Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Board of Directors

Below you will find reports with the tag of “Board of Directors”

image from Cybersecurity In Financial Services

Cybersecurity In Financial Services

This Paper provides a breakdown of New York’s 23 NYCRR500 Financial Security requirements.

Added: October 16, 2018
image from The Evolution And Revolution Of The CISO

The Evolution And Revolution Of The CISO

This report explores both the incremental and transformational skills required for current and future CISO success, examining which fundamental technology and security capabilities matter most and which unexpected skills CISOs will need to acquire to help organizations reshape security to drive business success.

(more available)
Added: October 16, 2018
image from UK 2015 Cyber Risk Survey Report

UK 2015 Cyber Risk Survey Report

This is an in-depth study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. The benchmarking data in this report was collected from risk professionals and CFOs from large and medium-sized corporations from across the UK. It is the hope that the aggregated information will provide useful benchmarking data and reference points against which the reader can compare their own company’s positions.

(more available)
Added: October 16, 2018
image from By the Numbers: Global Cyber Risk Perception Survey February 2018

By the Numbers: Global Cyber Risk Perception Survey February 2018

This is a unqiue report in that two leaders in two seperate industries collaborated out of the mutual concern regarding the state of cybersecurity in the global economy and the knowledge that cyber risk cannot be compartmentalized by industry, company,size, or simliar measures.

(more available)
Added: October 15, 2018
image from General Data Protection Regulation: The Mobile Implications

General Data Protection Regulation: The Mobile Implications

This paper is designed to help businesses manage their mobile data risks in relation to GDPR, which will affect almost every global organisation.

(more available)
Added: October 15, 2018
image from 2017 IT Security Privacy Survey

2017 IT Security Privacy Survey

When tackling cyber risk, board involvement and effective communication continue to drive performance. Learn more in this report on the key findings from Protiviti’s 2017 Security and Privacy Survey.

(more available)
Added: October 14, 2018
image from Cyber Risk Appetite Survey January 2017

Cyber Risk Appetite Survey January 2017

The primary objective of the RSA Cyber Risk Appetite Survey is to understand the behaviors and practices of organizations in regard to cyber risk. More specifically, the report aims to calculate the risk appetites of different respondent organizations. The global research is based on responses from 272 risk and security professionals at organizations.

(more available)
Added: October 13, 2018
image from Cyber Vulnerability Index report

Cyber Vulnerability Index report

The report focuses on how insurance can help make UK companies more resilient to the cyber threat, and is the result of co-operation between representatives of the UK Government and the insurance industry, led by the Cabinet Office and Marsh.

(more available)
Added: October 13, 2018
image from Using Security Metrics to Drive Action

Using Security Metrics to Drive Action

An Annual Showcase of Data Breaches.

Added: October 13, 2018
image from 2016 Global Cyersecurity Assurance Report Card

2016 Global Cyersecurity Assurance Report Card

“The objective of this inaugural Tenable Network Security research study is to measure how enterprise IT security professionals view their organization’s ability to assess cybersecurity risks and to mitigate threats that can exploit those risks. In doing so, Tenable has developed the industry’s first Global Cybersecurity Assurance Report Card, which assigns indices and grades to responding organizations globally, by country, and by industry based on the responses of the security practitioners themselves.”

(more available)
Added: October 12, 2018
image from 2017 Cyber Survey Report 2017

2017 Cyber Survey Report 2017

This survey report discusses the point that no company is completely safe from a catastrophic cyberattack. It tries to help ask the questions, “How concerned is your company?” and “What are you doing to prepare?”

(more available)
Added: October 12, 2018
image from 2018 Vulnerability Statistcs Report

2018 Vulnerability Statistcs Report

This Report provides key takeaways from the vulnerability issues of 2017.

Added: October 12, 2018
image from GDPR Friend Or Foe

GDPR Friend Or Foe

This white paper the explore the GDPR. The consequences of non-compliance, and how an organization can use the GDPR to re-examine and upgrade their security posture.

(more available)
Added: October 12, 2018
image from State of Mac Security 2016:Enterprise Mac Security

State of Mac Security 2016:Enterprise Mac Security

The State of Mac Security Report takes a pulse check of Mac enterprise adoption, examines the reasons behind their increased popularity and crucially, how to overcome the security risks they pose.

(more available)
Added: October 12, 2018
image from The CISO Ascends From Technologist To Strategic Business Enabler

The CISO Ascends From Technologist To Strategic Business Enabler

This first report in a multipart series, which appraises various cybersecurity occupations using natural language processing (NLP), examines the role of the CISO from the vantage point of employer job ads and CISO resumes . Findings show that the role and prominence of the chief information security officer (CISO) continue to expand and transform . CISOs are no longer seen as technologists tasked to manage their organizations’ security risks . Much more than security tacticians, CISOs are seen as business strategists who reach across organizational boundaries to build business-level relationships and orchestrate business strategies that enable digital transformation and govern compliance-related issues. Key takeaways of the analysis are broken into two sections: 1) hard and soft skills, and 2) education and career demographics .

(more available)
Added: October 12, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)