Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CISO

Below you will find reports with the tag of “CISO”

image from 2017 State of Security Operations

2017 State of Security Operations

In this fourth annual State of Security Operations report, Hewlett Packard Enterprise provides updates to the current and emerging capabilities, best practices, and performance levels of security operations as learned from the assessment of organizations around the globe.

(more available)
Added: October 20, 2018
image from An Integrated Vision To Manage Cyber Risk

An Integrated Vision To Manage Cyber Risk

This report lays out a new strategy for addressing cybersecurity issues.

Added: October 20, 2018
image from Data Risk in the Third-Party Ecosystem

Data Risk in the Third-Party Ecosystem

This paper was written to understand understand how organizations qualify and quantify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident.

(more available)
Added: October 20, 2018
image from Fail To Plan, Plan To Fail

Fail To Plan, Plan To Fail

This paper is the result of a Forrester survey that sought to understand the roles of LoB practitioners and SOCs in securing IoT environments.

(more available)
Added: October 20, 2018
image from The State of CyberSecurity: Professional Careers

The State of CyberSecurity: Professional Careers

The data presented here illustrates an escalating and dangerous game of cyber security “cat and mouse.” Cyber- adversaries continue to develop creative tactics, techniques, and procedures (TTPs) for attacks. Recognizing the risk, large and small organizations are prioritizing and investing in cyber security defenses and oversight.

(more available)
Added: October 20, 2018
image from Website Security Statistic Report

Website Security Statistic Report

From the report, “Rather than provide a lengthy analysis of the data in this Stats Report in this introduction, we’ve decided instead to provide some “what this means to you” commentary at the end of the three main sections of the report; commentary that attempts to make the data relevant to Executives, Security practitioners and DevOps professionals. Security is a concern that spans multiple teams in an organization – from the board and C-suite, to IT and development teams, to the security team and beyond – and the data in this report will mean different things to these different audiences.”

(more available)
Added: October 20, 2018
image from Best Practices:Mitigating Insider Threats

Best Practices:Mitigating Insider Threats

From the report, “Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. it’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data in order to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. this report describes how to build an insider threat program.”

(more available)
Added: October 19, 2018
image from Mobile Leak Report 2017

Mobile Leak Report 2017

This report calls itself “The Panama Papers” of mobile leak reporting.

Added: October 19, 2018
image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from Strengthen Your Defenses Against Cybercrime

Strengthen Your Defenses Against Cybercrime

This ebook provides insight based on a survey that sought to understand the state of email cybersecurity.

Added: October 19, 2018
image from The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed organizations in Germany about their approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 19, 2018
image from The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018

As we approach critical mass of hacker-powered security, read on to learn more about best practices of starting and running effective disclosure and bug bounty programs, and get to know some of the stories and stats about the hackers themselves.

(more available)
Added: October 19, 2018
image from 2015 Security 500 Sector Reports

2015 Security 500 Sector Reports

This is a series of infographics detailing data regarding a variety of cybersecurity issues.

Added: October 18, 2018
image from 2015 State of Cybersecurity Leadership Report

2015 State of Cybersecurity Leadership Report

This paper was developed to help CISOs, CIOs, executive teams and boards of directors learn what they need to know to work together to address the challenges posed by cyber threats in the context of overall risk to the business.

(more available)
Added: October 18, 2018
image from Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

The aim of this paper is to establish a database on studies, articles and working papers on cyber risk and cyber risk insurance.Based on this, we provide insurance practitioners and academics a high-level overview of the main research topics and future research directions in the field.

(more available)
Added: October 18, 2018
image from CISOs Investigate:Endpoint Security

CISOs Investigate:Endpoint Security

The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven risk and technology decisions.

(more available)
Added: October 18, 2018
image from CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

What do business leaders make of security? How do they perceive its practice and importance? Where are the gaps between business and security leaders? Part two of the CyberArk Global Advanced Threat Landscape Report 2018 explores these issues via responses from individuals including IT security decision-makers and line of business owners, from organizations ranging in size from 500 employees to 5,000 or more workers.

(more available)
Added: October 18, 2018
image from National Security Leadership Recommendations: Cybersecurity Imperative

National Security Leadership Recommendations: Cybersecurity Imperative

From the report, “When it comes to the increasing cybersecurity risk faced by commercial companies, leaders in government, private enterprise and academia express varying opinions. However, a common thread is a shared sense that leaders feel overwhelmed by the growing threats and see a lack of focus and commitment to basic — but often difficult — principles across their operations. Many people, including those at organizations’ highest levels, assume cybersecurity has become a problem we cannot fix. But we can.”

(more available)
Added: October 18, 2018
image from The Cyber Resilient Organization: Learning to Thrive against Threats

The Cyber Resilient Organization: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed 623 IT and IT security practitioners about their organizations’ approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 18, 2018
image from 2017 Security Awareness Report

2017 Security Awareness Report

During the research for this report, two key findings were discovered that uncovered why awareness programs thrive or fail.

Added: October 17, 2018
image from CISO Tips: Speaking the language of business

CISO Tips: Speaking the language of business

What’s not open to discussion is that the role of information security executives has evolved. CISOs may now find themselves talking to investors about how an attack impacted quarterly earnings in addition to more traditional duties like managing a SOC.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)