Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Senior Management

Below you will find reports with the tag of “Senior Management”

image from Protecting The Crown Jewels In The Pivot To Digital Transformation

Protecting The Crown Jewels In The Pivot To Digital Transformation

This white paper by Onapsis and HMG Strategy will explore best practices for securing vital information contained in SAP and Oracle systems for those organizations that are shifting to a digital environment. In the pages that follow, discover the top security risks associated with mission-critical systems along with recommended approaches for mitigating those risks.

(more available)
Added: October 14, 2018
image from Table Of Experts: Cybersecurity

Table Of Experts: Cybersecurity

This article asks some experts local to the Boston area about CyberSecurity. It provides for interesting discussion and insight.

Added: October 14, 2018
image from The Mobile Device: The Center Of The Fraud Prevention Universe

The Mobile Device: The Center Of The Fraud Prevention Universe

From The Report, “A vision is emerging that balances effective fraud prevention with a delightful customer experience…The mobile device sits at the center of this vision. Properly secured, the mobile device can not only facilitate safer transactions within its own channel but can also be used to better secure other channels with minimal customer friction. This white paper will delve deeper into this vision and the roadmap for forward-thinking fraud executives."

(more available)
Added: October 14, 2018
image from The Rise of Nation State Attacks

The Rise of Nation State Attacks

The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation state attacks due to an uncertainty as to what a nation state attack is and how to identify the key characteristics, methods and motives of these attacks that originate with foreign governments.

(more available)
Added: October 14, 2018
image from 2015 Global Megatrends in Cybersecurity

2015 Global Megatrends in Cybersecurity

The purpose of this research is to understand the big trends or changes that will impact the security posture of organizations in both the public and private sector in the next three years. Moreover, the study looks at the next generation of protocols and practices as the cybersecurity field evolves and matures.

(more available)
Added: October 13, 2018
image from 2017 Phishing Response Trends Europe Region

2017 Phishing Response Trends Europe Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 13, 2018
image from 2017 Security Pressures Report

2017 Security Pressures Report

For ease of consumption, this report is designed into individual sections of “pressures” each featuring insightful context and convenient data tables, with the results compared against last year’s findings as a way of understanding the state of security. In addition, we have broken out the results by country to include the United States, United Kingdom, Canada, Australia, Singapore – and for the first time – Japan. Like in years past, you will find some of the comparison data is particularly intriguing and revealing into the mindset of IT and security professionals based on their region.

(more available)
Added: October 13, 2018
image from Build Vs Buy: Dynamic Authorization Solutions

Build Vs Buy: Dynamic Authorization Solutions

Within this review, you’ll find an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.

(more available)
Added: October 13, 2018
image from CEO Survey:Summary And Key Findings

CEO Survey:Summary And Key Findings

RedSeal polled 200 CEO’s about their confidence in their companies’ cybersecurity posture, and discovered that they are dangerously unrealistic about how vulnerable they are.

(more available)
Added: October 13, 2018
image from Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience.

(more available)
Added: October 13, 2018
image from Cyber Vulnerability Index report

Cyber Vulnerability Index report

The report focuses on how insurance can help make UK companies more resilient to the cyber threat, and is the result of co-operation between representatives of the UK Government and the insurance industry, led by the Cabinet Office and Marsh.

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

In this report, the authors outline an approach for edge-to-edge security for companies to consider as they build their digital transformation roadmaps. Strengthening a company’s security posture in a world of SDI requires rethinking both the human and the infrastructure elements, leaving behind the idea of network-centric security and moving toward data-centric security.

(more available)
Added: October 13, 2018
image from Equifax: A Cautionary Tale

Equifax: A Cautionary Tale

Rather than dismiss the Equifax incident as something that “could never happen to us,” know that it absolutely could. The only way to avoid a devastating breach is through a meticulous prevention strategy and a strong security posture. Once the iceberg’s been hit, the response by employees, investors and even executives will surprise you. Here’s a breakdown of what happened to one of the largest credit agencies on the planet.

(more available)
Added: October 13, 2018
image from Game Plan for Closing the SecOPS Gap

Game Plan for Closing the SecOPS Gap

Forbes created a new survey. And, from that survey, a common theme emerged from the survey and the one-on-one interviews: today’s enterprises need a modern game plan that uses technology, people and processes to close the SecOps gap.

(more available)
Added: October 13, 2018
image from Going After The Weak Link: Security In Mergers & Acquisitions

Going After The Weak Link: Security In Mergers & Acquisitions

This report discusses the security issues involved in mergers and acquisitions of other organizations.

Added: October 13, 2018
image from How Software Composition Analysis Could Have Prevented The Equifax Breach

How Software Composition Analysis Could Have Prevented The Equifax Breach

This white paper takes a look at the Equifax breach of 2017 and offers a unique analysis at what could have prevented it.

(more available)
Added: October 13, 2018
image from Industry 4.0: The World Of Making Is Changing

Industry 4.0: The World Of Making Is Changing

This well designed Report provides excellent articles and insight into the growth of devices and Cyber Security.

Added: October 13, 2018
image from Machine Learning: Fraud Is Now A Competitive Issue

Machine Learning: Fraud Is Now A Competitive Issue

This paper takes a unique look at the competing issues of using machine learning techniques to fight fraud at financial institutions.

(more available)
Added: October 13, 2018
image from Office 365 Survey: An Infographic

Office 365 Survey: An Infographic

This infographic reveals the details of a survey related to the security related issues in organizations that use Office 365,

(more available)
Added: October 13, 2018
image from Using Security Metrics to Drive Action

Using Security Metrics to Drive Action

An Annual Showcase of Data Breaches.

Added: October 13, 2018
image from 2015 Annual Security Report

2015 Annual Security Report

The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 19
  • 20
  • 21
  • 22
  • 23
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)