Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Senior Management

Below you will find reports with the tag of “Senior Management”

image from Cyber-Security Perceptions And Realities: A View From The C-Suite

Cyber-Security Perceptions And Realities: A View From The C-Suite

This Report is based on the findings of a survey that sought to understand the priorities and viewpoint of the Executive members of multiple organizations around the world, as pertains to cyber-secuirty issues.

(more available)
Added: October 17, 2018
image from Cybersecurity Risk Management Oversight

Cybersecurity Risk Management Oversight

This report takes a look at how accountants and other board members analyze cybersecurity.

Added: October 17, 2018
image from External Threats: Security Beyond The Perimeter

External Threats: Security Beyond The Perimeter

The Purpose of this study is to understand companies’ ability to analyze and mitigate online incidents and cyber attacks that are beyond the traditional security perimeter.

(more available)
Added: October 17, 2018
image from Incident Response For Android And iOS

Incident Response For Android And iOS

This book will prepare enterprises and practitioners for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setting up a mobile IR practice all the way through continuous monitoring of mobile devices.

(more available)
Added: October 17, 2018
image from Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

This report seeks to identify key components toward a framework to cyber risk modeling and qualifying and quantifying known vulnerabilities in defenses, while providing macro-systemic guidance.

(more available)
Added: October 17, 2018
image from RightScale 2018 State Of The Cloud Report

RightScale 2018 State Of The Cloud Report

In January 2018, RightScale conducted its annual State of the Cloud Survey. The survey questioned technical professionals across a broad cross-section of organizations about their adoption of cloud infrastructure. The 997 respondents range from technical executives to managers and practitioners and represent organizations of varying sizes across many industries. Respondents represent companies across the cloud spectrum, including both users (19 percent) and non-users (81 percent) of RightScale solutions. Their answers provide a comprehensive perspective on the state of the cloud today.

(more available)
Added: October 17, 2018
image from Security Report:The Evolving Role of CISOs

Security Report:The Evolving Role of CISOs

This report presents the consolodiated global findings to better understand the nature of the CISO role and reveal insights, challenges, and approaches to security strategy in today’s global threat landscape.

(more available)
Added: October 17, 2018
image from What About The Plant Floor: Six Subversive Concerns For Industrial Environments

What About The Plant Floor: Six Subversive Concerns For Industrial Environments

This paper describes six key weaknesses that an adversary can use to undermine a plant’s operation, providing real-life threat details and mitigation options.

(more available)
Added: October 17, 2018
image from 2016 State Of The Cloud Report

2016 State Of The Cloud Report

In January 2016, RightScale surveyed 1,060 technical professionals across a broad cross-section of organizations about their adoption of cloud computing. This report is based on those findings.

(more available)
Added: October 16, 2018
image from 2017 Phishing Response Trends UK Region

2017 Phishing Response Trends UK Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 16, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

This paper seeks to provide high level and tactical findings that are intended to help you advance the progress of your own DevOps Journey. Some key findings in this report are; the beneficial effects of DevOps go beyond financial results, automation is a key differentiator for organizations, and they delve deep into how an application’s architecture can affect an organization’s ability to develop and deliver software.

(more available)
Added: October 16, 2018
image from 2018 Cybersecurity Trends Infographic

2018 Cybersecurity Trends Infographic

This report recommends that since employees are the first line of defense in cyber-security issues, training employees should be top priority for CISO’s.

(more available)
Added: October 16, 2018
image from 2018 Threat Hunting Report

2018 Threat Hunting Report

This report focusses on the issues of Threat Hunting. It details the growth in Threat Hunting, the trends and processes surrounding it, and what it can mean for your organization.

(more available)
Added: October 16, 2018
image from Cybersecurity In Financial Services

Cybersecurity In Financial Services

This Paper provides a breakdown of New York’s 23 NYCRR500 Financial Security requirements.

Added: October 16, 2018
image from Energy Market Review 2014

Energy Market Review 2014

This report seeks to understand, and analyze, whether or not the energy market can respond to a damaging cyber attack.

(more available)
Added: October 16, 2018
image from Risk and Responsibility in a Hyperconnected World

Risk and Responsibility in a Hyperconnected World

From the report, “Risk and Responsibility in a Hyperconnected World, a joint effort between the World Economic Forum and McKinsey & Company, assesses the necessary action areas, and examines the impact of cyberattacks and response readiness. The report sets these against three alternative scenarios in which economic value from technological innovations is realized or lost depending on models of cyber resilience. It draws on knowledge and opinions derived from a series of interviews, workshops and dialogues with global executives and thought leaders to estimate the potential value to be created through 2020 by technological innovations. It examines the value that could be put at risk if the adoption of such innovations is delayed because more frequent, intense cyberattacks are not met with more robust cyber resilience. Finally, the report draws conclusions from the analysis and research, and offers a 14-point roadmap for collaboration.”

(more available)
Added: October 16, 2018
image from The Cost of Malware Containment

The Cost of Malware Containment

Ponemon Institute conducted this research to understand how much money organizations are wasting in their efforts to prevent malware driven threats and other malicious programs from stealing high value and confidential data. To ensure a knowledgeable participant, we surveyed 630 IT and IT security practitioners in the United States who are familiar with their organization’s practices for containing malware infections. They also have responsibility in detecting, evaluating and/or containing malware infections within their organization.

(more available)
Added: October 16, 2018
image from The Evolution And Revolution Of The CISO

The Evolution And Revolution Of The CISO

This report explores both the incremental and transformational skills required for current and future CISO success, examining which fundamental technology and security capabilities matter most and which unexpected skills CISOs will need to acquire to help organizations reshape security to drive business success.

(more available)
Added: October 16, 2018
image from The Executive Cyber Security Playbook

The Executive Cyber Security Playbook

In this ebook, FireEye explains why senior executives must be more proactive about cyber security — before, during and after an event — and how they can help create and maintain a strong security posture.

(more available)
Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from 2015 Information security breaches survey

2015 Information security breaches survey

A report from the government of the United Kingdom detailing the findings of a survey regarding security breaches in 2015.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)