Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Risk Management

Below you will find reports with the tag of “Risk Management”

image from Cyber Risk Appetite Survey January 2017

Cyber Risk Appetite Survey January 2017

The primary objective of the RSA Cyber Risk Appetite Survey is to understand the behaviors and practices of organizations in regard to cyber risk. More specifically, the report aims to calculate the risk appetites of different respondent organizations. The global research is based on responses from 272 risk and security professionals at organizations.

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

In this report, the authors outline an approach for edge-to-edge security for companies to consider as they build their digital transformation roadmaps. Strengthening a company’s security posture in a world of SDI requires rethinking both the human and the infrastructure elements, leaving behind the idea of network-centric security and moving toward data-centric security.

(more available)
Added: October 13, 2018
image from Using Security Metrics to Drive Action

Using Security Metrics to Drive Action

An Annual Showcase of Data Breaches.

Added: October 13, 2018
image from 2016 State of Application Survey:Skills, Configurations, and Components

2016 State of Application Survey:Skills, Configurations, and Components

From the report, “Application security (AppSec) is maturing for most organizations, according to the 475 respondents who took the SANS 2016 State of Application Security survey. In it, respondents recognize the need for AppSec programs and are working to improve them, despite a lack of the necessary skills, lack of funding and management buy-in, and silos between departments hampering their AppSec programs.”

(more available)
Added: October 12, 2018
image from 2017 Cyber Survey Report 2017

2017 Cyber Survey Report 2017

This survey report discusses the point that no company is completely safe from a catastrophic cyberattack. It tries to help ask the questions, “How concerned is your company?” and “What are you doing to prepare?”

(more available)
Added: October 12, 2018
image from 2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

This report will help you benchmark your third-party risk management program and its performance against trends in the market and best practices.

(more available)
Added: October 12, 2018
image from Managing Cybersecurity: The Cyber Risk Protection Story 2018

Managing Cybersecurity: The Cyber Risk Protection Story 2018

Marsh & McLennan Agency surveyed 1,141 executives from small to middle-market organizations across North America, and found that they are clearly concerned about cyber risk — but, by their own admission, they do not have a grasp of how to protect themselves.

(more available)
Added: October 12, 2018
image from Ten Key Questions on Cyber Risk and Cyber Risk Insurance

Ten Key Questions on Cyber Risk and Cyber Risk Insurance

By providing an overview of the main areas of research and the key studies conducted in the field to date, and by making some initial recommendations about the potential role of insurers and governments in addressing cyber risks, this report lays the groundwork for discussion and future research on the development of the cyber risk and the cyber insurance market.

(more available)
Added: October 12, 2018
image from The CISO Ascends From Technologist To Strategic Business Enabler

The CISO Ascends From Technologist To Strategic Business Enabler

This first report in a multipart series, which appraises various cybersecurity occupations using natural language processing (NLP), examines the role of the CISO from the vantage point of employer job ads and CISO resumes . Findings show that the role and prominence of the chief information security officer (CISO) continue to expand and transform . CISOs are no longer seen as technologists tasked to manage their organizations’ security risks . Much more than security tacticians, CISOs are seen as business strategists who reach across organizational boundaries to build business-level relationships and orchestrate business strategies that enable digital transformation and govern compliance-related issues. Key takeaways of the analysis are broken into two sections: 1) hard and soft skills, and 2) education and career demographics .

(more available)
Added: October 12, 2018
image from What CISO's Worry About In 2018

What CISO's Worry About In 2018

The purpose of the survey was to understand key concerns and opinions of Chief Information Security Officers and CIOs, focused on information security and cyber-risk, as we head into 2018.

(more available)
Added: October 12, 2018
image from Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

In this report they seek to answer four important questions. How mature is the profession today? Where are we weakest/strongest? Which improvements in maturity are likely to matter most? How do we rate against others in our industry?

(more available)
Added: October 12, 2018
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 08:08 UTC (build b1d7be4)