Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CISO

Below you will find reports with the tag of “CISO”

image from 7 Facts Every CISO Needs To Know About Open Source Security

7 Facts Every CISO Needs To Know About Open Source Security

This is an infographic that details things every CISO should know about Open Source Security.

Added: October 24, 2018
image from CISO Insights: 7 Best Practices For A Successful Insider Threat Program

CISO Insights: 7 Best Practices For A Successful Insider Threat Program

In this report, 15 CISOs identified some practical steps that may help remedy some of the challenges many of organizations experience when developing and implementing an insider threat program.

(more available)
Added: October 24, 2018
image from Enhancing Services And Protecting Data For State And Local Governments

Enhancing Services And Protecting Data For State And Local Governments

From the report, “The state and local government sectors often find themselves understaffed and underfunded to utilize technology to its fullest potential. Recent data breaches and ransomware attacks in the newspaper highlight that governments of all sizes are indeed being targeted and have fallen victim to hackers. State and local governments must be prepared to stop internal and external threats alike. The mix of legacy equipment and small IT and security staffs relative to private industry can create a pressure- filled situation.”

(more available)
Added: October 24, 2018
image from The Internet Of Things Requires A Security Rethink

The Internet Of Things Requires A Security Rethink

This paper takes a good look at the new era that is being ushered in by the Internet Of Things. It discusses the “perfect storm” that is being created by the issues and innovations ahead.

(more available)
Added: October 24, 2018
image from EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

This report uniquely addresses SecOps initiatives in terms of role, team leadership, success rates, company size, vertical adoptions, and geography. It provides telling insights into technology priorities, process, and best practices and metrics for critical use cases—including integrated security/ compliance for performance and availability management, change and configuration management, and IT asset management and audits. The report also addresses how cloud, agile, digital transformation, and mobile all impact SecOps directions.

(more available)
Added: October 23, 2018
image from Reporting on Risk to the Board

Reporting on Risk to the Board

This is a good report to read if you are interested in learning how to properly, and succesfully, report risks and vulnerabilities to boardmembers and executives.

(more available)
Added: October 23, 2018
image from The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The purpose of this research is to examine trends in the benefits of threat intelligence and the challenges companies face when integrating threat intelligence with existing security platforms and technologies.

(more available)
Added: October 23, 2018
image from 2017 Security Annual Volume 1

2017 Security Annual Volume 1

This paper was written for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams.

(more available)
Added: October 22, 2018
image from 2017 Security Report

2017 Security Report

This report takes a look at the last 20 years of IT development, and the issues and trends that have taken place in 2017.

(more available)
Added: October 22, 2018
image from CISO Tips: Balancing the hero with the storyteller

CISO Tips: Balancing the hero with the storyteller

There’s no clear and direct career path to the role of infosec executive. But, there are skills that can help you advance your career to the management level, such as deep technical knowledge, strong communication skills and having business acumen.

(more available)
Added: October 22, 2018
image from From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

Banking and capital markets firms have several things to be happy about in Accenture Security‘s comprehensive research study. Compared with the findings from last year’s report, the percentage of successful security breaches has decreased. The number of cybersecurity capabilities in banking increased from 15 to 19. Give this report a read.

(more available)
Added: October 22, 2018
image from Getting The Board On Board With Application Security

Getting The Board On Board With Application Security

It is the intention of this paper to provide you the reader with the essential tools and language that you can use to educate your board members on the importance and necessity of Application Security.

(more available)
Added: October 22, 2018
image from Has The Enforcer Become The Enabler?

Has The Enforcer Become The Enabler?

This paper talks about what the next evolution of Data Loss Prevention technology means for business collaboration and productivity.

Added: October 22, 2018
image from How Collaboration Can Optimize Security Operations

How Collaboration Can Optimize Security Operations

The executive summary of this report says, “The secret to advanced threat preparedness may actually lie within your organization — your current people, processes and technologies…Enterprises are coming to the realist that a fragmented or compartmentalized security operations design is ineffective against today’s advanced security threats.”

(more available)
Added: October 22, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration.

(more available)
Added: October 22, 2018
image from Know Your Data To Create Actionable Policy

Know Your Data To Create Actionable Policy

Too often, security and risk (S&R) leaders create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data — from what data they have to where it resides. As a result, many policies are ineffective and can even hinder business processes. In today’s evolving data economy, data identity is the missing link that S&R leaders must define to create actionable policy. This report was designed to help S&R leaders develop effective policies using their Data Security And Control Framework as a guideline.

(more available)
Added: October 22, 2018
image from NIST Special Publication 800-171 for higher educatino

NIST Special Publication 800-171 for higher educatino

This is a guide that is especially designed to help colleges and universities comply with new federal regulations.

Added: October 22, 2018
image from 2017 Security Annual Volume 2 - Luminary Interviews

2017 Security Annual Volume 2 - Luminary Interviews

This paper provides interviews with a variety of well known individuals in the cyber security industry.

Added: October 21, 2018
image from Cyber Balance Sheet 2017 Report

Cyber Balance Sheet 2017 Report

This study prepared by the Cyentia Institute breaks down walls between cybersecurity leaders and Boards of Direc- tors. Data is often said to be the lifeblood of the company; yet, there is immense frustration at how risks to that information are measured, mitigated, and communicated across the enterprise. As the financial, regulatory, and legal stakes of data breaches and disruptions rise, leaders at all levels must come together to protect and further the business.

(more available)
Added: October 21, 2018
image from The Life And Times Of Cybersecurity Professionals

The Life And Times Of Cybersecurity Professionals

This paper examines the life of those in the cybersecurity profession, and seeks to provide answers to the high turnover rate in the field.

(more available)
Added: October 21, 2018
image from 2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

This report provides complete survey reports, expert analysis, and thoughts from leading experts in the field.

Added: October 20, 2018
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)