Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Planning

Below you will find reports with the tag of “Planning”

image from Crowdstrike Endpoint Strategies White Paper

Crowdstrike Endpoint Strategies White Paper

This whitepaper tries to outline a new standard of response to endpoint security.

Added: October 12, 2018
image from Enterprises Re-engineer Security in the Age of Digital Transformation

Enterprises Re-engineer Security in the Age of Digital Transformation

In this report, they highlight key findings from a recent survey of more than 200 CIO’s and CISO’s, and outline how executives are actively revising security models to create a culture of cybersecurity and safeguard their organizations in today’s continually changing business environment.

(more available)
Added: October 12, 2018
image from Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

This RAND Perspective suggests that technological develop- ments and social dynamics are working in tandem to shift society into hyperdrive, which can usher in unprecedented security concerns. Despite the potential for increased speed as 2040 nears, the authors assert that this phase of acceleration is neither uniform nor determin- istic. Without knowing the future, we can still have the foresight to prepare for security in an age of increasing speed and find value in having collaborative discussions about the role of speed as a catalyst within future global risk and security.

(more available)
Added: October 12, 2018
image from State Of The Global Technology Economy

State Of The Global Technology Economy

In this report, they examine research on the global growth of technology spend and spending patterns behind the highest performing companies. They also share best practices used by top performers to maximize the business value of their spend.

(more available)
Added: October 12, 2018
image from Turning DDoS From A Cost Center To A Revenue Generator

Turning DDoS From A Cost Center To A Revenue Generator

Based on a survey conducted in 2017, this e-Book offers a unique perspective on the cost effectiveness of DDoS security.

(more available)
Added: October 12, 2018
image from Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

In this report they seek to answer four important questions. How mature is the profession today? Where are we weakest/strongest? Which improvements in maturity are likely to matter most? How do we rate against others in our industry?

(more available)
Added: October 12, 2018
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)