Read our latest reports

 Internet of threats: Securing the Internet of Things for industrial and utility companies

The end of the beginning: Unleashing the transformational power of GDPR

Updated 15 May 2018

GDPR – bane or boon? We surveyed 1,500 executives about their organizations’ GDPR preparations in 15 industries around the world.

 Internet of threats: Securing the Internet of Things for industrial and utility companies

Internet of threats: Securing the Internet of Things for industrial and utility companies

Updated 12 Mar 2018

Deploying IoT technologies at a faster pace than they are secured can open organizations to dangers greater than negative public sentiment.

Beyond the boom: Improving decision making in a security crisis

Beyond the boom: Improving decision making in a security crisis

Updated 23 Jan 2018

Making decisions quickly is critical during and after a security breach, so organizations need to practice responses.

Preparing for planet-scale security: Getting it right in electronics

Updated 15 Sep 2017

Electronics companies must secure not only their devices, but also their factory, ecosystem and partner networks.

It’s not where you start – it’s how you finish: Addressing the cybersecurity skills gap with a new collar approach

It’s not where you start – it’s how you finish: Addressing the cybersecurity skills gap with a new collar approach

Updated 09 May 2017

Many cybersecurity jobs can be filled through a new collar approach, with less emphasis on degrees earned and more on skills developed.

Cybersecurity in the cognitive era: Priming your digital immune system

Updated 01 Nov 2016

In the cognitive era, organizations face well-known security challenges that lead to gaps in intelligence, speed and accuracy when confronting threats and incidents.

Cyber and beyond: Insurance and risk in a digitally interconnected world

Cyber and beyond: Insurance and risk in a digitally interconnected world

Updated Nov 2016

To navigate the risks of the digitally interconnected environment, insurers must build the right solutions and collaborate extensively.

Securing the C-suite: Cybersecurity perspectives from the boardroom and C-suite

Updated 11 Aug 2016

Cybersecurity solutions must encompass not only technical fixes, but also changes in business processes, controls, management and employee behavior.

Read earlier Security reports

Emerging security trends and risks

Updated 18 Jun 2012

Executives can address emerging security risks by: building a proactive security intelligence capability; developing a unified view of endpoints, including mobile devices; protecting information assets at the database level; and creating safer social habits.


Managing threats in the digital age: Addressing security, risk and compliance in the C-suite

Updated 25 Aug 2011

Security is now unquestionably a C-suite priority and organizations need a systematic and proactive approach to address security threats and manage compliance requirements.


The evolving role of IT managers and CIOs: Findings from the 2010 IBM Global IT Risk Study

Updated 16 Sep 2010

Mounting regulatory demands, the growth of 24x7 online business and the constant shadow of an uncertain economy underscore the importance of managing risk in all its forms – whether related to business, data or events.

Choose a channel to access
IBV thought leadership 

Follow IBV