Búsqueda

The Cost of cybercrime : unlocking the value of improved cybersecurity protection

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20190028363</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20200703131252.0</controlfield>
    <controlfield tag="008">160912s2019    usa||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="4">
      <subfield code="a">The Cost of cybercrime</subfield>
      <subfield code="b">: unlocking the value of improved cybersecurity protection</subfield>
      <subfield code="c">Accenture</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">[S. l.]</subfield>
      <subfield code="b">Accenture</subfield>
      <subfield code="c">2019</subfield>
    </datafield>
    <datafield tag="500" ind1=" " ind2=" ">
      <subfield code="a">Ninth annual cost of cybercrime study
</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Companies need to move their cyber security efforts away from traditional defensive approaches toward a proactive stance aligned with the organization¿s business objectives.Despite all the effort and resources that organizations invest in traditional information security approaches, many still fall prey to cyber threats, or find they are unprepared to deal with rapidly blurring enterprise boundaries. </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603724</subfield>
      <subfield code="a">Seguridad empresarial</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080578053</subfield>
      <subfield code="a">Seguridad activa</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587628</subfield>
      <subfield code="a">Riesgo tecnológico</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080623791</subfield>
      <subfield code="a">Tecnología de la información</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080436353</subfield>
      <subfield code="a">Accenture</subfield>
    </datafield>
  </record>
</collection>