Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Risk Management

Below you will find reports with the tag of “Risk Management”

image from A New Timescale For Fraud Science: Insights From Our CSO

A New Timescale For Fraud Science: Insights From Our CSO

From the report, “At Feedzai, we recently completed a project: building a machine learning system to perform transaction fraud detection for a global payment service provider. This client does over a million transactions a day. We designed, trained, tested, and compared hundreds of models in just over a month. In the end we achieved a 16 percentage point increase in money recall with 20x fewer alerts. The fact that we’re continuing to deliver on projects of this scale, in this speed, makes me excited for the future. In this paper, I want to discuss why speed of data science matters, why we’re able to achieve it, and why it helps us deliver value for enterprises fighting fraud. ” Read on to find out more.

(more available)
Added: February 13, 2019
image from Lloyd's City Risk Index: Executive Summary

Lloyd's City Risk Index: Executive Summary

From the report, “The second Lloyd’s City Risk Index, based on original research by the Centre for Risk Studies at Cambridge University’s Judge Business School, details the risk landscape in the world’s leading 279 cities, responsible for 41% of global economic output in 2018. The data contained in this report will help policymakers, businesses and insurers make cities more resilient. Risk is managed most effectively by societies who anticipate and learn from each disruptive event, making the next generation safer.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Money Laundering: The AI Revolution

Money Laundering: The AI Revolution

This very thorough report offers insight into how criminals take advantage of technology. It also reports on how breakthrough technologies can help financial institutions achieve better results with fewer staff.

(more available)
Added: February 13, 2019
image from Brand Protection For Modern Enterprsies

Brand Protection For Modern Enterprsies

This report offers insights into brand protection in the modern age of social media threats. It offers insights into brand protection, why you need to protect your brand, risks to a brand, the benefits of brand protection, the current state of brand protection and how to build a brand protection program.

(more available)
Added: February 7, 2019
image from The State Of Cybersecurity At Financial Institutions

The State Of Cybersecurity At Financial Institutions

The survey upon which this report is based was fielded by the Financial Services Information Sharing and Analysis Center, in conjunction with Deloitte’s Cyber Risk Services practice. Fifty-one companies participated in the pilot launch of the survey, with representation from entities both larch and small, as well as those in between. Respondents came from all financial sectors, albeit skewed more heavily toward the US banking community.

(more available)
Added: February 7, 2019
image from CISO's Investigate: User Behavior Analytics

CISO's Investigate: User Behavior Analytics

CISOs Investigate: User Behavior Analytics (UBA) includes interviews with 11 security leaders who have deployed or are looking to deploy third-party solutions. This report replaces the ad hoc, often informal and time-consuming processes of personally gathering peer insight. Spanning verticals, the CISO contributors share real-world use cases and provide guidance.

(more available)
Added: February 5, 2019
image from Summary of Reports Issued Regarding Department of Defense Cybersecurity from July 1, 2017, Through June 30, 2018

Summary of Reports Issued Regarding Department of Defense Cybersecurity from July 1, 2017, Through June 30, 2018

From the report, “DOur objective was to (1) summarize unclassified and classified reports issued and testimonies made from the DoD oversight community and the Government Accountability Office (GAO) between July 1, 2017, and June 30, 2018, that included DoD cybersecurity issues; (2) identify cybersecurity risk areas for DoD management to address based on the five functions of the National Institute of Standards and Technology (NIST), “Framework for Improving Critical Infrastructure Cybersecurity,” April 16, 2018 (Cybersecurity Framework); and (3) identify the open DoD cybersecurity recommendations. This summary report also addresses the Federal Information Security Modernization Act of 2014 (FISMA) requirement to provide an annual independent evaluation of the agency’s information security program by using the identified findings to support the responses made in our assessment.”

(more available)
Added: January 31, 2019
image from Cybersecurity Insights Volume 8: Charting A New Course

Cybersecurity Insights Volume 8: Charting A New Course

In the summer of 2018, AT&T Business and Spiceworks performed a research study with 250 IT leaders. The research revealed that 99% of organizations have a security risk management strategy. However, there is a sharp performance divide between the organizations confident in their risk management strategies (42% called the “Confident Investors”) and organizations who are not (57% called the “Unconfident Investors”).

(more available)
Added: January 15, 2019
image from The Accountability Gap: Cybersecurity & Building A Culture Of Responsibility

The Accountability Gap: Cybersecurity & Building A Culture Of Responsibility

This study’s principal conclusion clearly mirrors today’s cybersecurity landscape: every organization is vulnerable to a cyber attack. This report uses measures of awareness and readiness to assess three degrees of vulnerability, each of which indicate differing needs to take action.

(more available)
Added: December 29, 2018
image from How Tanium Addresses the NIST Cybersecurity Framework

How Tanium Addresses the NIST Cybersecurity Framework

This paper provides a helpful checklist for NIST adoption.

Added: December 29, 2018
image from Advice From The Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

Advice From The Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

The current environment for doing business forces business leaders to face an expanding attack surface, more sophisticated threats and threat actors, and mounting regulatory compliance. These factors are creating a perfect storm that puts your organization and your customers at risk. Now is the time to act. As a Board member or executive, it is not only your goal, but your responsibility to shareholders to protect their interests. The threat to your bottom line from a single incident are significant but a digital risk management strategy can help.

(more available)
Added: December 5, 2018
image from Translating Security Leadership into Board Value

Translating Security Leadership into Board Value

A thought piece on trends that are occuring at the senior leadership levels of security professionals. Some survey data is refererenced, though it is unclear if a new survey was conducted for some of the trends identified in this report.

(more available)
Added: November 27, 2018
image from Taming Cybersecurity Regulation Mayhem

Taming Cybersecurity Regulation Mayhem

Cybersecurity incidents are increasing at astonishing rates with no end in sight. The impact of these incidents in business disruption, cost and invasion of individual privacy has provoked a groundswell of legislation and government regulation across the globe. With new regulations coming fast and furious, security professionals are often in uncharted territory, forced to juggle conflicting goals of security and privacy on one side and business growth and innovation on the other—and all under the umbrella of compliance and monitoring. Read on to learn more helpful information.

(more available)
Added: November 27, 2018
image from The CISO's Guide To Cybersecurity Risk Management and Measurement

The CISO's Guide To Cybersecurity Risk Management and Measurement

This report provides new mindsets and methods for measuring and minimizing business risk.

Added: November 27, 2018
image from Report On Improving Cybersecurity In The Health Care Industry

Report On Improving Cybersecurity In The Health Care Industry

This report provides information cultivated by the Task Force, which offers the opportunity to address significant cybersecurity concerns in the health care industry.

(more available)
Added: November 24, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study:2017

LexisNexis Risk Solutions Fraud Mitigation Study:2017

From the report, “Fraud from stolen identities or cyber attacks/hacking were the types of fraud most concerning to fraud mitigation professionals.” Read on to discover more.

(more available)
Added: November 23, 2018
image from The Journey To Digital Trust

The Journey To Digital Trust

For 20 years, leaders have turned to PwC’s Global State of Information Security® Survey (GSISS) as a trusted resource to navigate the cyber risk landscape. Over time, that landscape has evolved to be less about “information security” and more about managing digital risk. As cybersecurity, privacy and data ethics become increasingly intertwined, organizations need a central place to turn for authoritative data and actionable advice. That is why we are rebooting GSISS to create Digital Trust Insights. This new platform will explore how to build confidence in the readiness of people, processes and technologies to meet tomorrow’s challenges.

(more available)
Added: November 21, 2018
image from Risk Management Playbook

Risk Management Playbook

The Third-Party Security Risk Management Playbook (Playbook) is the definitive study of third-party security risk management practices. Based on in-depth interviews of risk executives from 30 domestic and global firms, it reveals the real-world capabilities and practices employed to manage third-party cyber risk, distilled into 14 capabilities with 72 common, emerging, and pioneering practices.

(more available)
Added: November 16, 2018
image from Building A Resilient Cybersecurity Culture

Building A Resilient Cybersecurity Culture

This report posits that “A dedicated staff with a clear mission helps retain and engage a cybersecurity workforce.” Read the report to learn more.

(more available)
Added: November 6, 2018
image from Cyber Balance Sheet: 2018 Report

Cyber Balance Sheet: 2018 Report

“In last year’s report, we sought to break down walls of misunderstanding between cybersecurity leaders and corporate directors. We continue chipping away at those walls this year, but expand the scope of our research to include a broader set of stakeholders and topics relevant to our increasingly important goal.”

(more available)
Added: November 4, 2018
image from Cloud Infrastructure In The Federal Government

Cloud Infrastructure In The Federal Government

Many federal agencies have begun adoption of modern, agile approaches to software delivery, with the goal of building higher quality services faster and more cheaply. While there are significant barriers to the adoption of this paradigm in the federal government, this paper offers specific principles and practices that have already achieved success.

(more available)
Added: October 26, 2018
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)