Búsqueda

10 Cyberhreat predictions for 2016

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20160015553</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20160512154710.0</controlfield>
    <controlfield tag="008">160511e20160301esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20140012534</subfield>
      <subfield code="a">Tuttle, Hilary</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">10 Cyberhreat predictions for 2016</subfield>
      <subfield code="c">Hilary Tuttle</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Because it is constantly evolving, cyber is one of the most challenging risks to predict, and the cost of being unprepared continues to balloon, taking the price of mitigation tools like cyber insurance alongwith it. To help prepare, here are sorne of the major cyberrisks that information security experts are watching for in 2.016. </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603038</subfield>
      <subfield code="a">Prevención de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080615352</subfield>
      <subfield code="a">Seguridad contra el robo</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080631239</subfield>
      <subfield code="a">Seguro contra el fraude informático</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080598631</subfield>
      <subfield code="a">Reducción de riesgos</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000291</subfield>
      <subfield code="t">Risk Management Magazine</subfield>
      <subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
      <subfield code="x">0035-5593</subfield>
      <subfield code="g">01/03/2016 Volumen 63 Número 2 - marzo 2016 , p. 10-11</subfield>
    </datafield>
  </record>
</collection>