Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Risk Analysis

Below you will find reports with the tag of “Risk Analysis”

image from Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

This paper seeks to show that data relating to the profiles of organizations and individuals subject to targeted attacks is amenable to study using epidemiological techniques. They design case-control studies to calculate odds ratios reflecting the degree of association between the identified risk factors and the receipt of targeted attack.

(more available)
Added: October 16, 2018
image from Cybersecurity In Financial Services

Cybersecurity In Financial Services

This Paper provides a breakdown of New York’s 23 NYCRR500 Financial Security requirements.

Added: October 16, 2018
image from Farewell To Audit Season

Farewell To Audit Season

This report discusses the new reality that audits and compliance are no longer a seasonal issue. It lays out some good steps for daily audits for the sake of compliance.

(more available)
Added: October 16, 2018
image from By the Numbers: Global Cyber Risk Perception Survey February 2018

By the Numbers: Global Cyber Risk Perception Survey February 2018

This is a unqiue report in that two leaders in two seperate industries collaborated out of the mutual concern regarding the state of cybersecurity in the global economy and the knowledge that cyber risk cannot be compartmentalized by industry, company,size, or simliar measures.

(more available)
Added: October 15, 2018
image from Cybersecurity Poverty Index

Cybersecurity Poverty Index

The second annual RSA Cybersecurity Poverty Index is the result of an annual maturity self-assessment completed by 878 individuals across 24 industries. The assessment was created using the NIST Cybersecurity Framework (CSF) as the measuring stick to provide global insight into how organizations rate their overall cybersecurity maturity and practices. This report presents what was learned.

(more available)
Added: October 15, 2018
image from Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

This project comprised two main research and development phases. The first phase of the project entailed a requirements analysis and architecture-design effort. For further details on this phase, please refer to the first study report. The second phase of the project entailed the development of a proof-of-concept toolbox. This report presents the proof-of-concept toolbox.

(more available)
Added: October 15, 2018
image from A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

This paper discusses how the GDPR will affect you as a non-European company and provides insights into what you should do to prepare.

(more available)
Added: October 14, 2018
image from Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

This whitepaper discusses the disconnects that have emerged between cybersecurity threats and organizations’ contermeasures.

Added: October 14, 2018
image from The Mobile Device: The Center Of The Fraud Prevention Universe

The Mobile Device: The Center Of The Fraud Prevention Universe

From The Report, “A vision is emerging that balances effective fraud prevention with a delightful customer experience…The mobile device sits at the center of this vision. Properly secured, the mobile device can not only facilitate safer transactions within its own channel but can also be used to better secure other channels with minimal customer friction. This white paper will delve deeper into this vision and the roadmap for forward-thinking fraud executives."

(more available)
Added: October 14, 2018
image from Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

In this report, the authors outline an approach for edge-to-edge security for companies to consider as they build their digital transformation roadmaps. Strengthening a company’s security posture in a world of SDI requires rethinking both the human and the infrastructure elements, leaving behind the idea of network-centric security and moving toward data-centric security.

(more available)
Added: October 13, 2018
image from Data Centric Approach To Endpoint Secuirty

Data Centric Approach To Endpoint Secuirty

This paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the reange of considerations and concrete next steps in the decision-making process.

(more available)
Added: October 13, 2018
image from Going After The Weak Link: Security In Mergers & Acquisitions

Going After The Weak Link: Security In Mergers & Acquisitions

This report discusses the security issues involved in mergers and acquisitions of other organizations.

Added: October 13, 2018
image from Machine Learning: Fraud Is Now A Competitive Issue

Machine Learning: Fraud Is Now A Competitive Issue

This paper takes a unique look at the competing issues of using machine learning techniques to fight fraud at financial institutions.

(more available)
Added: October 13, 2018
image from Using Security Metrics to Drive Action

Using Security Metrics to Drive Action

An Annual Showcase of Data Breaches.

Added: October 13, 2018
image from 2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

This report will help you benchmark your third-party risk management program and its performance against trends in the market and best practices.

(more available)
Added: October 12, 2018
image from Cloud Security Trends: May 2017

Cloud Security Trends: May 2017

This is a report on cloud security trends.

Added: October 12, 2018
image from IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions widespread, trusted identity exchanges using federated methods that are secure, interoperable, privacy-enhancing and easy to use. Realization of that vision will require companies, agencies and individuals to perform at a new level. The Requirements are our first step towards that goal, by describing a set of functions that parties must be able to fulfill, and a set of criteria for assessing those capabilities.

(more available)
Added: October 12, 2018
image from Ten Key Questions on Cyber Risk and Cyber Risk Insurance

Ten Key Questions on Cyber Risk and Cyber Risk Insurance

By providing an overview of the main areas of research and the key studies conducted in the field to date, and by making some initial recommendations about the potential role of insurers and governments in addressing cyber risks, this report lays the groundwork for discussion and future research on the development of the cyber risk and the cyber insurance market.

(more available)
Added: October 12, 2018
image from Threat Advisory: CardCrypt

Threat Advisory: CardCrypt

This is a threat advisory for CardCrypt

Added: October 12, 2018
image from Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

In this report they seek to answer four important questions. How mature is the profession today? Where are we weakest/strongest? Which improvements in maturity are likely to matter most? How do we rate against others in our industry?

(more available)
Added: October 12, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 11, 2025 20:08 UTC (build b1d7be4)