Búsqueda

2018 Cyberrisk landscape

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20180009020</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20180503151848.0</controlfield>
    <controlfield tag="008">180322e20180201esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20140012534</subfield>
      <subfield code="a">Tuttle, Hilary</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">2018 Cyberrisk landscape</subfield>
      <subfield code="c">Hilary Tuttle</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The risk and insurance community consistently ranks cyberrisk as its top area of interest and concern, and it's no wonderthese days, every year is a banner year for cybersecurity. The more that stays the same, the more things change. Cyberrisk management and awareness continue to improve, but many companies still lag on even fundamental risk assessment and mitigation measures, and hackers are perpetually refining the tools in the cybercrime arsenal to stay several steps ahead, whether to steal data, sow discord, or simply stay profitable. As risk managers and cyberthreat actors get further entrenched in their roles, cybersecurity concerns have been maturing beyond stunt hacks and buzzword-laden headlines to become more nuanced. Managing this complex dynamic requires a deeper understanding of the tactics, tools and trends currently in the field and coming down the pike. Cybersecurity, risk management and legal experts expect these 10 trends will define the cyberrisk landscape in 2018</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000291</subfield>
      <subfield code="t">Risk Management Magazine</subfield>
      <subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
      <subfield code="x">0035-5593</subfield>
      <subfield code="g">01/02/2018 Volumen 65 Número 1 - enero/febrero 2018 , p. 18-25</subfield>
    </datafield>
  </record>
</collection>