Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Senior Management

Below you will find reports with the tag of “Senior Management”

image from Digital Transformation to Strategic Initiatives

Digital Transformation to Strategic Initiatives

Advice for CIOs building strategic initiatives around digital transformation.

Added: May 18, 2020
image from Cloud companies appear to be silver lining as coronavirus dampens IT spending

Cloud companies appear to be silver lining as coronavirus dampens IT spending

COVID-19 is already beginning to weigh on corporate IT security budgets, but as millions work from home, one survey is nding a spending shift to cloud providers and security and away from PCs and servers.

(more available)
Added: May 18, 2020
image from 2017 Cybercrime Report

2017 Cybercrime Report

This report goes in depth on Cybercrime in 2017.

Added: May 18, 2020
image from Big Security in a Small Business World

Big Security in a Small Business World

This report from Cisco proves 10 cyber security myths false.

Added: May 11, 2020
image from The State of Enterprise IT in 2020

The State of Enterprise IT in 2020

The following report provides insights about what did and did not change in status and viewpoints between 2019 and 2020 and why.

(more available)
Added: May 8, 2020
image from The CISO Current Report

The CISO Current Report

This document institutes the third edition of the CISO Current report and contains data gathered from direct interviews surveying almost 40 cybersecurity executives at leading enterprises.

(more available)
Added: May 8, 2020
image from EY Global Information Security Survey 2020

EY Global Information Security Survey 2020

Against the backdrop of mounting threat in an era of disruption, the most forward-thinking cybersecurity functions can be critical agents of change. But this will require organizations to foster new relationships between CISOs, the board and C-suite, and every function of the business.

(more available)
Added: May 8, 2020
image from Exabeam 2019 State of The SOC Report

Exabeam 2019 State of The SOC Report

A survey driven report across the US and UK geographies on organization’s SOC capabilities.

Added: April 29, 2020
image from Cybersecurity and Resiliency Observations

Cybersecurity and Resiliency Observations

This report encourages market participants to review their practices, policies and procedures with respect to cybersecurity and operational resiliency. It states that assessing your level of preparedness and implementing some or all of the above measures will make your organization more secure. OCIE will continue to focus on working with organizations to identify and address cybersecurity risks and encourages market participants to actively engage regulators and law enforcement in this effort.

(more available)
Added: March 29, 2020
image from The Economics of Security Operations Centers: What is the True Cost for Effective Results?

The Economics of Security Operations Centers: What is the True Cost for Effective Results?

Ponemon Institute is pleased to present the findings on the economics of today’s Security Operations Centers (SOC). Sponsored by Respond Software, Ponemon Institute surveyed 637 IT and IT security practitioners in organizations that have a SOC and are knowledgeable about cybersecurity practices in their organizations. Respondents supervise or are responsible for such activities as information security, threat detection and remediation and security operations management and more.

(more available)
Added: March 29, 2020
image from Securing What's Now and What's Next: 20 Cybersecurity Considerations for 2020

Securing What's Now and What's Next: 20 Cybersecurity Considerations for 2020

This report by Cisco contains 20 predictions for the future of cybersecurity.

Added: March 1, 2020
image from CISO Media Consumption

CISO Media Consumption

In this, our launch issue of CyberTheory, we will explore the current and future state of cybersecurity, the key issues driving the shift in the corporate board room perception of cyber-risk and add substantive analysis to what we believe are the most engaging topics in the space.

(more available)
Added: March 1, 2020
image from The New Mafia: Gangs and Vigilantes

The New Mafia: Gangs and Vigilantes

This guide was constructed with insight from a global panel of Malwarebytes experts and external experts from a variety of disciplines. It also features a brief review of cybercrime history, the emergence of new participants and the impact on businesses and individuals.

(more available)
Added: February 18, 2020
image from 2020 Connectivity Benchmark Report

2020 Connectivity Benchmark Report

This report covers connectivity trends for 2020. It goes over four main key findings, including that data silos are slowing digital transformation, that organizations are reaping the benefits of APIs, that IT teams with an API strategy drive greater business outcomes, and that top-down API strategies are the most effective.

(more available)
Added: February 17, 2020
image from The State of Application Development

The State of Application Development

This report from Outsystems is based off of a survey of over 3,300 companies. It had 5 key things they looked into: How organizations’ app dev practices adapt to meet digital transformation and agility objectives, challenges in meeting application development goals, strategies IT teams use to speed up application delivery, and if these strategies are working to overcome resource constraints and reduce backlogs.

(more available)
Added: February 12, 2020
image from Cofense Annual Phishing Report 2019

Cofense Annual Phishing Report 2019

Cofence report on how phishing attempts and phishing prevention have changed in 2019.

Added: February 9, 2020
image from 2019 Cyber Risk Management Maturity Benchmark Survey Results

2019 Cyber Risk Management Maturity Benchmark Survey Results

The 2019 Survey of 211 participants covers Overall risk security, Risk Management, and also covers what job titles are involved, and what industries are involved.

(more available)
Added: February 9, 2020
image from 2019 Official Annual Cybercrime Report

2019 Official Annual Cybercrime Report

The Herjavec Group goes over changes to Cybersecurity in 2019, looking at the cyber attack surface, cybersecurity spending, and ransomware rising.

(more available)
Added: February 9, 2020
image from 2020 Cyber Trendscape report

2020 Cyber Trendscape report

The goal of this initiative was to identify trends impacting cyber security decisions, the top cyber security priorities for 2020 and beyond, the focus of risk mitigation strategies, and to highlight the overall beliefs and perceptions held by senior executives regarding the state of the cyber threat landscape and how the cyber security industry, governments and regulatory agencies are responding to their needs.

(more available)
Added: November 25, 2019
image from Incident Preparedness and Response Report

Incident Preparedness and Response Report

The VIPR report (Verizon Incident Preparedness and Response Report) outlines preparations and responses to data breaches. This includes 6 phases, planning and preparation, detection and validation, containment and eradication, collection and analysis, remediation and recovery, and assessment and adjustment.

(more available)
Added: October 1, 2019
image from State of Cybersecurity Report 2019

State of Cybersecurity Report 2019

From the report, “[This] report also captures the changing strategies used by attackers and highlights how organizations today are bolstering their defenses to stay one step ahead. It concludes with a peek into the cybersecurity areas that will be pertinent in the near future. We hope that you will benefit from the global and industry-specific insights available in this edition of the State of Cybersecurity Report and that together, we will be able to make our enterprises more resilient to withstand and recover from future attacks!”

(more available)
Added: September 18, 2019
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)