Search

Is cyber risk systemic?

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000nam a22000004b 4500</leader>
    <controlfield tag="001">MAP20170014980</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20170517170656.0</controlfield>
    <controlfield tag="008">170517s2017    usa||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">Is cyber risk systemic?</subfield>
      <subfield code="c">American International Group</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">New York [etc.]</subfield>
      <subfield code="b">AIG</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">the risk can be managed as the majority of respondents largely agreed that systemic cyber exposure can be mitigated with proper cyber security investments. Along with security software and hardware, investments should include careful vendor vetting and management, training on proper security practices (e.g., back-ups of mission-critical data), and insurance to help mitigate the impact of a systemic cyber event. While cyber threats will continue to advance and expand, defenses must keep pace</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20100016923</subfield>
      <subfield code="a">Riesgo sistémico</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603038</subfield>
      <subfield code="a">Prevención de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603731</subfield>
      <subfield code="a">Seguridad informática</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080584344</subfield>
      <subfield code="a">Control de riesgos</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080450168</subfield>
      <subfield code="a">American International Group</subfield>
    </datafield>
  </record>
</collection>