Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CISO

Below you will find reports with the tag of “CISO”

image from The State Of Threat Detection Report 2018

The State Of Threat Detection Report 2018

Between April and July 2018, Fidelis conducted a study of 582 security professionals to evaluate the adoption of threat hunting practices and overall security posture strengths and weaknesses.

(more available)
Added: November 21, 2018
image from The Journey To Digital Trust

The Journey To Digital Trust

For 20 years, leaders have turned to PwC’s Global State of Information Security® Survey (GSISS) as a trusted resource to navigate the cyber risk landscape. Over time, that landscape has evolved to be less about “information security” and more about managing digital risk. As cybersecurity, privacy and data ethics become increasingly intertwined, organizations need a central place to turn for authoritative data and actionable advice. That is why we are rebooting GSISS to create Digital Trust Insights. This new platform will explore how to build confidence in the readiness of people, processes and technologies to meet tomorrow’s challenges.

(more available)
Added: November 21, 2018
image from Prevention Is Better Than Cure: Business Security - The Journey Continues

Prevention Is Better Than Cure: Business Security - The Journey Continues

This year’s Risk:Value Report from NTT Security shows that there is still a lot of work to do. It crystallizes in one shocking statistic: one-third of companies would rather pay a hacker’s ransom than invest in information security. Many organizations are still stuck in a reactive mindset when it comes to security.

(more available)
Added: November 21, 2018
image from Build Pervasive Cyber Resilience Now

Build Pervasive Cyber Resilience Now

This report posits that “Companies are racing into the digital future adopting technology enabled operating and business models that drive bottom- and top- line growth. They are not prepared for the new cyber risks that come with the connected, data-driven future enterprise.” Read on to learn about solutions.

(more available)
Added: November 21, 2018
image from 2018 Unisys Security Index Australia Report

2018 Unisys Security Index Australia Report

This report provides insight into the public concern about security issues in Australia in 2018.

Added: November 21, 2018
image from The Forester Wave: Emerging Managed Security Services Providers (MSSPs), Q3 2018

The Forester Wave: Emerging Managed Security Services Providers (MSSPs), Q3 2018

In our 24-criterion evaluation of the emerging managed security services providers (MSSPs) market, we identified the 10 most significant providers, and researched, analyzed, and scored them. This report shows how each provider measures up to help security leaders make the right choice.

(more available)
Added: November 20, 2018
image from The Healthy Approach To Cyber Security

The Healthy Approach To Cyber Security

This report outlines key findings from the 2017 KPMG/Forbes Insights CyberSecurity Survey of 100 senior executives from the healthcare field. [One-hundred senior life sciences executives were surveyed as well.] The findings indicate that companies are elevating cyber security to a strategic imperative but at a pace that lags behind their desire to adopt digital technologies to drive innovation. To illustrate, we take a look at the current and desired states of cyber security in healthcare through the lenses of data sharing, vendor management, and medical device implementation. We conclude with our guidance on where organizations should be focusing their efforts.

(more available)
Added: November 20, 2018
image from Building A Resilient Cybersecurity Culture

Building A Resilient Cybersecurity Culture

This report posits that “A dedicated staff with a clear mission helps retain and engage a cybersecurity workforce.” Read the report to learn more.

(more available)
Added: November 6, 2018
image from Cybersecurity Realities and Priorities for 2018 and Beyond

Cybersecurity Realities and Priorities for 2018 and Beyond

In late 2017 and early 2018, the Enterprise Strategy Group (ESG) completed a research survey of 413 IT and cybersecurity professionals with knowledge of, or responsibility for, the planning, implementation, and/or operations of their organization’s security policies, processes, or technical safeguards. Survey respondents were in the United States, U.K., and Australia and worked at enterprise organizations (i.e., more than 1,000 employees). Respondents represented numerous industry and government segments, with the largest participation coming from financial services (i.e., banking, securities, insurance, 18%), manufacturing (16%), retail/wholesale (13%), health care (12%), and information technology (10%).

(more available)
Added: November 6, 2018
image from 2018 SANS Security Awareness Report

2018 SANS Security Awareness Report

This report analyzes the data submitted by 1,718 security awareness professionals from around the world to identify and benchmark how organizations are managing their human cyber security risk. The analysis includes how factors such as security awareness program maturity, funding, and staffing combine to make successful programs.

(more available)
Added: November 6, 2018
image from Top 15 Chief Information Security Officers 2018

Top 15 Chief Information Security Officers 2018

SecurityScorecard ran an analysis, looking at the security ratings of organizations over a six month period and identified which organizations improved those scores the most; whether overall or within a specific risk area.

(more available)
Added: November 4, 2018
image from Cyber Balance Sheet: 2018 Report

Cyber Balance Sheet: 2018 Report

“In last year’s report, we sought to break down walls of misunderstanding between cybersecurity leaders and corporate directors. We continue chipping away at those walls this year, but expand the scope of our research to include a broader set of stakeholders and topics relevant to our increasingly important goal.”

(more available)
Added: November 4, 2018
image from 2016 Vulnerability Statistics Report

2016 Vulnerability Statistics Report

This document discusses the vulnerabilities discovered by edgescanTM over the past year – 2016. The vulnerabilities discovered are a result of providing “Fullstack” continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises, From Telecoms & Media companies to Software Development, Gaming, Energy and Medical organisations. The statistics are based on the continuous security assessment & management of over 57,000 systems distributed globally.

(more available)
Added: October 26, 2018
image from 2018 State Of Cyber Resilience

2018 State Of Cyber Resilience

Accenture research reveals the five steps that can help business leaders not only close the gap on cyber attackers, but also continue to transform and embed security into the fabric of their organizations within the next two to three years.

(more available)
Added: October 26, 2018
image from Data Loss Prevention 2017

Data Loss Prevention 2017

This report is geared towards the healthcare community and seeks to provide helpful information to guide organizations in their Data Loss Prevention struggles.

(more available)
Added: October 26, 2018
image from Demystifying Vulnerabilitiy Management

Demystifying Vulnerabilitiy Management

This report takes a close look at vulnerability management and seeks to make it a far simpler task.

Added: October 26, 2018
image from Turnaround And Transformation In Cybersecurity 2015

Turnaround And Transformation In Cybersecurity 2015

This paper is based on the findings of a worldwide study.

Added: October 26, 2018
image from 2017 Global Cybersecurity Assurance Report Card

2017 Global Cybersecurity Assurance Report Card

A survey-based report of over 700 individuals. The survey and resulting analysis was perfomed by CyberEdge.

Added: October 25, 2018
image from How To Instrument For Adanced Web Application Penetration Testing

How To Instrument For Adanced Web Application Penetration Testing

This technical white paper describes a new approach to identifying your most critical web application vulnerabilities faster and at lower cost.

(more available)
Added: October 25, 2018
image from Strengthening Digital Society Against Cyber Shocks

Strengthening Digital Society Against Cyber Shocks

This report is based on the key findings from The Global State of Information Security Survey.

Added: October 25, 2018
image from 2015 Breach Preparedness and Response Study

2015 Breach Preparedness and Response Study

In 2013, ISMG and FireEye teamed up to survey security leaders about advanced threats and breach response. Among the findings: Only 20 percent of respondents rated their incident response programs “very effective,” and they were most concerned about their abilities to detect and contain APT/malware quickly and completely.

(more available)
Added: October 24, 2018
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)