Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Supply chain

Below you will find reports with the tag of “Supply chain”

image from The State of Industrial Cybersecurity in the Era of Digitalization

The State of Industrial Cybersecurity in the Era of Digitalization

An annual survey on the challenges and response to those challenges of cybersecurity in the Industrial Control Systems (ICS) space.
Added: October 27, 2020
image from Cybersecurity: The Human Challenge

Cybersecurity: The Human Challenge

This study provides new insights into the state of cybersecurity skills and resources across the globe.
Added: October 14, 2020
image from Global Insights: Supply Chain Cyber Risk - USA

Global Insights: Supply Chain Cyber Risk - USA

A survey of over 1,500 CIOs, CISO, and Chief Procurement Officers on their concerns and actions for supply chain management. This is a US specific version of the main report. (more available)
Added: September 28, 2020
image from Global Insights: Supply Chain Cyber Risk

Global Insights: Supply Chain Cyber Risk

A survey of over 1,500 CIOs, CISO, and Chief Procurement Officers on their concerns and actions for supply chain management.
Added: September 28, 2020
image from 2020 State of the Software Supply Chain

2020 State of the Software Supply Chain

Now in its sixth year, Sonatype’s State of the Software Supply Chain Report continues to examine measurable practices of secure open source software development and delivery. (more available)
Added: September 1, 2020
image from Cyber Security Breaches Survey 2020

Cyber Security Breaches Survey 2020

Using telephone survey of UK business and thirty in-depth interviews, this report reviews awareness and approaches to cyber security in the UK as well as the nature and impact of breaches by firm size and sector. (more available)
Added: July 22, 2020
image from SolarWindws Public Sector Cybersecurity Survey Report

SolarWindws Public Sector Cybersecurity Survey Report

A survey of 400 public sector IT decision makers and influencers to determine challenges faced by public sector IT professionals, security threats, and cybersecurity capabilities. (more available)
Added: July 22, 2020
image from The Path from Reactive to Proactive Third-Party Risk Management

The Path from Reactive to Proactive Third-Party Risk Management

Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns. (more available)
Added: June 22, 2020
image from Digital Pulse Coronavirus Flash Survey March 2020

Digital Pulse Coronavirus Flash Survey March 2020

This document is the product of a flash survey, an unscheduled, event-driven survey with a fast turnaround to cover a rapidly evolving situation relevant to tech markets. (more available)
Added: April 4, 2020
image from Resilience360 Annual Risk Report 2020

Resilience360 Annual Risk Report 2020

The insights presented in this report will help guide your supply chainmonitoring and risk mitigation strategy, enable better informed decision-making processes, and aid the formulationof responses that create more resilient and sustainablebusiness operations. (more available)
Added: March 29, 2020
image from Bot Baseline: Fraud in Digital Advertising

Bot Baseline: Fraud in Digital Advertising

For the fourth time, White Ops and the ANA have partnered to measure bot fraud in the digital advertising ecosystem. Previous studies measured bot fraud in the digital advertising ecosystem in August/September 2014, August/September 2015, and November/December 2016. (more available)
Added: March 15, 2020
image from Stay Ahead of Growing Third Party Risk

Stay Ahead of Growing Third Party Risk

This is a study on third party risk from Gartner. It covers how third party risks are changing, how companies are managing third party risks, and taking an iterative approach to third party risks. (more available)
Added: February 12, 2020
image from The Secure Access Threat Report 2017

The Secure Access Threat Report 2017

Bomgar outlines how to defend against security threats, showing two distinct groups of threats, prevention techniques, etc.
Added: February 6, 2020
image from The Price Of Data Security

The Price Of Data Security

This paper discusses all of the consequences for GDPR non-compliance.
Added: September 18, 2019
image from 10 Predictions for Developers in 2019

10 Predictions for Developers in 2019

This report provides exactly what its title offers, 10 predictions for developers in 2019.
Added: July 10, 2019
image from Demystifying Third-Party Vendor Risk Management for Healthcare Organizations

Demystifying Third-Party Vendor Risk Management for Healthcare Organizations

Outsourcing is a fact of life for healthcare organizations, from routine functions such as food services and laundry to regulatory compliance and clinical activities. (more available)
Added: March 7, 2019
image from State of Cybersecurity 2019: Part 1:Current Trends in Workforce Development

State of Cybersecurity 2019: Part 1:Current Trends in Workforce Development

State of Cybersecurity 2019 reports the results of the annual ISACA global State of Cybersecurity Survey, conducted in November 2018. While some findings pointed to unforeseen trends, many survey results reinforce previous years’ findings—specifically that the need for trained and experienced cybersecurity professionals vastly outweighs the supply. (more available)
Added: March 6, 2019
image from The Buck Stops Where?

The Buck Stops Where?

From the report, “For years, the Finance industry has been a trailblazer in managing the risk posed by vendors, suppliers, and business partners. (more available)
Added: February 17, 2019
image from Take Control Of Vendor Risk Management Through Continuous Monitoring

Take Control Of Vendor Risk Management Through Continuous Monitoring

This survey, conducted by Forrester Consulting on behalf of BitSight, offers insight in to the critical role that Vendors play in key business functions and how they can create security risks and issues. (more available)
Added: February 17, 2019
image from Solving The CNP False Decline Puzzle: Collaboration Is Key

Solving The CNP False Decline Puzzle: Collaboration Is Key

From the report, “The bottom line is that good customers who transact online are suffering a bad purchasing experience – and this is doubly harmful to both card issuers and merchants. (more available)
Added: February 13, 2019
image from Third Party Risk: Why Real-Time Intelligence Matters

Third Party Risk: Why Real-Time Intelligence Matters

Abstract: Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. (more available)
Added: February 13, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 26, 2021 00:08 UTC (build 7e736b2)