Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Loss Event

Below you will find reports with the tag of “Loss Event”

image from AuditBoards 2023 Digital Risk Report

AuditBoards 2023 Digital Risk Report

AuditBoard’s 2023 Digital Risk survey of 130+ risk leaders found, most organizations are struggling to mature their risk management capabilities. . Our survey explored the digital risk management programs and technologies that organizations currently rely upon to better understand their digital risk landscape and digital risk management maturity, integration, and technology adoption.

(more available)
Added: April 17, 2024
image from NetDiligence Cyber Claims Study 2023

NetDiligence Cyber Claims Study 2023

The Professional Services sector includes a broad array of organizations. Although there are no strict criteria for considering a company to be in this sector, there is general agreement that inclusion requires specialized training and experience, and, in many cases, qualification by exam and licensing managed by either national or state authorities. Using our 5-year dataset, we have analyzed 1,500 Professional Services claims dated 2017 through 2021. Professional Services sector incidents account for 20% of all claims in the dataset.

(more available)
Added: April 3, 2024
image from Cybersecurity Risk Report 2024

Cybersecurity Risk Report 2024

The 2024 Cybersecurity Risk Report from the FAIR Institute shows broadly positive trends compared to last year’s survey. At the FAIR Institute, they believe that effective cyber risk management can only be achieved through transparent and defensible risk analysis using a standard such as FAIR and quality cyber risk data.

(more available)
Added: March 12, 2024
image from IRIS Tsunami

IRIS Tsunami

We identified 50 of the largest multi-party cyber incidents over the past several years in an effort to understand their causes and consequences from beginning to end. Tsunami draws from the same rigorous methodology in the rest of the IRIS series. We started with a huge dataset of cyber loss events, identified those that involved multiple organizations, and then researched each event to understand who was behind it, what happened, how the after effects propagated through the supply chain, and the financial losses for all parties involved.

(more available)
Added: January 9, 2023
image from Information Risk Insights Study

Information Risk Insights Study

This study leverages a vast dataset spanning over 77,000 cyber events experienced by 35,000 organizations over the last decade. This dataset is drawn from Advisen’s Cyber Loss Data, which contains over 138,000 cyber events collected from publicly verifiable sources.

(more available)
Added: October 7, 2022
image from Quantifying the financial savings Protective DNS (PDNS) brings to the UK public sector

Quantifying the financial savings Protective DNS (PDNS) brings to the UK public sector

This report provides an analysis of the DNS queries blocked by Protective DNS, finds commonalities among the end users that are protected, and uses a financial model to estimate the value of the threat prevention provided by Protective DNS to the UK economy.

(more available)
Added: May 11, 2022
image from IRIS Risk Retina - Nonprofit

IRIS Risk Retina - Nonprofit

This free public report from the Cyentia IRIS Risk Retina series clears away the fog of FUD, providing parameters for frequency and loss of publicly discoverable cyberevents in the nonprofit sector.

(more available)
Added: March 21, 2022
image from Ripples Across the Risk Surface: 2021

Ripples Across the Risk Surface: 2021

A continued look at “ripple events” - multi-party security events - examining the size and frequency of these events, firmographics, as well as the velocity of spread of such events.

(more available)
Added: September 21, 2021
image from The State of the State of Application Exploits in Security Incidents

The State of the State of Application Exploits in Security Incidents

A meta-analysis of industry reports on the variety and forms of application exploits used in security incidents.

Added: July 22, 2021
image from IRIS 20/20 Xtreme

IRIS 20/20 Xtreme

The IRIS 20/20 Xtreme is a follow-up to the IRIS 20/20 study earlier this year, this time focusing on the 100 largest cyber incidents of the last five years, totaling $18 billion in reported losses and 10 billion compromised records. This report breaks down the costs, categorizes incident types, identifies the actors behind these events and the actions they employed, and improves understanding of how these events impacted the organizations involved.

(more available)
Added: November 10, 2020
image from State of Third-Party Risk Management 2020

State of Third-Party Risk Management 2020

A survey-driven report of over 150 third-party risk practitioners to understand the challenges facing their programs, the actions those professionals are taking to address the challenges, and identify success factors.

(more available)
Added: November 5, 2020
image from Information Risk Insights Study (IRIS) 20/20

Information Risk Insights Study (IRIS) 20/20

Using breach information from Advisen, this report seeks to fill in missing gaps in the loss frequency and impact side of quantitative risk analysis. Using real world reported data on publicly-discoverable breaches, commonly held myths of cost per record estimates are debunked and replacement hard statistics are given to replace incorrect estimates.

(more available)
Added: June 10, 2020
image from Ripples Across the Risk Surface

Ripples Across the Risk Surface

Using breach data from Advisen, this report defines ripple effects of breaches as the impacts on companies more than one degree of separation from the company directly affected by the breach. As vendor relationships are both broad and deep, a breach in any one company in a network can have distant effects on companies not directly related. The implications upon third party risk management are explored.

(more available)
Added: June 10, 2020
image from Cisco 2018 Privacy Maturity Benchmark Study

Cisco 2018 Privacy Maturity Benchmark Study

The Cisco 2018 Privacy Maturity Benchmark Study was created in conjunction with Cisco’s Annual Cybersecurity Benchmark Study, a double-blind survey completed by more than 3600 security professional in 25 countries and across all major industries. The privacy specific questions focused on a subset of nearly 3000 respondents who were familiar with the privacy processes at their organizations. Participants were asked about the makeup of their privacy teams, maturity level of their privacy processes, and the impact (if any) they experienced related to delays in the sales cycle due to customer data privacy concerns. We also analyzed responses to other questions regarding cyber events to understand which organizations had been breached in the last year and the size of any losses from these events.

(more available)
Added: February 12, 2019
image from Incapsula Survey: What DDoS Attacks Really Cost Businesses

Incapsula Survey: What DDoS Attacks Really Cost Businesses

To determine real-world costs posed by DDoS attacks in 2014, Incapsula commissioned a survey to gauge real organizations’ experiences with them. By compiling these statistics, they hoped to provide some perspective. Additionally, they wanted to underscore the importance of investing in a truly impenetrable mitigation solution.

(more available)
Added: October 25, 2018
image from 2015 Global Cyber Impact Report

2015 Global Cyber Impact Report

The purpose of the research, in this report, is to understand how organizations qualify and quantify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident.

(more available)
Added: October 24, 2018
image from Ten Key Questions on Cyber Risk and Cyber Risk Insurance

Ten Key Questions on Cyber Risk and Cyber Risk Insurance

This study claims to be the first systematic discussion of potential risk transfer options for cyber risks. They compare several risk transfer options, including insurance, reinsurance and alternative risk transfer. Moreover, they discuss the potential role of the government and the capacity of insurance pools to improve insurability.

(more available)
Added: October 23, 2018
image from Are Your Employees A Cybersecurity Risk?

Are Your Employees A Cybersecurity Risk?

Today’s threat landscape is rapidly evolving, which means it is simply not enough for organizations to roll out an annual security training program and then pat themselves on the back for a job well done. Companies need to consistently invest in training and keep their employees updated on the latest vulnerabilities.

(more available)
Added: October 18, 2018
© Cyentia Institute 2025
Library updated: June 24, 2025 04:08 UTC (build b1d7be4)