Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Governance

Below you will find reports with the tag of “Governance”

image from Farewell To Audit Season

Farewell To Audit Season

This report discusses the new reality that audits and compliance are no longer a seasonal issue. It lays out some good steps for daily audits for the sake of compliance.

(more available)
Added: October 16, 2018
image from Risk and Responsibility in a Hyperconnected World

Risk and Responsibility in a Hyperconnected World

From the report, “Risk and Responsibility in a Hyperconnected World, a joint effort between the World Economic Forum and McKinsey & Company, assesses the necessary action areas, and examines the impact of cyberattacks and response readiness. The report sets these against three alternative scenarios in which economic value from technological innovations is realized or lost depending on models of cyber resilience. It draws on knowledge and opinions derived from a series of interviews, workshops and dialogues with global executives and thought leaders to estimate the potential value to be created through 2020 by technological innovations. It examines the value that could be put at risk if the adoption of such innovations is delayed because more frequent, intense cyberattacks are not met with more robust cyber resilience. Finally, the report draws conclusions from the analysis and research, and offers a 14-point roadmap for collaboration.”

(more available)
Added: October 16, 2018
image from The Evolving State Of Network Security

The Evolving State Of Network Security

ProtectWise partnered with Osterman Research to interview more than 400 security analysts in the United States in order to uncover the state of network security today across organizations with 1,000 or more employees. The research looked at the biggest security challenges from the inside out, from staffing priorities to the need for specialized roles.

(more available)
Added: October 16, 2018
image from 2018 GDPR Compliance Report

2018 GDPR Compliance Report

This research uncovers the perspectives of organizations on the impact of the new regulation, how prepared they are, and how they plan to be in compliance with the new law to avoid significant penalties.

(more available)
Added: October 15, 2018
image from 3 Reasons Your IAM Is Leaking Revenue

3 Reasons Your IAM Is Leaking Revenue

Because Identity Management has different use cases depending on whether you’re using it for consumers, other busi- nesses or your own employees, this paper will outline how adopting an optimized identity management system can help realize revenue.

(more available)
Added: October 15, 2018
image from Leadership Compass: Cloud Access Security Brokers

Leadership Compass: Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

(more available)
Added: October 15, 2018
image from Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

In this paper, they explore the underlying challenges with regard to Cyber Risk management and analyze the nature of increasingly stringent regulatory demands. Putting these pieces together, they frame five strategic moves which they believe will enable business needs, their fiduciary responsibilities with regard to Cyber Risk, and regulatory requirements.

(more available)
Added: October 14, 2018
image from Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

This blog post discusses the point that organizations need to assess cybersecurity as a business enabler, rather than a hindrance.

(more available)
Added: October 14, 2018
image from Stateless Attribution: Toward International Accountability In Cyberspace

Stateless Attribution: Toward International Accountability In Cyberspace

In this report, they review the state of cyber attribution and they consider alternative mechanisms for producing standardized and transparent attribution that may overcome concerns about credibility. In particular, this exploratory work considers the value of an indepen- dent, global organization whose mission consists of investigating and publicly attributing major cyber attacks.

(more available)
Added: October 14, 2018
image from Choosing A Mobile App Integration Solution

Choosing A Mobile App Integration Solution

This paper seeks to aid the reader with choosing a mobile app integration solution.

Added: October 13, 2018
image from Going After The Weak Link: Security In Mergers & Acquisitions

Going After The Weak Link: Security In Mergers & Acquisitions

This report discusses the security issues involved in mergers and acquisitions of other organizations.

Added: October 13, 2018
image from Identifying Critical Gaps in Database Security

Identifying Critical Gaps in Database Security

This white paper provides the results of a survey that looked to understand the weaknesses in the current state of database security.

(more available)
Added: October 13, 2018
image from Machine Learning: Fraud Is Now A Competitive Issue

Machine Learning: Fraud Is Now A Competitive Issue

This paper takes a unique look at the competing issues of using machine learning techniques to fight fraud at financial institutions.

(more available)
Added: October 13, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report July 2016

SecureWorks Threat Intelligence Executive Monthly Report July 2016

This report from July 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 13, 2018
image from The Enterprise Lacks A Big Data Strategy For IoT Transformation

The Enterprise Lacks A Big Data Strategy For IoT Transformation

From the report, “Internet of Things (IoT) technology holds incredible promise for transforming the enterprise, but one of the biggest hurdles for companies implementing IoT will be extracting insight from the incredible volumes of fast-moving data these systems produce and integrating that resulting intelligence into business processes in real time.”

(more available)
Added: October 13, 2018
image from Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

This RAND Perspective suggests that technological develop- ments and social dynamics are working in tandem to shift society into hyperdrive, which can usher in unprecedented security concerns. Despite the potential for increased speed as 2040 nears, the authors assert that this phase of acceleration is neither uniform nor determin- istic. Without knowing the future, we can still have the foresight to prepare for security in an age of increasing speed and find value in having collaborative discussions about the role of speed as a catalyst within future global risk and security.

(more available)
Added: October 12, 2018
image from The CISO Ascends From Technologist To Strategic Business Enabler

The CISO Ascends From Technologist To Strategic Business Enabler

This first report in a multipart series, which appraises various cybersecurity occupations using natural language processing (NLP), examines the role of the CISO from the vantage point of employer job ads and CISO resumes . Findings show that the role and prominence of the chief information security officer (CISO) continue to expand and transform . CISOs are no longer seen as technologists tasked to manage their organizations’ security risks . Much more than security tacticians, CISOs are seen as business strategists who reach across organizational boundaries to build business-level relationships and orchestrate business strategies that enable digital transformation and govern compliance-related issues. Key takeaways of the analysis are broken into two sections: 1) hard and soft skills, and 2) education and career demographics .

(more available)
Added: October 12, 2018
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)