Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Risk Analysis

Below you will find reports with the tag of “Risk Analysis”

image from The 2024 Crypto Maturity Jouney

The 2024 Crypto Maturity Jouney

The Crypto Maturity Journey outlines considerations for cryptocurrency product rollout, enabling FIs to evaluate market opportunities while simultaneously addressing regulatory and compliance requirements. Over the last few years, cryptocurrency has become a mainstream asset class, with institutional investments as one factor in boosting adoption around the world. Institutions such as BlackRock, Fidelity, and Grayscale have launched Bitcoin and Ethereum ETPs, providing a more accessible avenue for retail and institutional investors to gain exposure to these digital assets.

(more available)
Added: February 18, 2025
image from 2025 Global Digital Trust Insights Report

2025 Global Digital Trust Insights Report

PwC’s 2025 Global Digital Trust Insights revealed significant gaps companies must bridge before achieving cyber resilience. With the attack surface continuing to expand through advances in AI, connected devices and cloud technologies and the regulatory environment in constant flux, achieving cyber resilience at an enterprise level is critical. By addressing these gaps and making cybersecurity a business priority, executives can bridge to a more secure future.

(more available)
Added: January 16, 2025
image from Cyber Readiness Report 2024

Cyber Readiness Report 2024

This year’s edition of the Cyber Readiness Report explores the critical role of robust cyber resilience in mitigating evolving organisational risks and safeguarding reputations. This year’s research reveals that concerns of reputational damage, caused by the loss of sensitive information, is a driving force behind responses to ransomware attacks. Over the past 12 months, the top three reasons organisations paid ransom were: to protect their customer data, to protect their reputation, and to recover their data because they did not have any back-ups.

(more available)
Added: October 30, 2024
image from 2024 Data Privacy Trends

2024 Data Privacy Trends

DataGrail’s 2024 Data Privacy Trends Report shows how these factors are playing out on the ground and provides a benchmark for businesses to see how they are tracking. Businesses are receiving more privacy requests, also known as Data Subject Requests (DSRs) every year; we saw a 246% increase in requests from 2021 to 2023.

(more available)
Added: September 25, 2024
image from Cyber Claims Study 2024 Report

Cyber Claims Study 2024 Report

This report is based on the summary statistical analysis of over 10,000 cyber claims for incidents that occurred during the five-year period 2019–2023. We see enormous variances in the magnitude of loss data. The smallest claims were less than $1,000; the largest were over $500M. The numbers of records exposed ranged from 1 to over 140M.

(more available)
Added: September 20, 2024
image from Zscaler ThreatLabz 2024 Ransomware Report

Zscaler ThreatLabz 2024 Ransomware Report

ThreatLabz found that ransomware attacks increased by 17.8% year-overyear based on blocked attempts in the Zscaler cloud, while ransomware attacks identified through data leak site analysis surged by 57.8%. The findings presented in this report underscore the need for organizations to prioritize protection against the relentless tide of ransomware. The insights and strategies in the report serve as a crucial guide for improving your ransomware defenses.

(more available)
Added: September 9, 2024
image from Inadequacies in Breach Insurance Coverage: 
 A Data-Driven Gap Analysis

Inadequacies in Breach Insurance Coverage: 
 A Data-Driven Gap Analysis

This report delves into the depths of cyber risk management, unearthing the critical coverage gaps that threaten organizational stability in the wake of cyberattacks. In an era where digital threats loom larger than ever, businesses are increasingly turning to cyber insurance as a safeguard against the financial ravages of data breaches. Yet CYE’s study leveraging external and internal datasets reveals a stark reality: the protection afforded by such insurance may fall significantly short of the actual costs incurred during cyber incidents.

(more available)
Added: May 28, 2024
image from AuditBoards 2023 Digital Risk Report

AuditBoards 2023 Digital Risk Report

AuditBoard’s 2023 Digital Risk survey of 130+ risk leaders found, most organizations are struggling to mature their risk management capabilities. . Our survey explored the digital risk management programs and technologies that organizations currently rely upon to better understand their digital risk landscape and digital risk management maturity, integration, and technology adoption.

(more available)
Added: April 17, 2024
image from The State of Third-Party Risk Management

The State of Third-Party Risk Management

This new study makes it clear that enterprise demands have certainly continued to grow since then. Organizations place greater strategic priority on TPRM to contribute to a widening scope of enterprise risk that extends beyond cybersecurity. It’s also clear from these results that supply chains are expanding as is the need to efficiently assess risk across those business relationships. Respondents tell us they’re increasingly relying on automated assessments and risk ratings to meet that demand.

(more available)
Added: April 3, 2024
image from 2024 IT Risk and Compliance Benchmark Report

2024 IT Risk and Compliance Benchmark Report

Our survey results revealed that more companies than ever are viewing GRC as a holistic process and taking steps toward getting a complete view of their risk environment and regulatory obligations. Centralizing strategy, unifying risk and compliance data, and revamping the approach to cybersecurity are becoming more popular strategic objectives among respondents, especially with the rise of AI technology dismantling barriers and fostering collaboration among various GRC functions. This means the criteria for which GRC technology is being evaluated against in the purchase cycle is rapidly expanding.

(more available)
Added: March 14, 2024
image from Cybersecurity Risk Report 2024

Cybersecurity Risk Report 2024

The 2024 Cybersecurity Risk Report from the FAIR Institute shows broadly positive trends compared to last year’s survey. At the FAIR Institute, they believe that effective cyber risk management can only be achieved through transparent and defensible risk analysis using a standard such as FAIR and quality cyber risk data.

(more available)
Added: March 12, 2024
image from 2024 Open Source Security and Risk Analysis Report

2024 Open Source Security and Risk Analysis Report

This report uses data from the Synopsys Black Duck Audit Services team’s analysis of anonymized findings from 1,067 commercial codebases across 17 industries during 2023. The Audit Services team has helped security, development, and legal teams around the world strengthen their security and license compliance programs for over 20 years. The team audits thousands of codebases for our customers each year, with the primary aim of identifying software risks during merger and acquisition (M&A) transactions.

(more available)
Added: March 5, 2024
image from Q4 2023: Global Insurance Market Review

Q4 2023: Global Insurance Market Review

Over the course of the year, insurers responded to these and other dynamics of the risk and insurance environment by implementing their own resiliency measures, some of which impacted insurance market conditions. They undertook various measures, including refocusing their appetite, adjusting their underwriting policies, shifting their pricing models, streamlining their organizations, and aligning with business partners who share their values.

(more available)
Added: February 8, 2024
image from State of Third-Party Risk Management 2024 Whitepaper

State of Third-Party Risk Management 2024 Whitepaper

While third-party risk management is a well-established practice, it’s also continuously evolving. Organizations of all sizes and industries must continually adapt and change to effectively identify, assess, manage, and monitor third-party risks. By analyzing the third-party risk management landscape and practices captured in our survey, organizations can see where they stand compared to their peers and consider that information as they prepare and implement changes this year and beyond.

(more available)
Added: February 3, 2024
image from State of Cybersecurity 2024

State of Cybersecurity 2024

CompTIA’s 2024 State of Cybersecurity report explores the many variables that must be considered in balancing the cybersecurity equation. As cybersecurity becomes a critical business imperative, every process must be scrutinized for potential vulnerabilities. This practice of risk analysis then drives decisions around workflow, skill-building and technology implementation. With technology trends evolving and attack patterns changing, true equilibrium is impossible to achieve. The balancing act is a full-time job.

(more available)
Added: January 12, 2024
image from Executive Perspectives on Top Risks

Executive Perspectives on Top Risks

The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organization’s business model and strategy on very short notice. This report contains results from our 11th annual worldwide risk survey of directors and executives to obtain their views on the extent to which a broad collection of risks is likely to affect their organizations over the next year - 2023. We analyze variances across different sizes and types of organizations, industry and respondent position, in addition to variations among organizations based in different geographic regions.

(more available)
Added: December 19, 2023
image from Vulnerability and threat trends report 2023

Vulnerability and threat trends report 2023

Our findings in this year’s Skybox Vulnerability and Threat Trends Report, detailed below, make the urgency of the situation abundantly clear. Vulnerabilities have skyrocketed, eclipsing all previous records. Attacks are increasing in velocity and impact. Threat actors are targeting more sensitive assets and inflicting more damage. They are better organized—backed increasingly by large crime rings and nation-states—and are employing more sophisticated tools and tactics, such as a growing assortment of backdoor malware and advanced persistent threat (APT) attacks.

(more available)
Added: November 14, 2023
image from PASTA: Process for Attack Simulation & Threat Analysis

PASTA: Process for Attack Simulation & Threat Analysis

Process for Attack Simulation and Threat Analysis (PASTA) is a threat modeling methodology, co-developed by VerSprite’s CEO Tony UcedaVelez. It provides a process for simulating attacks to applications, analyzing cyberthreats that originate them, and mitigating cybercrime risks that these attacks and threats pose to organizations. The process is employed by security professionals across industries to prioritize risks and develop a mature cybersecurity framework that is woven into the business culture and the application development process.

(more available)
Added: October 3, 2023
image from Good Practices For Supply Chain Cybersecurity

Good Practices For Supply Chain Cybersecurity

The report provides an overview of the current supply chain cybersecurity practices followed by essential and important entities in the EU, based on the results of a 2022 ENISA study which focused on investments of cybersecurity budgets among organizations in the EU. The report also gathers good practices on supply chain cybersecurity derived from European and international standards. It focuses primarily on the supply chains of ICT or OT.

(more available)
Added: July 5, 2023
image from A Data-Driven Approach to Risk-Based Vulnerability Management With ThreatQ

A Data-Driven Approach to Risk-Based Vulnerability Management With ThreatQ

This paper seeks to introduce some of the new knowledge sources and actionable data, along with a data-driven approach that puts custom cyber intelligence at the center of the process seeking to deliver the tools to help the organization stay as close to the front of the race as possible.

(more available)
Added: June 13, 2023
image from Balancing Third-Party Risk

Balancing Third-Party Risk

This report is different in that we’re focusing on explicit relationships that are manually configured by organizations using RiskRecon’s platform. In other words, we’re examining curated portfolios of vendors and suppliers tracked as part of organizations’ third-party risk management program. We started with a dataset extracted from RiskRecon’s platform consisting of over 100,000 primary organizations and more than 300,000 monitored third-party relationships. We’re focusing on direct relationships in this report, but the data supports the analysis of indirect (fourth- to nth-party) relationships.

(more available)
Added: May 23, 2023
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 08:08 UTC (build b1d7be4)