Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Risk Management

Below you will find reports with the tag of “Risk Management”

image from Understanding Cyber RIsk Management vs Uncertainty With Confidence

Understanding Cyber RIsk Management vs Uncertainty With Confidence

This white paper provides an analysis of Risk Management and overcoming uncertainty.

Added: October 22, 2018
image from Cyber Balance Sheet 2017 Report

Cyber Balance Sheet 2017 Report

This study prepared by the Cyentia Institute breaks down walls between cybersecurity leaders and Boards of Direc- tors. Data is often said to be the lifeblood of the company; yet, there is immense frustration at how risks to that information are measured, mitigated, and communicated across the enterprise. As the financial, regulatory, and legal stakes of data breaches and disruptions rise, leaders at all levels must come together to protect and further the business.

(more available)
Added: October 21, 2018
image from Cybersecurity Survey

Cybersecurity Survey

Based on a 2015 survey of more than 100 major Canadian organizations across all major sectors, this paper sets out to prove that with additional focus, investment, and increased maturity, not all breaches need to be the size or have the impact that we have seen recently reported.

(more available)
Added: October 21, 2018
image from How Boards of Directors Really Feel About Cyber Security Reports

How Boards of Directors Really Feel About Cyber Security Reports

This paper sets out to reveal if IT data reported to boards of directors, enables them to make good decisions.

(more available)
Added: October 21, 2018
image from How To Stop Fraud With The Resources You Have

How To Stop Fraud With The Resources You Have

This is a handy guide to fraud protection management.

Added: October 21, 2018
image from Innovation Insight For Unstructured Data Classification

Innovation Insight For Unstructured Data Classification

From the report, “The perpetually expanding volume and propagation of the unstructured data being stored and used by organizations is making information increasingly difficult to secure. Security and risk management leaders who implement data classification technologies will greatly enhance their chances of success.”

(more available)
Added: October 21, 2018
image from The Life And Times Of Cybersecurity Professionals

The Life And Times Of Cybersecurity Professionals

This paper examines the life of those in the cybersecurity profession, and seeks to provide answers to the high turnover rate in the field.

(more available)
Added: October 21, 2018
image from The Rising Strategic Risks of Cyberattacks

The Rising Strategic Risks of Cyberattacks

Research by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation.

(more available)
Added: October 21, 2018
image from Tone at the Top and Third Party Risk

Tone at the Top and Third Party Risk

A key takeaway from this research is that accountability for managing third party risk is dispersed throughout the organization. Not having one person or function with ownership of the risk is a serious barrier to achieving an effective third part risk management program.

(more available)
Added: October 21, 2018
image from 360 Degrees Cyber Risk Survey

360 Degrees Cyber Risk Survey

The 360° Cyber Risk Survey Report provides rich benchmarked data, informed analysis, and actionable best practices to help middle-market organizations, senior leaders, and boards of directors obtain a better understanding of the operational and financial impacts of cyber risks. In today’s ever-changing cyber threat landscape, knowing how your organization stacks up against others is key in the fight to stay ahead of the next threat.

(more available)
Added: October 20, 2018
image from An Integrated Vision To Manage Cyber Risk

An Integrated Vision To Manage Cyber Risk

This report lays out a new strategy for addressing cybersecurity issues.

Added: October 20, 2018
image from Concept Paper on a proposed categorisation methodology for cyber risk

Concept Paper on a proposed categorisation methodology for cyber risk

The CRO Forum looked into the issues around cyber resilience in the paper it published in 2014. In this paper, cyber risk was defined as the risk of doing business in the cyber environment. This paper builds on the 2014 paper to focus on how to address the challenges around the collection of data to support improved cyber resilience.

(more available)
Added: October 20, 2018
image from Cyber Value at Risk

Cyber Value at Risk

This paper was written to help Enterprises prioritize cyber security activities in real time based on potential financial loss.

Added: October 20, 2018
image from Data Risk in the Third-Party Ecosystem

Data Risk in the Third-Party Ecosystem

This paper was written to understand understand how organizations qualify and quantify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident.

(more available)
Added: October 20, 2018
image from The State of CyberSecurity: Professional Careers

The State of CyberSecurity: Professional Careers

The data presented here illustrates an escalating and dangerous game of cyber security “cat and mouse.” Cyber- adversaries continue to develop creative tactics, techniques, and procedures (TTPs) for attacks. Recognizing the risk, large and small organizations are prioritizing and investing in cyber security defenses and oversight.

(more available)
Added: October 20, 2018
image from Lloyds City Risk Index 2015-2025

Lloyds City Risk Index 2015-2025

Lloyd’s City Risk Index 2015-2025, shows that trillions of dollars are at risk from manmade and natural disasters – disasters that have occurred in the past and are likely to do so again in the future. The nature of these threats is changing too. Certain extreme weather events linked to climate change are increasing in severity and frequency. Manmade threats, such as cyber attack and market crash, are increasingly significant as companies expand into new markets and territories.

(more available)
Added: October 19, 2018
image from 2016 Annual Corporate Directors Survey

2016 Annual Corporate Directors Survey

This report details the changes that have taken place in Board governance. It discusses the impact these changes have on security and risk issues in business.

(more available)
Added: October 18, 2018
image from 2017 Open Source Security & Risk Analysis

2017 Open Source Security & Risk Analysis

This report includes insights and recommendations intended to help organi- zations and their security, risk, legal, and development teams better understand the open source security and license risk landscape as they strive to improve their application risk management processes.

(more available)
Added: October 18, 2018
image from Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

The aim of this paper is to establish a database on studies, articles and working papers on cyber risk and cyber risk insurance.Based on this, we provide insurance practitioners and academics a high-level overview of the main research topics and future research directions in the field.

(more available)
Added: October 18, 2018
image from Creating Resilience in the Digital Frontier

Creating Resilience in the Digital Frontier

This paper lays out the 5 steps necessary for the foundation of an effective cyber risk management program.

Added: October 18, 2018
image from Mobile App Security Program Management Handbook

Mobile App Security Program Management Handbook

From the report, “While I call this document a ‘getting started guide,’ regardless of your program’s maturity I think you’ll find some helpful hints regarding the people, process, and technology that can elevate your mobile app security program to the next level.”

(more available)
Added: October 18, 2018
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)