Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Senior Management

Below you will find reports with the tag of “Senior Management”

image from Managing the Risk of Post-breach or "Resident" Attacks

Managing the Risk of Post-breach or "Resident" Attacks

Ponemon Institute surveyed 627 IT and IT security practitioners in the United States to understand how well organizations are addressing cyber risks associated with attackers who may already be residing within the perimeter, including insiders that might act maliciously. In this study, these are referred to as “post-breach” or “resident” attackers. The findings consistently show that organizations do not fully understand the risks associated with this type of threat, are unprepared for resident attackers, and have little ability to discover and remove them.

(more available)
Added: September 18, 2019
image from The Cybersecurity Imperative: Pulse Update - Summer 2019

The Cybersecurity Imperative: Pulse Update - Summer 2019

In 2018, WSJ Pro Cybersecurity partnered with ESI ThoughtLab, a thought leadership and economic research firm, to gather data on how more than 1,300 enterprises were responding to the challenge of managing cyber risk. The study launched in late 2018 with the ground-breaking report ‘The Cybersecurity Imperative’ and continues with this pulse update report based on the findings of a new sample of companies.

(more available)
Added: September 18, 2019
image from Best Practices: Mitigating Insider Threats

Best Practices: Mitigating Insider Threats

Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. This report describes how to build an insider threat program.

(more available)
Added: September 18, 2019
image from Fake Executive Emails, Real Financial Losses

Fake Executive Emails, Real Financial Losses

From the report, “BEC is a specific type of phishing email that operates without links and without attachments (two of the standard markers that perimeter defenses look for). However, instead of taking over a computer or stealing data, BEC hackers impersonate an executive (a known CEO, CFO or other CxO), and persuade the recipient (an employee) to perform some action – like wiring money or attaching information to an email. " Read on to learn more.

(more available)
Added: September 18, 2019
image from Reinventing Cybersecurity With Artificial Intelligence

Reinventing Cybersecurity With Artificial Intelligence

In this report they explore: • Why AI-enabled cybersecurity is increasingly necessary • How organizations are benefitting from AI in cybersecurity • Where organizations should focus their cybersecurity initiatives • Building a roadmap for implementing AI in cybersecurity

(more available)
Added: September 18, 2019
image from 2018 Deloitte-NASCIO Cybersecurity Study

2018 Deloitte-NASCIO Cybersecurity Study

From the report, “ONE OF THE most important priorities of a state chief information officer (CIO) is to reduce risk to their state. Cybersecurity and reducing cyber risk, specifically, is top of mind for every state CIO and many factors contribute to this. For example, it is unknown how many cyberattacks have been attempted on state government collectively, but one state estimates that two years ago there were 150 million attacks a day, while today there is an average of 300 million attacks per day. The same state has seen as many as 800 to 900 million in one day. "

(more available)
Added: September 18, 2019
image from Trends for Scaling Innovation in Health Care

Trends for Scaling Innovation in Health Care

This key findings’ report contains a synopsis of trends on how health systems are scaling innovation and a look-ahead at what the innovation perspectives and strategies of today may mean for the health systems tomorrow. It is structured to provide action items for efficient scaling of innovation at health systems followed by supporting findings.

(more available)
Added: July 10, 2019
image from State of Cybersecurity 2019: Part 2: Current Trends in Attacks, Awareness and Governance

State of Cybersecurity 2019: Part 2: Current Trends in Attacks, Awareness and Governance

State of Cybersecurity 2019 reports the results of the annual ISACA® global State of Cybersecurity Survey, conducted in November 2018. This second of two reports focuses on current trends in cybersecurity attack vectors and response methodologies, organizational governance and program management.

(more available)
Added: July 10, 2019
image from Advancing Cyber Risk Management: From Security To Resilience

Advancing Cyber Risk Management: From Security To Resilience

Since 2017, risk experts have consistently ranked large-scale cyber attacks and data fraud among the top five mostly likely risks around the world. Despite growing anxieties about cyber threats, cyber resilience strategies and investments continue to lag. Globally, the time taken to discover a data breach has considerably lowered since 2017, but organizations in the Asia-Pacific region took four months longer than the global median. Internet users are growing 10 times faster than global population, exponentially increasing the surface area of attack. For example, in 2018, the total cost of cyber crimes grew by a third compared to 2016, to $600 billion, but investments in cyber security only increased 10 percent over the same period.

(more available)
Added: July 10, 2019
image from The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

This year’s SANS survey saw an increase in usage and interest in CTI, along with a diversification in how the intelligence is being used by organizations. While the use of CTI continues to grow, there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs. This survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.

(more available)
Added: May 18, 2019
image from Leveraging Board Governance For Cybersecurity: The CISO/CIO Perspective

Leveraging Board Governance For Cybersecurity: The CISO/CIO Perspective

This report provides Advanced Cyber Security Center executives weighing in on the Board’s role as a strategic partner to management in balancing digital transformations and cybersecurity risks.

(more available)
Added: May 18, 2019
image from The Life and Times of Cybersecurity Professionals - 2018

The Life and Times of Cybersecurity Professionals - 2018

“In late 2018 and early 2019, the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) conducted its third annual research product focused on the lives and experiences of cybersecurity professionals. This year’s report is based on data from a survey of 267 cybersecurity professionals and ISSA members. Ninety percent of survey respondents resided in North America, 5% came from Europe, 3% from Central/South America, 2% from Asia, and 1% from Africa (note: Total exceeds 100% due to rounding).”

(more available)
Added: May 18, 2019
image from Consumer Loss Barometer - The Economics of Trust

Consumer Loss Barometer - The Economics of Trust

Understanding the gap in perceptions of cybersecurity between consumers and the organizations that serve them is a key theme of this report.

(more available)
Added: May 18, 2019
image from Board Oversight and Cybersecurity: Leveraging Corporate Governance to Manage Cyber Threats

Board Oversight and Cybersecurity: Leveraging Corporate Governance to Manage Cyber Threats

This report offers insight for lawyer’s and details how boards should proactively strive to create companywide cybersecurity protocols to avoid potential litigation.

(more available)
Added: May 18, 2019
image from Global Risk Management Survey - 2019

Global Risk Management Survey - 2019

Every organization, industry and economy around the world is confronting more risks than ever before. Considering this backdrop, it’s troubling that many organizations report that they may be less prepared than they have ever been. A key insight from Aon’s 2019 Global Risk Management Survey is that organizations need to be more prepared for the broad range of risks that threaten their ability to continue growing, protecting their brand and serving clients and stakeholders.

(more available)
Added: May 18, 2019
image from Hiscox Cyber Readiness Report 2018

Hiscox Cyber Readiness Report 2018

The Hiscox Cyber Readiness Report is compiled from a survey of more than 4,100 executives, departmental heads, IT managers and other key professionals in the UK, US, Germany, Spain and The Netherlands. Drawn from a representative sample of organisations by size and sector, these are the people on the front line of the business battle against cyber crime. While all are involved to a greater or lesser extent in their organisation’s cyber security effort, 45% make the final decision on how their business should respond. The report not only provides an up-to-the-minute picture of the cyber readiness of organisations large and small, it also offers a blueprint for best practice in the fight to counter an ever-evolving threat.

(more available)
Added: May 3, 2019
image from Privileged Access Management In The Modern Threatscape

Privileged Access Management In The Modern Threatscape

Privileged access remains the preferred vector for attackers, and most organizations aren’t taking the very basic steps to secure it

(more available)
Added: April 19, 2019
image from The Tactics & Tropes of the Internet Research Agency

The Tactics & Tropes of the Internet Research Agency

Upon request by the United States Senate Select Committee on Intelligence (SSCI), New Knowledge reviewed an expansive data set of social media posts and metadata provided to SSCI by Facebook, Twitter, and Alphabet, plus a set of related data from additional platforms. The data sets were provided by the three primary platforms to serve as evidence for an investigation into the Internet Research Agency (IRA) influence operations.

(more available)
Added: March 26, 2019
image from Rating Companies on Third-Party Cyber Risk

Rating Companies on Third-Party Cyber Risk

This report offers insight into the need for a cyber risk ratings system.

Added: March 26, 2019
image from Striking Security Gold: Uncovering Hidden Insights in a decade's worth of RSA Conference abstracts

Striking Security Gold: Uncovering Hidden Insights in a decade's worth of RSA Conference abstracts

From the report, “But what exactly do we talk about when we talk “security?” That’s the question we seek to answer in this report, which has its roots in a similar question asked by an eight-year-old daughter two and a half years ago: “What’s the RSA Conference about, Daddy?” That root sprouted into a four-part blog series and a panel discussion a year later where we analyzed 25 years of session titles in honor of the 25th anniversary of RSA Conference.”

(more available)
Added: March 16, 2019
image from 7 Most Unsafe Gaps For Industrial Cyber Security

7 Most Unsafe Gaps For Industrial Cyber Security

Indegy provides a helpful graphic designed to reveal seven critical areas in the area of industrial cyber security.

Added: March 16, 2019
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)