Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Board of Directors

Below you will find reports with the tag of “Board of Directors”

image from Executive Perspectives on Top Risks for 2021 & 2030

Executive Perspectives on Top Risks for 2021 & 2030

This report is based on an annual survey of boards of directors and C-suite executives about risks on the horizon for the upcoming year. (more available)
Added: January 7, 2022
image from Security Outcomes Study Vol. 2

Security Outcomes Study Vol. 2

Over 5,100 IT and security professionals across 27 countries were asked about their organizations’ approaches to updating and integrating security architecture, detecting and responding to threats, and staying resilient when disaster strikes. (more available)
Added: December 7, 2021
image from 2021 Voice of the CISO Report

2021 Voice of the CISO Report

A survey of CISOs across 1,400 organizations supplemented with interviews of 100 individuals.
Added: May 17, 2021
image from The CISO's New Dawn

The CISO's New Dawn

This report looks at the roles and responsibility CISO’s have, highlighting changes over the past 12-18 months.
Added: February 24, 2021
image from Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

This report looks into spear-phishing attacks as the education sector has moved to be remote. It looks at trends in ways they are targeting schools, as well as solutions organizations can use to defend against these attacks. (more available)
Added: October 29, 2020
image from The State of Industrial Cybersecurity in the Era of Digitalization

The State of Industrial Cybersecurity in the Era of Digitalization

An annual survey on the challenges and response to those challenges of cybersecurity in the Industrial Control Systems (ICS) space.
Added: October 27, 2020
image from The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

A survey of over 1,000 US and UK IT professionals on the challenges to having the necessary in-house expertise to achieve a strong cybersecurity posture. (more available)
Added: September 3, 2020
image from Opportunity in Cybersecurity Research Report 2020

Opportunity in Cybersecurity Research Report 2020

This report outlines job opportunity in the cybersecurity industry. It reveals that the workforce needs to grow dramatically to meet the current demand, that there is a skills gap, and more. (more available)
Added: July 31, 2020
image from 2020 Security Effectiveness Report

2020 Security Effectiveness Report

This report focuses on an analysis of security controls effectiveness across the multiple stages of attack lifecycles within 11 global industries. (more available)
Added: July 29, 2020
image from Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey

Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey

A survey of 450 individuals on cybersecurity spending plans, areas of investment, and workforce requirements.
Added: July 22, 2020
image from Cyber Security Breaches Survey 2020

Cyber Security Breaches Survey 2020

Using telephone survey of UK business and thirty in-depth interviews, this report reviews awareness and approaches to cyber security in the UK as well as the nature and impact of breaches by firm size and sector. (more available)
Added: July 22, 2020
image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners. (more available)
Added: June 13, 2020
image from Impact Report 2020

Impact Report 2020

As software proliferates and DevOps takes hold, we conducted this study to understand the impact of utilizing Pentest as a Service (PtaaS) vs. (more available)
Added: May 11, 2020
image from The Global State of Industrial Cybersecurity

The Global State of Industrial Cybersecurity

In this report, we explore the state of OT security from the perspective of IT security practitioners, and provide practical recommendations on how to bridge the IT and OT cybersecurity gap. (more available)
Added: April 5, 2020
image from Consumer Privacy Survey

Consumer Privacy Survey

This is a survey conducted by Cisco, mainly talking about their findings that people care about privacy, and a surprisingly large number have already taken actions to protect it. (more available)
Added: February 9, 2020
image from 2019 Cyber Risk Management Maturity Benchmark Survey Results

2019 Cyber Risk Management Maturity Benchmark Survey Results

The 2019 Survey of 211 participants covers Overall risk security, Risk Management, and also covers what job titles are involved, and what industries are involved. (more available)
Added: February 9, 2020
image from Leveraging Board Governance For Cybersecurity: The CISO/CIO Perspective

Leveraging Board Governance For Cybersecurity: The CISO/CIO Perspective

This report provides Advanced Cyber Security Center executives weighing in on the Board’s role as a strategic partner to management in balancing digital transformations and cybersecurity risks. (more available)
Added: May 18, 2019
image from The Life and Times of Cybersecurity Professionals - 2018

The Life and Times of Cybersecurity Professionals - 2018

“In late 2018 and early 2019, the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) conducted its third annual research product focused on the lives and experiences of cybersecurity professionals. (more available)
Added: May 18, 2019
image from Board Oversight and Cybersecurity: Leveraging Corporate Governance to Manage Cyber Threats

Board Oversight and Cybersecurity: Leveraging Corporate Governance to Manage Cyber Threats

This report offers insight for lawyer’s and details how boards should proactively strive to create companywide cybersecurity protocols to avoid potential litigation. (more available)
Added: May 18, 2019
image from The Cost Of Third-Party Cybersecurity Risk Management

The Cost Of Third-Party Cybersecurity Risk Management

CyberGRX and Ponemon Institute surveyed over 600 IT security professionals to learn more about the cost and efficacy of the tools and processes used to conduct third-party cyber risk management today. (more available)
Added: April 19, 2019
image from 7 Most Unsafe Gaps For Industrial Cyber Security

7 Most Unsafe Gaps For Industrial Cyber Security

Indegy provides a helpful graphic designed to reveal seven critical areas in the area of industrial cyber security.
Added: March 16, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 19, 2022 04:08 UTC (build d6199b1)