Search

Meeting the cyber risk challenge

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20130002910</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20130130180613.0</controlfield>
    <controlfield tag="008">130130s2013    bel||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Meeting the cyber risk challenge</subfield>
      <subfield code="c">a report by Harvard Business Review Analytic Services</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">Boston</subfield>
      <subfield code="b">Harvard Business Review</subfield>
      <subfield code="c">2013</subfield>
    </datafield>
    <datafield tag="500" ind1=" " ind2=" ">
      <subfield code="a">Research conducted in association with the Federation of European Risk Management Associations (FERMA) by Harvard Business Review Analytic Services, corporate insurer Zurich and the public sector risk management organisation PRIMO</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The enormous expansion in the availability of information presents opportunities and challenges for business and government. Keeping their own data secure is a major task for organizations that face threats from competitors and others who may find their proprietary information too tempting not to try to steal. At the same time, tightening laws and regulations and the demands of customers, citizens, suppliers, their own employees, and others with whom they interact make it imperative that they carefully control access to data about those outside parties. Accordingly, more than three out of four respondents to a recent Harvard Business Review Analytic Services survey sponsored by Zurich said information security and privacy have become more significant areas of concern in the past three years. Cyber risk comes in a bewildering variety of forms. More than one in four survey respondents mentioned each of the following as being among the most serious information security concerns for their organizations: malware and other viruses, administrative errors, incidents caused by data providers, malicious employee activity, attacks on Web applications, theft or loss of mobile devices, and internal hackers</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080557515</subfield>
      <subfield code="a">Cibernética</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20100017982</subfield>
      <subfield code="a">Riesgos emergentes</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080587581</subfield>
      <subfield code="a">Riesgo informático</subfield>
    </datafield>
    <datafield tag="710" ind1="0" ind2=" ">
      <subfield code="0">MAPA20080433390</subfield>
      <subfield code="a">FERMA</subfield>
    </datafield>
  </record>
</collection>