Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CISO

Below you will find reports with the tag of “CISO”

image from The CISO Report

The CISO Report

Business leaders’ bottom-line concerns often conflict with CISOs’ insistence on vital cybersecurity investments. The CISO-board relationship is deepening as they have more opportunities to engage on matters of cybersecurity and enterprise risk. CISOs’ regular presence in the boardroom and their counsel on enterprise risk will strengthen board confidence and alignment.

(more available)
Added: April 25, 2025
image from 2024 Cybersecurity Year In Review

2024 Cybersecurity Year In Review

Security services remained the top category for M&A activity across consulting and MSSP, followed by sectors including Risk & Compliance and SecOps / IR / Threat Intel. While companies have prioritized email security solutions for decades, analysts expect the email security market to grow significantly in the coming years. Advanced threats relating to phishing and social engineering necessitate strong email security to protect employee and company data from threat actors.

(more available)
Added: February 1, 2025
image from 2025 Cybersecurity Forecast

2025 Cybersecurity Forecast

In this report, they we anticipate malicious actors will continue their rapid adoption of AI-based tools to augment and assist their online operations across various phases of the attack lifecycle. We expect to see cyber espionage and cyber crime actors continue to leverage deepfakes for identity theft, fraud, and bypassing know-your-customer (KYC) security requirements. As AI capabilities become more widely available throughout 2025, enterprises will increasingly struggle to defend themselves against these more frequent and effective compromises.

(more available)
Added: January 23, 2025
image from State of AI Cyber Security 2024

State of AI Cyber Security 2024

In this report our threat researchers have observed significant growth in the breadth, scope, and complexity of threats that organizations are confronting. While it is difficult to be certain exactly how much of this activity is directly attributable to the generative AI boom, we expected to see security leaders expressing concerns about a rise in AI-powered cyber threats.

(more available)
Added: January 23, 2025
image from Global Cybersecurity Outlook 2025

Global Cybersecurity Outlook 2025

The Global Cybersecurity Outlook 2025 report includes a deeper analysis of the most important drivers of complexity and provides valuable insights into the most pressing cyber challenges in the year ahead and their potential implications for executives. Of large organizations, 54% identified supply chain challenges as the biggest barrier to achieving cyber resilience.

(more available)
Added: January 16, 2025
image from 2025 Global Digital Trust Insights Report

2025 Global Digital Trust Insights Report

PwC’s 2025 Global Digital Trust Insights revealed significant gaps companies must bridge before achieving cyber resilience. With the attack surface continuing to expand through advances in AI, connected devices and cloud technologies and the regulatory environment in constant flux, achieving cyber resilience at an enterprise level is critical. By addressing these gaps and making cybersecurity a business priority, executives can bridge to a more secure future.

(more available)
Added: January 16, 2025
image from The State of ASPM 2025

The State of ASPM 2025

This year’s findings provide a deeper look into the critical challenges and opportunities shaping application security as organizations grapple with growing attack surfaces, tool sprawl, and the rapid adoption of generative AI.

(more available)
Added: December 19, 2024
image from 2024 Data Threat Report

2024 Data Threat Report

The 2024 Data Threat Report (DTR) analyzes how core security practices have changed in response to or in anticipation of changing threats. This report also offers perspectives on what organizations can do to leverage data assets to expand opportunities to make their businesses more agile and build trust with their customers. It analyzes global trends in threats to data and the underlying controls, regulations, risks and emerging technologies that need to be addressed.

(more available)
Added: December 19, 2024
image from Inside the Mind of a Hacker

Inside the Mind of a Hacker

This report seized the opportunity to do something different; it now focuses on highlighting what’s next for the hacking community. From neurodiversity in the hacking community to the rise of hacking influencer platforms, we’ve examined a broad spectrum of important topics. Now, most security professionals not only understand the difference between threat actors and hackers, but they actually have personal experience with ethical hacking.

(more available)
Added: October 24, 2024
image from Light Upon Cyber Insurance

Light Upon Cyber Insurance

The 3rd edition of the Lucy Study builds on a four-year history of objective comprehensive and robust data. The study lacks precision on the segment of small and micro companies. The number of insured companies - and there analyzed - is not yet sufficient in relation to the number of companies listed by INSEE.

(more available)
Added: October 15, 2024
image from State of the CISO 2023-2024 Report

State of the CISO 2023-2024 Report

This report presents the main findings with respect to the current state of CISOs. This duality became evident during our recent discussions with about 100 prominent CISOs from across the U.S. and Canada. The new SEC cyber rules and landmark cases that the agency brought against CISOs point to new legal and liability exposure.

(more available)
Added: September 13, 2024
image from 2024 Security Budget Report

2024 Security Budget Report

IANS and Artico Search conducted their fifth annual CISO Compensation and Budget Research Study. Our analysis of the key drivers behind security budget growth reveals significant increases are often triggered by incidents or breaches, or by rising risks such as those associated with AI adoption.

(more available)
Added: September 13, 2024
image from SANS 2024 Security Awareness Report

SANS 2024 Security Awareness Report

In this report, the term security awareness program is used to describe a structured effort to engage, train, and secure your workforce and build a strong security culture. However, many organizations refer to such efforts using different terms, including security behavior and culture, security engagement and influence, security training and education, security communications, or human risk management.

(more available)
Added: August 2, 2024
image from 2024 State of AI Cyber Security

2024 State of AI Cyber Security

Our research was conducted to understand how the adoption of new AI is affecting the threats stakeholders face, how they are responding, and AI’s role in prevention, threat detection, incident response, and recovery workflows. AI’s effects on the threat landscape are already being felt. A majority of survey participants (74%) report their organizations are seeing significant impacts from AI-powered cyber threats. An even greater majority (89%) believe that AI-powered threats will continue to trouble their organizations well into the future.

(more available)
Added: July 26, 2024
image from Hacker-Powered Security Report: Industry Insights '21

Hacker-Powered Security Report: Industry Insights '21

HackerOne’s Hacker-Powered Security Report: Industry Insights leverages data from real-world vulnerability reports to provide insight into the fastest-growing vulnerability categories, how bounty prices are changing year over year, and which industries are fastest to fix. The most innovative CISOs stay ahead of cybersecurity threats and mitigate vulnerabilities by augmenting internal teams and security testing tools with a skilled and engaged hacking community.

(more available)
Added: May 22, 2024
image from 2024 Data Threat Report

2024 Data Threat Report

The 2024 Data Threat Report (DTR) analyzes how core security practices have changed in response to or in anticipation of changing threats. This report also offers perspectives on what organizations can do to leverage data assets to expand opportunities to make their businesses more agile and build trust with their customers. This report also considers both securing the use of GenAI and using GenAI to better secure the enterprise. Differing priorities from different functional leaders and external stakeholders will require security and risk management leaders to build stronger relationships.

(more available)
Added: April 16, 2024
image from The 2023 State of Security Leadership

The 2023 State of Security Leadership

This research demonstrates the continual progression of a cybersecurity conundrum that has become an unfortunate but permanent part of the digital environment. Progress is being made, but new fronts open up and new challenges emerge in a seemingly endless cycle. As the need for security rises to a board level concern, cyber leaders are facing more strategic issues to defend against, even while ongoing threats persist. As those security leaders stand to meet the threats, it behooves organizational leaders to provide the support and resources necessary to help enable those they must count on to keep their enterprises safe.

(more available)
Added: April 8, 2024
image from The Future of Application Security 2024

The Future of Application Security 2024

The third annual Future of Application Security survey reveals how key stakeholders are responding to this challenge. We surveyed 1504 developers, CISOs, and AppSec managers from a broad range of industries across the US, Europe, and Asia-Pacific regions. The responsibility has shifted away from dedicated security teams and is now shared between AppSec managers and developers.

(more available)
Added: March 5, 2024
image from 2023 Cybersecurity Year In Review

2023 Cybersecurity Year In Review

Built on passion and expertise, Altitude Cyber delivers strategic advisory services specifically tailored for founders, investors, startups, and their boards. Our unique approach fuses strategic insight with financial acumen to help your company soar to new heights.

(more available)
Added: March 4, 2024
image from Global Cybersecurity Outlook 2024

Global Cybersecurity Outlook 2024

The 2024 Global Cybersecurity Outlook (GCO) finds that organizations that maintain minimum viable cyber resilience – that is, a healthy middle grouping of organizations – are disappearing. Organizations reporting such a minimum viable cyber resilience are down 31% since 2022.

(more available)
Added: January 12, 2024
image from Cyber attack readiness report 2023

Cyber attack readiness report 2023

To help businesses measure cyber attack readiness, we analyzed performance data from the 982 corporate security teams and 5,117 professionals who participated in our global CTF competition. HTB Business CTF: The Great Escape featured over 30 hacking challenges based on the live threat landscape covering areas such as forensics, blockchain, cloud, and more.

(more available)
Added: December 19, 2023
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 16:09 UTC (build b1d7be4)