Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Planning

Below you will find reports with the tag of “Planning”

image from 2018 Deloitte-NASCIO Cybersecurity Study

2018 Deloitte-NASCIO Cybersecurity Study

From the report, “ONE OF THE most important priorities of a state chief information officer (CIO) is to reduce risk to their state. Cybersecurity and reducing cyber risk, specifically, is top of mind for every state CIO and many factors contribute to this. For example, it is unknown how many cyberattacks have been attempted on state government collectively, but one state estimates that two years ago there were 150 million attacks a day, while today there is an average of 300 million attacks per day. The same state has seen as many as 800 to 900 million in one day. "

(more available)
Added: September 18, 2019
image from Trends for Scaling Innovation in Health Care

Trends for Scaling Innovation in Health Care

This key findings’ report contains a synopsis of trends on how health systems are scaling innovation and a look-ahead at what the innovation perspectives and strategies of today may mean for the health systems tomorrow. It is structured to provide action items for efficient scaling of innovation at health systems followed by supporting findings.

(more available)
Added: July 10, 2019
image from IRDETO Global Connected Industries Cybersecurity Survey: IOT Cyberattacks Are the Norm, The Security Mindset Isn't

IRDETO Global Connected Industries Cybersecurity Survey: IOT Cyberattacks Are the Norm, The Security Mindset Isn't

The Irdeto Global Connected Industries Cybersecurity Survey polled 700 security decision makers across Connected Health, Connected Transport and Connected Manufacturing plus IT and technology* (who manufacture IoT devices) industries about cyberattacks targeting their organization, concerns about the types of attacks that could target their organization, security measures currently in place and much more. The research surveyed both manufacturers and users of IoT devices in five countries – China, Germany, Japan, the UK and the US. The research was fielded online by Vanson Bourne from March – April 2019.

(more available)
Added: July 10, 2019
image from The Role of Cybersecurity In Mergers and Acquisitions Diligence

The Role of Cybersecurity In Mergers and Acquisitions Diligence

This study was designed to examine the growing concern of cyber risks and the importance of cyber assessment during mergers and acquisitions (M&A) and determine how well companies are prepared to deal with cyber risk during M&A from the perspective of IT Decision Makers (ITDMs) and Business Decision Makers (BDMs). Are key decision makers concerned about cyber during an acquisition? What factors are considered as part of the due diligence and evaluation process before, during and after acquisition? Do cyber incidents lead to delays in acquisition? What does cyber risk mean for companies looking to acquire? How can they best protect themselves during this important process to minimize risk and protect their companies? This report explores these questions and others, and provides recommendations for effectively managing cybersecurity risks during an acquisition.

(more available)
Added: July 10, 2019
image from Cloud Data Management Report

Cloud Data Management Report

This report explores how businesses worldwide are approaching data management, the most common challenges with backups and availability, and the lessons leaders can learn from how high-performing businesses are using data as they continue to transform.

(more available)
Added: July 10, 2019
image from The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

This year’s SANS survey saw an increase in usage and interest in CTI, along with a diversification in how the intelligence is being used by organizations. While the use of CTI continues to grow, there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs. This survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.

(more available)
Added: May 18, 2019
image from Leveraging Board Governance For Cybersecurity: The CISO/CIO Perspective

Leveraging Board Governance For Cybersecurity: The CISO/CIO Perspective

This report provides Advanced Cyber Security Center executives weighing in on the Board’s role as a strategic partner to management in balancing digital transformations and cybersecurity risks.

(more available)
Added: May 18, 2019
image from Military and Security Developments Involving the People's Republic of China 2019

Military and Security Developments Involving the People's Republic of China 2019

A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended

Added: May 18, 2019
image from Hiscox Cyber Readiness Report 2019

Hiscox Cyber Readiness Report 2019

This third Hiscox Cyber Readiness Report provides you with an up-to-the-minute picture of the cyber readiness of organisations, as well as a blueprint for best practice in the fight to counter the ever-evolving cyber threat.

(more available)
Added: May 3, 2019
image from Hiscox Cyber Readiness Report 2018

Hiscox Cyber Readiness Report 2018

The Hiscox Cyber Readiness Report is compiled from a survey of more than 4,100 executives, departmental heads, IT managers and other key professionals in the UK, US, Germany, Spain and The Netherlands. Drawn from a representative sample of organisations by size and sector, these are the people on the front line of the business battle against cyber crime. While all are involved to a greater or lesser extent in their organisation’s cyber security effort, 45% make the final decision on how their business should respond. The report not only provides an up-to-the-minute picture of the cyber readiness of organisations large and small, it also offers a blueprint for best practice in the fight to counter an ever-evolving threat.

(more available)
Added: May 3, 2019
image from Security Leadership Study - Trends in Application Security

Security Leadership Study - Trends in Application Security

The evolving threat landscape and perennial cybersecurity challenges are giving rise to community-based programs such as crowdsourced cybersecurity, an important evolution that’s fast becoming a foundational element of any organization’s cybersecurity program. Crowdsourced cybersecurity includes services such as bug bounty programs, vulnerability disclosure, and next-generation penetration testing (NGPT). This report explores several key findings based on research conducted by ESG.

(more available)
Added: April 23, 2019
image from Boosting Organizational Success By Advancing Data Quality

Boosting Organizational Success By Advancing Data Quality

This paper will also explore the root causes of poor data quality and a solution for organizations seeking data quality improvement.

(more available)
Added: April 19, 2019
image from Privileged Access Management In The Modern Threatscape

Privileged Access Management In The Modern Threatscape

Privileged access remains the preferred vector for attackers, and most organizations aren’t taking the very basic steps to secure it

(more available)
Added: April 19, 2019
image from Everything You Always Wanted To Know About Security At The Edge, But Were Afraid To Ask

Everything You Always Wanted To Know About Security At The Edge, But Were Afraid To Ask

Akamai provides a thorough report to educated the industry on the attacks that are growing, evolving, and becoming more sophisticated.

(more available)
Added: April 4, 2019
image from Would You Be Ready For A Cyber Attack?

Would You Be Ready For A Cyber Attack?

Business in the Community is delighted to present this report, which confirms where we all can play a role in better online security and how we – business leaders, think tanks, government – can achieve this. We encourage CEOs and business owners of all sizes to take actions after reading this report. If you are a small business owner, we hope it inspires you to implement the recommendations to be safer online. For larger businesses, we hope you will consider joining our call to action. By working together, we will be a step closer to achieving the National Cyber Security Centre’s vision to help: “make the UK the safest place to live and do business online”.

(more available)
Added: March 26, 2019
image from Threat Report: Medical Devices

Threat Report: Medical Devices

This report takes a specific look back at connected medical device events that occurred in 2017.

Added: March 9, 2019
image from Smart Cities Cyber Security Worries

Smart Cities Cyber Security Worries

This infographic provides insight into the cyber security worries of Smart Cities.

Added: March 9, 2019
image from The Expanding Security Risks and Trends that Are Changing the Insurance Industry

The Expanding Security Risks and Trends that Are Changing the Insurance Industry

This document will examine the cyber risk trends that are of concern to the insurance industry, and introduce the RiskSense solution designed to address these challenges

(more available)
Added: March 7, 2019
image from What Will The Future of GRC Look Like?

What Will The Future of GRC Look Like?

From the Report, “In this new world, GRC has tremendous opportunity to add value. For instance, by pushing for higher standards of corporate governance and integrity, GRC can help a business strengthen its reputation, and inspire trust. By providing a clear picture of the regulatory landscape, GRC can help the business expand into new markets faster. And by providing timely risk intelligence on new digital technologies, GRC can help the business capitalize on upside opportunities. In short, the future of GRC lies in being an enabler of business growth and performance.”

(more available)
Added: March 6, 2019
image from State of Internal Audit 2018 - Impact and Opportunities

State of Internal Audit 2018 - Impact and Opportunities

From the Report, “When you are faced with multiple risks and regulatory requirements, as well as constantly-changing industry trends, how do you connect the dots? How do you bring all this information together in a way that is meaningful to your organization? MetricStream Research offers you a range of cutting-edge GRC research reports, insights, and analyses that empower you to make informed and effective decisions on your GRC Journey®. Through primary and secondary research, we analyze the latest GRC trends and developments, and transform this data into the intelligence you need to drive exceptional performance.”

(more available)
Added: March 6, 2019
image from 2019 Connectivity Benchmark Report

2019 Connectivity Benchmark Report

MuleSoft commissioned independent market research company Vanson Bourne to survey 650 IT leaders from global enterprises to discover: › What is the state of today’s digital transformation initiatives? › How is the role of IT evolving in the customer-centric era? › What are the top challenges IT organizations face? › Which strategies are enterprises adopting to get ahead of the market?

(more available)
Added: March 1, 2019
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)