Pesquisa de referências

Rethink the security & risk strategy : why leaders must embrace modern cybersecurity practices

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20200026198</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20220911210438.0</controlfield>
    <controlfield tag="008">160721s2020    deu||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">861</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20200017721</subfield>
      <subfield code="a">Scholtz, Tom </subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Rethink the security & risk strategy</subfield>
      <subfield code="b">: why leaders must embrace modern cybersecurity practices</subfield>
      <subfield code="c">edited by Tom Scholtz</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">London</subfield>
      <subfield code="b">Gartner</subfield>
      <subfield code="c">2020</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">18 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Security professionals often focus on the threats and breaches that dominate the headlines  Equifax, Marriott International, Aadhaar  and not necessarily on those most critical to the organization. A perfect example is when security teams hold back on cloud initiatives because of unsubstantiated cloud security worries. This exaggerated fear can result in lost opportunity and inappropriate spending. These high-profile stories are full of doom-and-gloom scenarios. Yet, zero-day vulnerabilities accounted for approximately 0.4% of incidents in the past decade. The amount spent on trying to detect them is out of balance with the actual risks they pose.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587628</subfield>
      <subfield code="a">Riesgo tecnológico</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080592875</subfield>
      <subfield code="a">Protección de datos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20170014157</subfield>
      <subfield code="a">Tecnología en la nube </subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20140007646</subfield>
      <subfield code="a">Gartner</subfield>
    </datafield>
  </record>
</collection>