Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security training

Below you will find reports with the tag of “Security training”

image from 2015 Information security breaches survey

2015 Information security breaches survey

A report from the government of the United Kingdom detailing the findings of a survey regarding security breaches in 2015.
Added: October 15, 2018
image from Security Privacy And The Next Generation Workforce

Security Privacy And The Next Generation Workforce

Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace. (more available)
Added: October 15, 2018
image from State Of Privacy & Security Awareness In Retail

State Of Privacy & Security Awareness In Retail

This report provides data to help understand the need of helping employees understand PCI compliance in the retail industry.
Added: October 15, 2018
image from The Global State Of Online Digital Trust

The Global State Of Online Digital Trust

The digital trust perception gap, and other findings in this ground-breaking study, highlight the need for business leaders to understand how much consumers trust organizations, what drives digital trust, and the business impact of losing that trust. (more available)
Added: October 15, 2018
image from 2016 Midmarket Threat Summary Report

2016 Midmarket Threat Summary Report

This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats.
Added: October 14, 2018
image from Cyber Security Breaches Survey

Cyber Security Breaches Survey

From the UK, this report was commissioned by the Department for Culture, Media and Sport (DCMS) and it details the findings from a quantitative and qualitative survey with UK businesses on cyber security. (more available)
Added: October 14, 2018
image from Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

This whitepaper discusses the disconnects that have emerged between cybersecurity threats and organizations' contermeasures.
Added: October 14, 2018
image from How To Fight The Phishing Epidemic And Win

How To Fight The Phishing Epidemic And Win

This ebook takes a look at the Phishing Epidemic and offers some solutions to help organizations win that battle.
Added: October 14, 2018
image from CTI in Security Operations:SANS 2018 CyberThreat Intelligence Report

CTI in Security Operations:SANS 2018 CyberThreat Intelligence Report

This is the result of SANS 2018 Cyber Threat Intelligence Survey. The survey focuses on how organizations could collect security intelligence data from a variety of sources, and then recogniza and act up on indicators of attach and compromise scenarious in a timely manner. (more available)
Added: October 13, 2018
image from Going After The Weak Link: Security In Mergers & Acquisitions

Going After The Weak Link: Security In Mergers & Acquisitions

This report discusses the security issues involved in mergers and acquisitions of other organizations.
Added: October 13, 2018
image from Microlearning: Small Bites, Big Cybersecurity Impact

Microlearning: Small Bites, Big Cybersecurity Impact

This whitepaper covers the six things every organization must have to “move the security awareness training” needle.
Added: October 13, 2018
image from PCI Compliance: Employee Awareness Is Key

PCI Compliance: Employee Awareness Is Key

This guide has been written to break down PCI requirements into layman’s terms and offer actionable insights into establishing a PCI-compliant security awareness program. (more available)
Added: October 13, 2018
image from Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

This paper presents the results of a survey conducted in Australia to understand how prepared companies were for cyber breach situations, and compliance. (more available)
Added: October 12, 2018
image from GDPR Cheat Sheet For Cybersecurity Professionals

GDPR Cheat Sheet For Cybersecurity Professionals

This paper provides a simple approach to understanding and implementing GDPR compliance.
Added: October 12, 2018
image from RiskTeller: Predicting the Risk of Cyber Incidents

RiskTeller: Predicting the Risk of Cyber Incidents

This paper from CCS 2017, presents a system that analyzes binary file appearance logs of machines to predict which machines are at risk of infection months in advance. (more available)
Added: October 12, 2018
image from The Weakest Link: Why People Are Your Network's Greatest Vulnerability

The Weakest Link: Why People Are Your Network's Greatest Vulnerability

In this white paper, they explore why people are the biggest vulnerability for most organizations, and whether it’s possible to ‘patch’ this vulnerability. (more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2022
Library updated: July 4, 2022 20:08 UTC (build d6199b1)