Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Risk Management

Below you will find reports with the tag of “Risk Management”

image from National Security Leadership Recommendations: Cybersecurity Imperative

National Security Leadership Recommendations: Cybersecurity Imperative

From the report, “When it comes to the increasing cybersecurity risk faced by commercial companies, leaders in government, private enterprise and academia express varying opinions. However, a common thread is a shared sense that leaders feel overwhelmed by the growing threats and see a lack of focus and commitment to basic — but often difficult — principles across their operations. Many people, including those at organizations’ highest levels, assume cybersecurity has become a problem we cannot fix. But we can.”

(more available)
Added: October 18, 2018
image from 2016 Cyber Insurance Market Trends

2016 Cyber Insurance Market Trends

A paper written about the evolution of the market for cyber insurance.

Added: October 17, 2018
image from 2017 Security Awareness Report

2017 Security Awareness Report

During the research for this report, two key findings were discovered that uncovered why awareness programs thrive or fail.

Added: October 17, 2018
image from Cybersecurity Risk Management Oversight

Cybersecurity Risk Management Oversight

This report takes a look at how accountants and other board members analyze cybersecurity.

Added: October 17, 2018
image from Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

This report seeks to identify key components toward a framework to cyber risk modeling and qualifying and quantifying known vulnerabilities in defenses, while providing macro-systemic guidance.

(more available)
Added: October 17, 2018
image from The Role of Insurance in Managing and Mitigating the Risk

The Role of Insurance in Managing and Mitigating the Risk

Cyber attacks against UK companies present a daily threat to normal UK business operations and are increasing in severity. This report focuses on how insurance can help make UK companies more resilient to the cyber threat, and is the result of four months of co-operation between representatives of the UK Government and the insurance industry, led by the Cabinet Office and Marsh.

(more available)
Added: October 17, 2018
image from "Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

"Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

This report takes a look at some of the problems in AI, and machine based cyber security, and seeks to show how they can be overcome.

(more available)
Added: October 16, 2018
image from A Clearer View of Emerging Risks: Emerging Risks Report 2015

A Clearer View of Emerging Risks: Emerging Risks Report 2015

In this report, they examine four key areas where risks continue to emerge or, perhaps, more importantly, contain elements where the risks are unknown at this time: a) Cyber, b) Life, health and longevity, c) New Technologies, d)casualty catastrophe reserving.

(more available)
Added: October 16, 2018
image from Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

This paper seeks to simplify Cloud security and offers some solutions to the issues that an enterprise might deal with.

(more available)
Added: October 16, 2018
image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management.

(more available)
Added: October 16, 2018
image from Risk and Responsibility in a Hyperconnected World

Risk and Responsibility in a Hyperconnected World

From the report, “Risk and Responsibility in a Hyperconnected World, a joint effort between the World Economic Forum and McKinsey & Company, assesses the necessary action areas, and examines the impact of cyberattacks and response readiness. The report sets these against three alternative scenarios in which economic value from technological innovations is realized or lost depending on models of cyber resilience. It draws on knowledge and opinions derived from a series of interviews, workshops and dialogues with global executives and thought leaders to estimate the potential value to be created through 2020 by technological innovations. It examines the value that could be put at risk if the adoption of such innovations is delayed because more frequent, intense cyberattacks are not met with more robust cyber resilience. Finally, the report draws conclusions from the analysis and research, and offers a 14-point roadmap for collaboration.”

(more available)
Added: October 16, 2018
image from The Evolution And Revolution Of The CISO

The Evolution And Revolution Of The CISO

This report explores both the incremental and transformational skills required for current and future CISO success, examining which fundamental technology and security capabilities matter most and which unexpected skills CISOs will need to acquire to help organizations reshape security to drive business success.

(more available)
Added: October 16, 2018
image from UK 2015 Cyber Risk Survey Report

UK 2015 Cyber Risk Survey Report

This is an in-depth study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. The benchmarking data in this report was collected from risk professionals and CFOs from large and medium-sized corporations from across the UK. It is the hope that the aggregated information will provide useful benchmarking data and reference points against which the reader can compare their own company’s positions.

(more available)
Added: October 16, 2018
image from By the Numbers: Global Cyber Risk Perception Survey February 2018

By the Numbers: Global Cyber Risk Perception Survey February 2018

This is a unqiue report in that two leaders in two seperate industries collaborated out of the mutual concern regarding the state of cybersecurity in the global economy and the knowledge that cyber risk cannot be compartmentalized by industry, company,size, or simliar measures.

(more available)
Added: October 15, 2018
image from Mobile Banking Applications: Security Challenges For Banks

Mobile Banking Applications: Security Challenges For Banks

Accenture and NowSecure, Inc. analyzed the mobile banking app threat landscape based on industry research, customer-facing mobile banking app vulnerability assessments performed by NowSecure, and Accenture’s industry knowledge and experience working with banking institutions. They collaborated to create a report that was designed to provide an understanding of the current- state security environment for customer- facing mobile banking apps, as well as answer some key questions about the state of mobile banking app security.

(more available)
Added: October 15, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. They then outline best practices for cost-effectively mitigating risk and euring quality in life-critical deployment scenarios.

(more available)
Added: October 14, 2018
image from Best Practices For Web Application Firewall Management

Best Practices For Web Application Firewall Management

The experts at TrustWave have prepared this report to outline the issues and practices for web application firewall management.

Added: October 14, 2018
image from Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

This whitepaper discusses the disconnects that have emerged between cybersecurity threats and organizations’ contermeasures.

Added: October 14, 2018
image from Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

In this paper, they explore the underlying challenges with regard to Cyber Risk management and analyze the nature of increasingly stringent regulatory demands. Putting these pieces together, they frame five strategic moves which they believe will enable business needs, their fiduciary responsibilities with regard to Cyber Risk, and regulatory requirements.

(more available)
Added: October 14, 2018
image from Enhancing Resilience through Cyber Incident Data Sharing and Analysis

Enhancing Resilience through Cyber Incident Data Sharing and Analysis

This document enumerates and evaluates consensus data categories that enterprise risk owners and insurers could use to assess risks, identify effective controls, and improve cybersecurity culture and practice. It is the second in a series of white papers.

(more available)
Added: October 14, 2018
image from Information Security and Cyber Liability Risk Management Report 2015

Information Security and Cyber Liability Risk Management Report 2015

This report is based on the findings of a collaborative survey that was designed to gain insight into the current state and ongoing trends in information security and cyber liability risk management. The survey was completed at least in part by 448 respondants which included risk managers, insurance buyers, and other risk professionals.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)