Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Governance

Below you will find reports with the tag of “Governance”

image from Cyber Value Connection

Cyber Value Connection

This report was created to present The Cyber-Value Connection, which is intended to put cyber security in a context that will resonate with business leaders. The Cyber-Value Connection looks at the reduction in company value that arises from a cyber breach, vividly demonstrating how a sever incident leads to a decline in share price.

(more available)
Added: October 25, 2018
image from IBM Pathways For GDPR Readiness

IBM Pathways For GDPR Readiness

This white paper contains IBM’s suggestions for accelerating the process of becoming compliant with Europe’s GDPR.

Added: October 25, 2018
image from Preparing For The EU General Data Protection Regulation

Preparing For The EU General Data Protection Regulation

This white paper prepares you for GDPR by providing a basic understanding of what is involved with the different sections of the regulations, and how technology can be used to drive the initial discovery which can be used to drive the plan as well as the ongoing process of maintaining compliance.

(more available)
Added: October 25, 2018
image from 2017 AWS Cloud Data Protection Survey

2017 AWS Cloud Data Protection Survey

Druva performed an AWS cloud migration survey in November 2017 to get a clearer picture of how organizations are utilizing the AWS service for secondary storage, data protection, and archiving. This survey was conducted across more than 20 industries by IT professionals within multiple roles across the globe. They’ve highlighted our findings in this report.

(more available)
Added: October 24, 2018
image from CIO Survey 2018: The Transformational CIO

CIO Survey 2018: The Transformational CIO

In last year’s survey, Harvey Nash and KPMG reported how CIOs were holding a steady line in the face of global uncertainty, cutting costs and refining business processes. Whilst much of this geopolitical instability remains, this year’s report shows how CIOs are benefiting from bigger budgets and headcount growth. Indeed, more IT leaders are enjoying budget increases than we have seen in the last thirteen years of reporting.

(more available)
Added: October 24, 2018
image from Revitalizing Privacy And Trust In A Data-Driven World

Revitalizing Privacy And Trust In A Data-Driven World

From the report, “Massive data breaches and the constant collection of personal information routinely spur debate on whether privacy, rooted in ancient times, is dead in teh digiatl age. Are we in a post-privacy world? In many ways, it is the wrong question. Privacy, security and trust-all increasingly at risk-are also more vital and intertwined in our data-driven society.

(more available)
Added: October 24, 2018
image from Risk and Regulatory Outlook 2015

Risk and Regulatory Outlook 2015

In this edition of Risk and Regulatory Outlook a Deloitte subject matter expert outlines the situation, specifies existing or prescient change, and suggests practical steps in each of the nine key areas of regulatory change we focus on.

(more available)
Added: October 24, 2018
image from The Powers Of Identity Governance And Privileged Access Security

The Powers Of Identity Governance And Privileged Access Security

This eBook provides information based on a 2017 survey that reveals the power of identity governance and privileged access security.

(more available)
Added: October 24, 2018
image from Using cyber analytics to help you get on top of cybercrime: Third-generation Security Operations Centers

Using cyber analytics to help you get on top of cybercrime: Third-generation Security Operations Centers

As the threatscape continues to evolve rapidly in both sophistication and scale, the need to protect organizations’ intellectual property, operations, brand and shareholder value, in addition to their customers’ data, is ever more critical. But how do organizations build controls for the security risks they don’t even know about yet?

(more available)
Added: October 24, 2018
image from BDO 2017 Cyber Governance Survey

BDO 2017 Cyber Governance Survey

This survey was created to act as a barometer to measure the involvement of public company directors in cyber-risk management.

(more available)
Added: October 23, 2018
image from Security Operations Centers - Helping You Get Ahead of Cybercrime

Security Operations Centers - Helping You Get Ahead of Cybercrime

This report discusses the necessity of Security Operations Centers, and how they can help with Cyber Events.

Added: October 23, 2018
image from Six Strategies To Strengthen Your Company's Digital DNA

Six Strategies To Strengthen Your Company's Digital DNA

Digital transformation is a journey, not a destination. And every journey has a starting point. What you do next depends on where you begin. Use this self-assessment to find out where your company is today, then use the associated road map report in this playbook to help chart your course forward.

(more available)
Added: October 23, 2018
image from China Country Profile 2017

China Country Profile 2017

This paper gives a profile of China.

Added: October 22, 2018
image from Cloud Adoption and Risk Report 2016 Q4

Cloud Adoption and Risk Report 2016 Q4

In this report, we detail the types of sensitive data stored in cloud services, how that data is shared within organizations and with third parties, and how risky employee behavior can expose data. We also examine the external threats that use the cloud to exfifiltrate sensitive data pilfered from on-premises systems as well as attacks directed at sensitive data stored in cloud services. Finally, we cover general usage trends including the top most widely used cloud services.

(more available)
Added: October 22, 2018
image from Long-term Data Retention Drivers and Trends

Long-term Data Retention Drivers and Trends

There are many reasons to archive data. For too many organizations, “archiving” is immediately presumed to be a cumbersome, unattainable, legacy process that IT had previously deprioritized, while erroneously believing that a “backup copy” held for an extended period of time was a sufficient alternative. Every aspect of that presumption is incorrect—modern archiving is a critical and compelling aspect of nearly every IT organization’s forward-looking strategy.

(more available)
Added: October 22, 2018
image from NFP Governance And Performance Study

NFP Governance And Performance Study

This report analyzes non-profit organizations in Australia and in particular, sought to understand how important cybersecurity issues were to those organizations.

(more available)
Added: October 22, 2018
image from NIST Special Publication 800-171 for higher educatino

NIST Special Publication 800-171 for higher educatino

This is a guide that is especially designed to help colleges and universities comply with new federal regulations.

Added: October 22, 2018
image from Understanding Cyber RIsk Management vs Uncertainty With Confidence

Understanding Cyber RIsk Management vs Uncertainty With Confidence

This white paper provides an analysis of Risk Management and overcoming uncertainty.

Added: October 22, 2018
image from Boards Turn To The Talent Agenda

Boards Turn To The Talent Agenda

This report discusses how the boards of organizations are changing their hiring practices due to the impact of cybersecurity incidents.

(more available)
Added: October 21, 2018
image from Modern Database Architecures Demand Modern Data Security Measures

Modern Database Architecures Demand Modern Data Security Measures

The objective of this report is to provide an understanding into how companies are approaching the challenges of evolving database ecosystems though cloud and big data initiatives. And to understand what steps organizations are taking to ensure greater security and compliance with their databases.

(more available)
Added: October 21, 2018
image from Seven Decision Points When Considering Containers

Seven Decision Points When Considering Containers

The decision to deploy code to containers versus virtual machines or dedicated servers has some unique characteristics. Amalgam Insights has identified seven key decision points that should be considered when choosing to deploy to containers. These seven decision points can act as guideposts that will help point to or from using containers.

(more available)
Added: October 21, 2018
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)