Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CISO

Below you will find reports with the tag of “CISO”

image from Global Cybersecurity Outlook 2023

Global Cybersecurity Outlook 2023

The World Economic Forum’s Global Cybersecurity Outlook 2023, in collaboration with Accenture, examines the cybersecurity trends that will impact our economies and societies in the year to come.

(more available)
Added: January 30, 2023
image from Global Cybersecurity Outlook 2022

Global Cybersecurity Outlook 2022

The Global Cybersecurity Outlook flagship report identifies the trends and analyzes the near-term future cybersecurity challenges. The accelerated shift to remote working during the COVID-19 pandemic coupled the recent high-profile cyberattacks have resulted in bringing cybersecurity top of mind among key decision-makers in organizations and nations.

(more available)
Added: January 19, 2023
image from The State of Supply Chain Defense

The State of Supply Chain Defense

In this years report, we’ll focus attention on how organizations are moving past problem identification and mitigating cyber risk challenges within supply chain vendors. We’ll also explore the challenges identified by this year’s respondents in establishing internal and third-party sourced functions and technologies for supply chain risk mitigation.

(more available)
Added: December 27, 2022
image from Intelligence-Powered Security Operations

Intelligence-Powered Security Operations

In Intelligence-Powered Security Operations, risk and threat intelligence is combined with human expertise and machine power to deliver better outcomes to the business as a while. Ultimately, intelligence-powered security operations programs will deliver smarter security and better results.

(more available)
Added: December 22, 2022
image from Cyber Insurance Research Report

Cyber Insurance Research Report

Our hope is the results of the survey report and our expert analysis helps you prepare for obtaining and renewing cyber insurance, with coverage and rates that accurately reflect your risk profile.

(more available)
Added: December 9, 2022
image from Cyber Security Forecast 2023

Cyber Security Forecast 2023

Threats evolve, attackers constantly change their tactics, techniques and procedures, and defenders must adapt and stay relentless if they want to keep ip. This forecast aims to help they cyber security industry frame its fight against cyber adversaries in 2023.

(more available)
Added: November 2, 2022
image from 2022 Ransomware & Malware Report

2022 Ransomware & Malware Report

Malware and ransomware continue to wreak havoc as some of the most destructive security threats affecting organization of all sizes, from SMBs to large enterprise and government agencies. This report is to reveal the latest malware security trends, challenges, and investment priorities.

(more available)
Added: October 18, 2022
image from Women in Cybersecurity: Spanning the Career Life Cycle

Women in Cybersecurity: Spanning the Career Life Cycle

For our survey, we targeted successful women working in varied roles in the cybersecurity community, and we queried them about everything from breaking into the field and gaining career momentum to choosing a specialty and finding ways to remain relevant. In this report, we provide lessons learned and advice on how a women in cybersecurity or a woman wanting to enter this field can lay a foundation to ensure success.

(more available)
Added: September 20, 2022
image from Women in Cybersecurity

Women in Cybersecurity

The new look at the workforce revealed that the percentage of women in cybersecurity is roughly 24%. While men continue to outnumber women in cybersecurity and pay disparity still exists, women in the field are buoyed by higher levels of education, and are finding their way to leadership positions in higher numbers.

(more available)
Added: September 6, 2022
image from EY Global Information Security Survey 2021

EY Global Information Security Survey 2021

The EY Global Information Security Survey 2021 (GISS)finds Chief information Security Officers (CISOs) and security leaders battling against a new wave of threats unleashed by COVID-19. Our report illustrates the devastating and disproportionate impact that the crisis has had on a function that is striving too position itself as an enabler of growth and a strategic partner to the business. It also outlines what cybersecurity leaders need to know now about their current operating environment and what they need to do to transform it.

(more available)
Added: September 6, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. They’re also implementing the appropriate security controls to ensure secure access to applications. In this report, we’ll look at how companies are currently securing remote work and what makes a solid and secure remote access strategy.

(more available)
Added: June 15, 2022
image from The Cisos Report

The Cisos Report

This study offers the kind of insights CISOs have long been asking for - to benchmark their situation and experience against others; to learn from what their peers are doing and planning to do ; and to validate ideas and obtain solid data to justify investments in these areas.

(more available)
Added: June 2, 2022
image from 2022 Voice of the CISO Report

2022 Voice of the CISO Report

This report explores how CISOs are adjusting in the wake of pandemic disruption, adapting strategies to support long-term hybrid work and battling an increasingly sophisticated threat landscape. We also examine how people put organizations at risk and how CISOc change priorities in response.

(more available)
Added: May 18, 2022
image from 2020 Mobile App Threat Landscape Report

2020 Mobile App Threat Landscape Report

This report will give a snapshot of 2020’s mobile threat landscape and dive into emerging trends we anticipate carrying into 2021.

(more available)
Added: April 13, 2022
image from Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report

Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report

Through a comparison of 1,000 enterprise organizations surveyed worldwide and real-world cloud use, this report uncovers the rise of Cloud-Native Breaches, disconnect between security practitioners and their leadership, and the state of multicloud adoption. Recommendations are given to defend against the new wave of Cloud-Native Breaches unique to Infrastructure-as-a-Service (IaaS) environments.

(more available)
Added: February 15, 2022
image from The Power of Purple Teaming

The Power of Purple Teaming

PlexTrac sponsored research with CyberRisk Alliance to better understand how cybersecurity teams are using emerging strategies like adversary emulation and purple teaming to combat growing ransomware threats. This report details the findings of a survey of 315 IT and cybersecurity decision-makers and influencers.

(more available)
Added: February 9, 2022
image from Cyber Security in Focus 2022

Cyber Security in Focus 2022

An annual state of the market report, which explores the views of a snapshot cohort of 55 security leaders on key themes, including; the skills shortage, barriers to strategy execution, the business perception of cyber security, and more.

(more available)
Added: January 20, 2022
image from The state of cybersecurity resilience 2021

The state of cybersecurity resilience 2021

More than 4,700 executives were surveyed in March and April of 2021 in order to understand the extent to which organizations prioritize security, how comprehensive their security plans are, and how their security investments are performing.

(more available)
Added: January 7, 2022
image from Security Outcomes Study Vol. 2

Security Outcomes Study Vol. 2

Over 5,100 IT and security professionals across 27 countries were asked about their organizations’ approaches to updating and integrating security architecture, detecting and responding to threats, and staying resilient when disaster strikes. They shared a wide range of insights, struggles, strategies, and successes. Responses were analyzed in multiple ways and key findings were extracted.

(more available)
Added: December 7, 2021
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

Drawing on Duo’s customer basis of millions of devices and the authentication traffic associated with them between June 2020 and May 2021, this report reviews trends in authentication methods and includes firmographic breakdowns.

(more available)
Added: October 17, 2021
image from State of Cybersecurity Automation Adoption

State of Cybersecurity Automation Adoption

A survey of 250 UK cybersecurity professionals on their perspectives of the state, benefits, and challenges in security process automation.

(more available)
Added: October 5, 2021
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 20:08 UTC (build b1d7be4)