How can we manage the dynamic nature of cyber-risk? : risk transfer is part of a comprehensive solution
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000cab a2200000 4500</leader>
<controlfield tag="001">MAP20160026085</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20160915152203.0</controlfield>
<controlfield tag="008">160831e20160624usa|||p |0|||b|eng d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
<subfield code="d">MAP</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">7</subfield>
</datafield>
<datafield tag="245" ind1="0" ind2="0">
<subfield code="a">How can we manage the dynamic nature of cyber-risk? </subfield>
<subfield code="b">: risk transfer is part of a comprehensive solution</subfield>
<subfield code="c">Adeola Adele... [et al.]</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">Given the dynamic nature of cyber-risk, taking a multidimensional approach that integrates board governance, technology solutions, behavioral change and risk transfer solutions can help reduce risk to a manageable level.</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20160007633</subfield>
<subfield code="a">Ciberriesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20140022700</subfield>
<subfield code="a">Ciberseguridad</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080587628</subfield>
<subfield code="a">Riesgo tecnológico</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20140023066</subfield>
<subfield code="a">Ciberataques</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20140010615</subfield>
<subfield code="a">Evolución tecnológica</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20100017982</subfield>
<subfield code="a">Riesgos emergentes</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080615673</subfield>
<subfield code="a">Transferencia de riesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080598631</subfield>
<subfield code="a">Reducción de riesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080591182</subfield>
<subfield code="a">Gerencia de riesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080587581</subfield>
<subfield code="a">Riesgo informático</subfield>
</datafield>
<datafield tag="700" ind1="1" ind2=" ">
<subfield code="0">MAPA20160010923</subfield>
<subfield code="a">Adele, Adeola</subfield>
</datafield>
<datafield tag="773" ind1="0" ind2=" ">
<subfield code="w">MAP20077000932</subfield>
<subfield code="t">Emphasis</subfield>
<subfield code="d">New York : Towers Watson, 1987-</subfield>
<subfield code="g">01/09/2016 Número 2 - 2016 , p. 10-15</subfield>
</datafield>
</record>
</collection>