MMC cyber handbook 2016 : increasing resilience in the digital economy
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000cam a22000004b 4500</leader>
<controlfield tag="001">MAP20160034226</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20220911192725.0</controlfield>
<controlfield tag="008">161117s2016 usa|||| ||| ||eng d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
<subfield code="d">MAP</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">7</subfield>
</datafield>
<datafield tag="245" ind1="0" ind2="0">
<subfield code="a">MMC cyber handbook 2016</subfield>
<subfield code="b">: increasing resilience in the digital economy</subfield>
</datafield>
<datafield tag="260" ind1=" " ind2=" ">
<subfield code="a">[s.l.]</subfield>
<subfield code="b">Marsh & McLennan</subfield>
<subfield code="c">2016</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">The evolving cyber risk landscape -- Cyber: everyoine is at risk -- Cyber threat is a shared issue -- Cyber terrorists and ransomware: interview with Shawn Henry -- Go to cyber extremes: what to do when digitalization goes wrong -- How Europe can fitht cyber attacks (and win) -- New data protection law -- Cyber risks by industry -- Quantifiying cyber risk: the core of effective risk management strategy -- Measuring cyber aggregation risk -- Evolving challenges in cyber risk management: protecting assets and optimizing expenditures -- Can you put a dollar amount on your company's cyber risk? -- Why modeling is the holy grail of cyber insurance -- Cyber loss exposure :identification and development of underwriting information -- The insurance of things and Industry 4.0 -- Staffing for cyber risk mitigation: the business challenge -- Don't ignore the insider cyber threat -- A strategic approach to cybersecurity operations -- Chief human resources officer : why your employees are your strongest and weakest link in your cyber defenses</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080591182</subfield>
<subfield code="a">Gerencia de riesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20160007633</subfield>
<subfield code="a">Ciberriesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080586546</subfield>
<subfield code="a">Nuevas tecnologías</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080588953</subfield>
<subfield code="a">Análisis de riesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080568641</subfield>
<subfield code="a">Digitalización</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080592875</subfield>
<subfield code="a">Protección de datos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20090026162</subfield>
<subfield code="a">Cuantificación del riesgo</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20180000454</subfield>
<subfield code="a">Industria 4.0</subfield>
</datafield>
<datafield tag="710" ind1="2" ind2=" ">
<subfield code="0">MAPA20080449025</subfield>
<subfield code="a">Marsh & McLennan Companies</subfield>
</datafield>
</record>
</collection>