2018 Cybersecurity Predictions : A Shift to Managing Cyber as an Enterprise Risk
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000cam a22000004b 4500</leader>
<controlfield tag="001">MAP20180005862</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20180227180422.0</controlfield>
<controlfield tag="008">180227s2018 usa|||| ||| ||eng d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
<subfield code="d">MAP</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">86</subfield>
</datafield>
<datafield tag="245" ind1="0" ind2="0">
<subfield code="a">2018 Cybersecurity Predictions</subfield>
<subfield code="b"> : A Shift to Managing Cyber as an Enterprise Risk</subfield>
</datafield>
<datafield tag="260" ind1=" " ind2=" ">
<subfield code="a">[New York]</subfield>
<subfield code="b">Stroz Friedberg</subfield>
<subfield code="c">2018</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">Since issuing our 2017 predictions, we¿ve seen a dramatic rise in the sophistication, scale, and impact of cyber attacks. As companies strive to enrich their customer experiences through a spectrum of endpoints, ranging from mobile devices to automobiles, the attack surface has increased dramatically. With this ever-growing threat landscape comes a proportionate increase in the impact that cyber attacks have on enterprises, and the customers they serve. This report draws on our experience working with boards and C-suites, as well as security and risk professionals to plan for, mitigate, and manage the expanding impact of cyber risk across the enterprise. </subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20140022700</subfield>
<subfield code="a">Ciberseguridad</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20160007633</subfield>
<subfield code="a">Ciberriesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20100017982</subfield>
<subfield code="a">Riesgos emergentes</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080603731</subfield>
<subfield code="a">Seguridad informática</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20090035270</subfield>
<subfield code="a">Piratería</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080603038</subfield>
<subfield code="a">Prevención de riesgos</subfield>
</datafield>
<datafield tag="710" ind1="2" ind2=" ">
<subfield code="0">MAPA20170000990</subfield>
<subfield code="a">Stroz Friedberg</subfield>
</datafield>
</record>
</collection>