set of criteria for assessing those capabilities.

(more available)
Added: October 12, 2018
image from Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

This RAND Perspective suggests that technological develop- ments and social dynamics are working in tandem to shift society into hyperdrive, which can usher in unprecedented security concerns. Despite the potential for increased speed as 2040 nears, the authors assert that this phase of acceleration is neither uniform nor determin- istic. Without knowing the future, we can still have the foresight to prepare for security in an age of increasing speed and find value in having collaborative discussions about the role of speed as a catalyst within future global risk and security.

(more available)
Added: October 12, 2018
image from The Dirty Secrets Of Network Firewalls

The Dirty Secrets Of Network Firewalls

In late 2017, Sophos sponsored an independent research study into the state of network security in mid-sized organizations across the globe. This research program explored the experiences, concerns, and future needs of IT managers, with particular focus on firewalls and network defenses.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 20:08 UTC (build b1d7be4)