Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Training

Below you will find reports with the tag of “Security Training”

image from The State of Email Security 2023

The State of Email Security 2023

Mimecast’s seventh annual State of Email Security report comes as organizations all over the world grow more skittish over rising economic volatility and intensifying geopolitical tensions. Now is definitely not the time to become lax on cybersecurity.

(more available)
Added: July 5, 2023
image from Information Security Maturity Report 2023

Information Security Maturity Report 2023

This year, ClubCISO celebrates the release of its 10th Annual Security Maturity Report, conducted from an anonymous survey of 182 senior executives with responsibility for their organizations’ information security. The report outlines clear trends across the EMEA information security landscape, enabling businesses to benchmark their security investments against peer organizations. The report sheds some light on the current opportunities and challenges of today’s information security leaders.

(more available)
Added: June 19, 2023
image from 2023 State of the Phish

2023 State of the Phish

Our annual State of the Phish report explores end-user security awareness, resilience and risk across 15 countries (eight more than in previous years). The report benchmarks understanding of common cyber threats and defensive tactics and reveals how potential gaps in knowledge and cyber hygiene enable the real-world attack landscape. Most attacks target people before they target systems. That’s why helping users build sustainable security habits is crucial.

(more available)
Added: May 19, 2023
image from 2023 Cybersecurity Skills Gap

2023 Cybersecurity Skills Gap

The findings in this 2023 cybersecurity skills gap report clearly show that organizations are fighting an uphill battle against cyberthreat— incurring more breaches, in need of skilled professionals, and continuing to struggle to fill key positions.

(more available)
Added: April 25, 2023
image from High Risk Users and Where to Find Them

High Risk Users and Where to Find Them

It’s a horror story that many organizations are familiar with - an employee clicks a link or visits a website, and chaos ensues. At best, it’s just a minor disruption. At worst, business continuity is broken, and an organization’s critical infrastructure is at risk. Regardless of the outcome, managing human risk is a major part of business today. In this report, we dive into what makes workers high risk, where those high risk users spend their time, what are their riskiest behaviors, and what that might mean for your organization’s security.

(more available)
Added: April 25, 2023
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great job of collecting statistics on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad actors. Our mission is to provide deep insight into the minds of IT security professionals.

(more available)
Added: February 21, 2023
image from Director Sentiment Monitor Quarterly Members' Survey Q4 2022

Director Sentiment Monitor Quarterly Members' Survey Q4 2022

In this Director Sentiment Monitor for Q4 2022, 41% of respondents told us their primary organization has experienced a cyber attack. Interestingly, 36% of respondents said their primary organization had cyber security as a standing item at all board meeting, while 27% said it was discussed quarterly. Among other findings, it is also encouraging that 81% of respondents said their primary organization has a cyber security response plan in place.

(more available)
Added: February 2, 2023
image from The Total Economic Impact Of Mimecast

The Total Economic Impact Of Mimecast

This study documents and quantifies how Mimecast protects organizations against threats. Cybercrime affects every organization no matter the size or type, and it’s a threat that is growing and changing constantly.

(more available)
Added: January 30, 2023
image from 2022 Business Impact Report

2022 Business Impact Report

Our 2022 Business Impact Report looks into what happens specifically to small businesses and solopreneurs following a data or security breach. For the report, the ITRC surveyed 447 small business owners, leaders, and employees to paint a picture of small organizations and individuals that are significantly impacted by cybercrimes, often multiple times in a short period of time.

(more available)
Added: January 4, 2023
image from Managing Human Risk

Managing Human Risk

The SANS 2022 Security Awareness Report analyzes data provided by more than a thousand security awareness professionals from around the world to identify and benchmark how organizations are managing their human risk. The goal of this data-driven report is to provide actionable steps and resources to enable organizations to mature their awareness programs and benchmark them against others.

(more available)
Added: November 29, 2022
image from The State of Remote Work Security

The State of Remote Work Security

The State of Remote Work Security Report reveals the status of organizations’ efforts to secure the new workforce, key challenges, and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. The need to secure the remote workforce has never been more critical. A year into the pandemic, organizations are still grappling with how to protect their assets.

(more available)
Added: October 24, 2022
image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report has been produced by Cybersecurity Insiders to explore how organizations are responding to the evolving security threats in the cloud and the continues shortfall of qualified security staff.

(more available)
Added: October 24, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

(more available)
Added: October 18, 2022
image from 2022 Application Security Report

2022 Application Security Report

This report reveals the latest application security trends, how organizations protect critical applications, and what tools and best practices cybersecurity professionals prioritize to find, fix and prevent vulnerabilities in next-gen applications.

(more available)
Added: October 12, 2022
image from The State of MITRE ATT&CK Threat-Informed Defense

The State of MITRE ATT&CK Threat-Informed Defense

Cyber adversaries and threats are becoming increasingly sophisticated and more frequent. The survey of 297 IT security professionals found that although 82 percent of respondents said they know about the MITRE ATT&CK framework, only 8 percent reported that they are using the ATT&CK framework regularly.

(more available)
Added: September 21, 2022
image from Women in Cybersecurity: Spanning the Career Life Cycle

Women in Cybersecurity: Spanning the Career Life Cycle

For our survey, we targeted successful women working in varied roles in the cybersecurity community, and we queried them about everything from breaking into the field and gaining career momentum to choosing a specialty and finding ways to remain relevant. In this report, we provide lessons learned and advice on how a women in cybersecurity or a woman wanting to enter this field can lay a foundation to ensure success.

(more available)
Added: September 20, 2022
image from The State of Email Security 2022

The State of Email Security 2022

Mimecast’s State of Email Security 2022 (SOES) study sheds light on the gains in cyber resilience that many companies are making, even as it reveals shortfalls and places where there is considerable room for improvement.

(more available)
Added: September 13, 2022
image from Women in Cybersecurity

Women in Cybersecurity

The new look at the workforce revealed that the percentage of women in cybersecurity is roughly 24%. While men continue to outnumber women in cybersecurity and pay disparity still exists, women in the field are buoyed by higher levels of education, and are finding their way to leadership positions in higher numbers.

(more available)
Added: September 6, 2022
image from 2022 State of the Phish Report

2022 State of the Phish Report

In this, our eighth annual State of the Phish report, we explore user vulnerabilities from multiple angles. We look at issues driven by poor cyber hygiene and those that could result from a lack of knowledge and clear communication. We discuss ways organizations can become more attuned to their risks. And we outline opportunities to build and sustain engaging security awareness training initiatives in the challenging climate.

(more available)
Added: August 11, 2022
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

The CDR is the most geographically comprehensive, vendor-agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches, the CDR surveys the perceptions of IT security professionals, gaining insights into how they see the world.

(more available)
Added: June 23, 2022
image from State of Cybersecurity 2022

State of Cybersecurity 2022

This survey report focuses on the current trends in cybersecurity workforce development, staffing, cybersecurity budgets, threat landscape and cyber-maturity. The survey findings reinforce past reporting and, in certain instances, mirror prior year data. Staffing levels, ease of hiring and retention remain pain points across the globe, and declining optimism about cybersecurity budgets reversed course this year.

(more available)
Added: June 10, 2022
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)