Search

Cyber risk : why no deal is immune

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a22000004b 4500</leader>
    <controlfield tag="001">MAP20130007489</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20140902120146.0</controlfield>
    <controlfield tag="008">130304e20121201gbr||||       ||  ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20130002972</subfield>
      <subfield code="a">Steiner-Dicks,  Katherine</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">Cyber risk</subfield>
      <subfield code="b">: why no deal is immune</subfield>
      <subfield code="c">Katherine Steiner-Dicks speaks to Kevin Kalinich, Global Practice Leader for Professional Risk Solutions-Network Risk-Cyber at AON</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The challenge for insurers and their clients is to create solutions that keep up with the risks and liabilities borne from cyber attacks, big data, cloud computing,mobile devices, social media and customer contract requirements, to ultimately protect client profits</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080587628</subfield>
      <subfield code="a">Riesgo tecnológico</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080557515</subfield>
      <subfield code="a">Cibernética</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080588953</subfield>
      <subfield code="a">Análisis de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080558130</subfield>
      <subfield code="a">Entrevistas</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20130002989</subfield>
      <subfield code="a">Kalinich, Kevin</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20130003009</subfield>
      <subfield code="a">Aon M&A Solutions</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="t">AMA Review : whats happening in the world of M&A .- London [etc.] : Aon M&A Solutions</subfield>
      <subfield code="d">December 2012 ; p. 1-4</subfield>
    </datafield>
  </record>
</collection>