Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Risk Analysis

Below you will find reports with the tag of “Risk Analysis”

image from The CIO's Guide To Mobile Threat Defense

The CIO's Guide To Mobile Threat Defense

This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense.

Added: October 23, 2018
image from The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

This paper takes a look at the best way to prevent breaches, by detecting and mitigating leaks.

Added: October 23, 2018
image from Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and beyond: Reaping the dividends of cyber resilience is the latest viewpoint in PwC’s Insurance 2020 and beyond series, which explores the megatrends that are reshaping the competitive environment for insurers, reinsurers, brokers and the markets in which they operate.

(more available)
Added: October 22, 2018
image from To The Point: Reporting Cybersecurity and IT Risk to the Board

To The Point: Reporting Cybersecurity and IT Risk to the Board

This report provides helpful insight into why board executives don’t understand Cybersecurity issues. It also adds helpful advice for how to convince the board of the importance of these issues.

(more available)
Added: October 22, 2018
image from Understanding Cyber RIsk Management vs Uncertainty With Confidence

Understanding Cyber RIsk Management vs Uncertainty With Confidence

This white paper provides an analysis of Risk Management and overcoming uncertainty.

Added: October 22, 2018
image from Cyber Balance Sheet 2017 Report

Cyber Balance Sheet 2017 Report

This study prepared by the Cyentia Institute breaks down walls between cybersecurity leaders and Boards of Direc- tors. Data is often said to be the lifeblood of the company; yet, there is immense frustration at how risks to that information are measured, mitigated, and communicated across the enterprise. As the financial, regulatory, and legal stakes of data breaches and disruptions rise, leaders at all levels must come together to protect and further the business.

(more available)
Added: October 21, 2018
image from How To Stop Fraud With The Resources You Have

How To Stop Fraud With The Resources You Have

This is a handy guide to fraud protection management.

Added: October 21, 2018
image from Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users

(more available)
Added: October 21, 2018
image from The Value Of Data

The Value Of Data

This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place.

(more available)
Added: October 21, 2018
image from Tone at the Top and Third Party Risk

Tone at the Top and Third Party Risk

A key takeaway from this research is that accountability for managing third party risk is dispersed throughout the organization. Not having one person or function with ownership of the risk is a serious barrier to achieving an effective third part risk management program.

(more available)
Added: October 21, 2018
image from Bridging The Gap Between Secops Intent And Reality

Bridging The Gap Between Secops Intent And Reality

This report is based on a survey conducted from a variety of groups with regards to Secops and why are there is a gap between what it intends to do and the reality of what it is.

(more available)
Added: October 20, 2018
image from Vulnerability Review

Vulnerability Review

The annual Vulnerability Review analyzes the evolution of software security from a vulnerability perspective. The review presents global data on the prevalence of vulnerabilities and the availability of patches, maps the security threats to IT infrastructures, and also explores vulnerabilities in the 50 most popular applications on private PCs.

(more available)
Added: October 20, 2018
image from 2015 Vulnerability Review

2015 Vulnerability Review

Published in March of 2015, this report reviews the key figures and facts on vulnerabilities from a global information security perspective.

(more available)
Added: October 19, 2018
image from Adjusting the Lens of Economic Crime:Preparation brings opportunity back into focus

Adjusting the Lens of Economic Crime:Preparation brings opportunity back into focus

This year’s report illustrates how economic crime has evolved over the last two years, morphing into different forms depending on industrial sector and region.

(more available)
Added: October 19, 2018
image from Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

The aim of this paper is to establish a database on studies, articles and working papers on cyber risk and cyber risk insurance.Based on this, we provide insurance practitioners and academics a high-level overview of the main research topics and future research directions in the field.

(more available)
Added: October 18, 2018
image from Cyber Incident And Breach Trends Report

Cyber Incident And Breach Trends Report

This report takes a look at the major incidents that took place in 2017.

Added: October 18, 2018
image from Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

This report seeks to identify key components toward a framework to cyber risk modeling and qualifying and quantifying known vulnerabilities in defenses, while providing macro-systemic guidance.

(more available)
Added: October 17, 2018
image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
image from The Road To Compliance:Steps For Securing Data To Comply With The GDPR

The Road To Compliance:Steps For Securing Data To Comply With The GDPR

Here is another helpful eBook to provide insight into the GDPR compliance situation.

Added: October 17, 2018
image from A Clearer View of Emerging Risks: Emerging Risks Report 2015

A Clearer View of Emerging Risks: Emerging Risks Report 2015

In this report, they examine four key areas where risks continue to emerge or, perhaps, more importantly, contain elements where the risks are unknown at this time: a) Cyber, b) Life, health and longevity, c) New Technologies, d)casualty catastrophe reserving.

(more available)
Added: October 16, 2018
image from An Emprical Analysis of Cyber Security Incidents at a Large Organization

An Emprical Analysis of Cyber Security Incidents at a Large Organization

This is a study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 04:08 UTC (build b1d7be4)