Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Fines & judgements

Below you will find reports with the tag of “Fines & judgements”

image from The 2021 Prevalent Third-Party Risk Management Study

The 2021 Prevalent Third-Party Risk Management Study

The goal of the study was to provide a state-of-the-market on third-party risk with actionable recommendations that organizations can take to grow and mature their programs across every stage of the third-party risk lifecycle. (more available)
Added: May 16, 2022
image from Threat Intelligence Executive Report 2020 Vol. 6

Threat Intelligence Executive Report 2020 Vol. 6

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During September and October 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider. (more available)
Added: April 20, 2022
image from 2022 Data Security Incident Response Report

2022 Data Security Incident Response Report

This is the Data Security Incident Response Report which features insight and metrics from the response to more than 1,250 incidents the firm helped client manage in 2020. (more available)
Added: April 11, 2022
image from Trends in Cybersecurity Breaches: March 2021

Trends in Cybersecurity Breaches: March 2021

A survey of recent breaches occurring over the past year as identified and classified via AuditAnalytic’s commercial database of breach information. (more available)
Added: October 13, 2021
image from State of Software Security v11: Open Source Edition

State of Software Security v11: Open Source Edition

Get best practices on managing your open source libraries in our State of Software Security v11: Open Source Edition report. Based on 13 million scans of more than 86,000 repositories, SOSS v11: Open Source Edition gives you a unique perspective on the open source libraries in codebases today, how organizations are managing the security of these libraries, and best practices on using open source code securely. (more available)
Added: June 22, 2021
image from IRIS 20/20 Xtreme

IRIS 20/20 Xtreme

The IRIS 20/20 Xtreme is a follow-up to the IRIS 20/20 study earlier this year, this time focusing on the 100 largest cyber incidents of the last five years, totaling $18 billion in reported losses and 10 billion compromised records. (more available)
Added: November 10, 2020
image from Cybersecurity Skills Gap Threatens Job Effectiveness Amidst Global Talent Shortage

Cybersecurity Skills Gap Threatens Job Effectiveness Amidst Global Talent Shortage

A June 2020 survey to assess the current challenges and perceptions of the oft-mentioned cybersecurity skills gap problem faced by IT and security teams worldwide. (more available)
Added: September 27, 2020
image from Trends in Cybersecurity Breach Disclosures

Trends in Cybersecurity Breach Disclosures

A review of cybersecurity breach trends affecting public companies from 2011 through 2019. Use the breach database compiled and maintained by Audit Analytics. (more available)
Added: June 24, 2020
image from Information Risk Insights Study (IRIS) 20/20

Information Risk Insights Study (IRIS) 20/20

Using breach information from Advisen, this report seeks to fill in missing gaps in the loss frequency and impact side of quantitative risk analysis. (more available)
Added: June 10, 2020
image from Information Security and Cyber Risk Management Report 2019

Information Security and Cyber Risk Management Report 2019

A survey conducted by Advisen covering changes since last years survey, including a more than 70 percent satisfactionrate reported by respondents who havehad a cyber claim which either resulted ineconomic damage or business interruption. (more available)
Added: December 4, 2019
image from Data Breach Litigatio Report

Data Breach Litigatio Report

Bryan Cave Leighton Paisner began its survey of data breach class action litigation six years ago to rectify the information gap and to provide our clients, as well as the broaderlegal, forensic, insurance, and security communities,with reliable and accurate information concerning the risk associated with data breach litigation. (more available)
Added: October 1, 2019
image from The Price Of Data Security

The Price Of Data Security

This paper discusses all of the consequences for GDPR non-compliance.
Added: September 18, 2019
image from Cloud Data Management Report

Cloud Data Management Report

This report explores how businesses worldwide are approaching data management, the most common challenges with backups and availability, and the lessons leaders can learn from how high-performing businesses are using data as they continue to transform. (more available)
Added: July 10, 2019
image from The Ultimate Guide to Incident Management for Higher Education

The Ultimate Guide to Incident Management for Higher Education

This report offers insight for institutions of higher learning seeking to understand that regulations and issues surrounding cybersecurity on campus.
Added: March 7, 2019
image from Industry Report

Industry Report

This paper recognizes the growing evolution of compliance programs, and asks the question how can we use those events as a trigger for growth? (more available)
Added: March 6, 2019
image from 2018 Cyber Breach Insights: Key Drivers Behind Cyber Insurance Claims

2018 Cyber Breach Insights: Key Drivers Behind Cyber Insurance Claims

Law firm Clyde & Co and risk analytics platform Corax have collaborated to bring you a joint white paper identifying the key drivers of frequency and cost for cyber insurance claims. (more available)
Added: February 18, 2019
image from Lloyd's City Risk Index: Executive Summary

Lloyd's City Risk Index: Executive Summary

From the report, “The second Lloyd’s City Risk Index, based on original research by the Centre for Risk Studies at Cambridge University’s Judge Business School, details the risk landscape in the world’s leading 279 cities, responsible for 41% of global economic output in 2018. (more available)
Added: February 13, 2019
image from Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

From the report, “The widespread digitization of financial services is causing large-scale and sweeping transformations across various facets of the business, creating new growth opportunities but also new challenges and inherent risk. (more available)
Added: February 13, 2019
image from Bashe Attack: Global Infection By Contagious Malware

Bashe Attack: Global Infection By Contagious Malware

This report explores how a ransomware attack might take place and what the impacts would be on governments, businesses, and the insurance sector. (more available)
Added: February 13, 2019
image from Consumer Trust, Consent and Knowledge in the Age of Digital Identity

Consumer Trust, Consent and Knowledge in the Age of Digital Identity

From the report, “The survey results show that companies should ensure their online interactions with customers are aligned around three key principles: trust, consent, and education. (more available)
Added: November 24, 2018
image from 2018 Cyber Claims Study

2018 Cyber Claims Study

The eighth edition of the NetDiligence® Cyber Claims Study offers insights for business innovation. In the same way that a business gains operational perspective by going through an audit, both the insurer and the insured can use the findings of this research to inform decision making and risk management. (more available)
Added: November 23, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 28, 2022 08:08 UTC (build d6199b1)