Five steps to IT risk management best practices
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000nab a2200000 i 4500</leader>
<controlfield tag="001">MAP20071508205</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20080418125825.0</controlfield>
<controlfield tag="007">hzruuu---uuuu</controlfield>
<controlfield tag="008">060724e20060701usa|||| | |00010|eng d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">7</subfield>
</datafield>
<datafield tag="100" ind1="1" ind2=" ">
<subfield code="0">MAPA20080045814</subfield>
<subfield code="a">Hughes, Greg</subfield>
</datafield>
<datafield tag="245" ind1="1" ind2="0">
<subfield code="a">Five steps to IT risk management best practices</subfield>
<subfield code="c">Greg Hughes</subfield>
</datafield>
<datafield tag="520" ind1="8" ind2=" ">
<subfield code="a">As individuals, corporations, and our economy grow increasingly dependent on the Internet and IT systems, the risk in these systems become far more visible and significant. Breaches or failures of information systems cause serious business crises, including reputation damage caused by identify theft, business losses stemming from system failures and regulatory restrictions arising from compliance issues.</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080591182</subfield>
<subfield code="a">Gerencia de riesgos</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080623791</subfield>
<subfield code="a">Tecnología de la información</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080587581</subfield>
<subfield code="a">Riesgo informático</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080622251</subfield>
<subfield code="a">Seguridad de la información</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080584344</subfield>
<subfield code="a">Control de riesgos</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080612580</subfield>
<subfield code="a">Sistemas de información</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080603731</subfield>
<subfield code="a">Seguridad informática</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080623517</subfield>
<subfield code="a">Protección de la información</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080552619</subfield>
<subfield code="a">Seguridad</subfield>
</datafield>
<datafield tag="740" ind1="0" ind2=" ">
<subfield code="a">Risk management</subfield>
</datafield>
<datafield tag="773" ind1="0" ind2=" ">
<subfield code="t">Risk management</subfield>
<subfield code="d">New York</subfield>
<subfield code="g">Vol. 53, nº 7, July 2006 ; p. 34-40</subfield>
</datafield>
</record>
</collection>