The Cyber security leap : from laggard to reader
Contenido multimedia no disponible por derechos de autor o por acceso restringido. Contacte con la institución para más información.
Tag | 1 | 2 | Valor |
---|---|---|---|
LDR | 00000cam a22000004b 4500 | ||
001 | MAP20150017642 | ||
003 | MAP | ||
005 | 20150507165906.0 | ||
008 | 150507s2015 gbr|||| ||| ||eng d | ||
040 | $aMAP$bspa$dMAP | ||
084 | $a7 | ||
245 | 1 | 4 | $aThe Cyber security leap$b: from laggard to reader |
260 | $aLondon [etc.]$bAccenture$c2015 | ||
520 | $aIntroduction -- Innovation and strategy: separating the leapfrogs from the laggards -- Leapfrog organizations respond to changes in the threat landscape -- Chief Information Security Officer (CISO) is a strategic role -- Importance of controls and governance practices -- Security technologies that support leapfrog companies -- Leapfrog companies invest in security -- Research predictions -- Conclusion | ||
650 | 4 | $0MAPA20080557515$aCibernética | |
650 | 4 | $0MAPA20080591182$aGerencia de riesgos | |
650 | 4 | $0MAPA20080569815$aOrganizaciones | |
650 | 4 | $0MAPA20080605674$aDesarrollo tecnológico | |
650 | 4 | $0MAPA20100037522$aMedios digitales | |
650 | 4 | $0MAPA20080603700$aSeguridad de sistemas | |
710 | 2 | $0MAPA20080436353$aAccenture |