Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Senior Management

Below you will find reports with the tag of “Senior Management”

image from The Rising Strategic Risks of Cyberattacks

The Rising Strategic Risks of Cyberattacks

Research by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation.

(more available)
Added: October 21, 2018
image from Tone at the Top and Third Party Risk

Tone at the Top and Third Party Risk

A key takeaway from this research is that accountability for managing third party risk is dispersed throughout the organization. Not having one person or function with ownership of the risk is a serious barrier to achieving an effective third part risk management program.

(more available)
Added: October 21, 2018
image from 21st CEO Survey: The Anxious Optimist In The Corner Office

21st CEO Survey: The Anxious Optimist In The Corner Office

This survey report offers insights into the thoughts and experiences of CEO’s including what threats keep them up at night.

(more available)
Added: October 20, 2018
image from 360 Degrees Cyber Risk Survey

360 Degrees Cyber Risk Survey

The 360° Cyber Risk Survey Report provides rich benchmarked data, informed analysis, and actionable best practices to help middle-market organizations, senior leaders, and boards of directors obtain a better understanding of the operational and financial impacts of cyber risks. In today’s ever-changing cyber threat landscape, knowing how your organization stacks up against others is key in the fight to stay ahead of the next threat.

(more available)
Added: October 20, 2018
image from An Integrated Vision To Manage Cyber Risk

An Integrated Vision To Manage Cyber Risk

This report lays out a new strategy for addressing cybersecurity issues.

Added: October 20, 2018
image from Cyber Value at Risk

Cyber Value at Risk

This paper was written to help Enterprises prioritize cyber security activities in real time based on potential financial loss.

Added: October 20, 2018
image from Data Risk in the Third-Party Ecosystem

Data Risk in the Third-Party Ecosystem

This paper was written to understand understand how organizations qualify and quantify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident.

(more available)
Added: October 20, 2018
image from Exposé Of A Credit Card Black Market

Exposé Of A Credit Card Black Market

This short report takes a look at cybersecurity related Credit Card Fraud.

Added: October 20, 2018
image from Fail To Plan, Plan To Fail

Fail To Plan, Plan To Fail

This paper is the result of a Forrester survey that sought to understand the roles of LoB practitioners and SOCs in securing IoT environments.

(more available)
Added: October 20, 2018
image from Global Advanced Threat Landscape Survey 2016

Global Advanced Threat Landscape Survey 2016

The 10th annual CyberArk Global Advanced Threat Landscape Survey 2016, themed “Cyber Security: Past, Present & Future,” examines whether global enterprises are learning and applying lessons as a result of years of highly publicized cyber attacks, and how security priorities and decision making are being impacted.

(more available)
Added: October 20, 2018
image from Mobile Security Report: 2017 Spotlight Report

Mobile Security Report: 2017 Spotlight Report

This mobile security report provides insights into the events of 2017.

Added: October 20, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2016)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2016)

October 2016 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 20, 2018
image from The Pressured World Of A Security Pro

The Pressured World Of A Security Pro

This is an infographic summary based on the 2017 Security Pressures report.

Added: October 20, 2018
image from The State of CyberSecurity: Professional Careers

The State of CyberSecurity: Professional Careers

The data presented here illustrates an escalating and dangerous game of cyber security “cat and mouse.” Cyber- adversaries continue to develop creative tactics, techniques, and procedures (TTPs) for attacks. Recognizing the risk, large and small organizations are prioritizing and investing in cyber security defenses and oversight.

(more available)
Added: October 20, 2018
image from Top 10 Global Business Risks of 2017

Top 10 Global Business Risks of 2017

The sixth annual Allianz Risk Barometer identifies the corporate perils for 2017 and beyond, based on the responses of more than 800 risk experts from 40+ countries around the globe.

(more available)
Added: October 20, 2018
image from Adjusting the Lens of Economic Crime:Preparation brings opportunity back into focus

Adjusting the Lens of Economic Crime:Preparation brings opportunity back into focus

This year’s report illustrates how economic crime has evolved over the last two years, morphing into different forms depending on industrial sector and region.

(more available)
Added: October 19, 2018
image from Best Practices:Mitigating Insider Threats

Best Practices:Mitigating Insider Threats

From the report, “Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. it’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data in order to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. this report describes how to build an insider threat program.”

(more available)
Added: October 19, 2018
image from CENTRI 2017 Security Report Research And Roundtable

CENTRI 2017 Security Report Research And Roundtable

The purpose of this report is to look at some of the key security issues the industry is facing now in terms of what problems exist and possible solutions. It also looks at what’s being done, what’s not being done, and what should and could be done.

(more available)
Added: October 19, 2018
image from Lloyds City Risk Index 2015-2025

Lloyds City Risk Index 2015-2025

Lloyd’s City Risk Index 2015-2025, shows that trillions of dollars are at risk from manmade and natural disasters – disasters that have occurred in the past and are likely to do so again in the future. The nature of these threats is changing too. Certain extreme weather events linked to climate change are increasing in severity and frequency. Manmade threats, such as cyber attack and market crash, are increasingly significant as companies expand into new markets and territories.

(more available)
Added: October 19, 2018
image from Offense-In-Depth: Reflective Social Engineering

Offense-In-Depth: Reflective Social Engineering

This report takes a look at phishing campaings and why they work so easily.

Added: October 19, 2018
image from Overcoming GDPR Compliance Challenges

Overcoming GDPR Compliance Challenges

This report introduces GDPR and the challenges that are involved and then discusses measures that organisations can take in order to boost their data protection capabilities. It also looks at the pitfalls to avoid as they can derail the overall programme. It is intended for those organisations that are working down the path to compliance and that are looking for guidance in how compliance can be achieved.

(more available)
Added: October 19, 2018
  • ««
  • «
  • 16
  • 17
  • 18
  • 19
  • 20
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)