Search

The Cyber security leap : from laggard to reader

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20150017642</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20150507165906.0</controlfield>
    <controlfield tag="008">150507s2015    gbr||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="4">
      <subfield code="a">The Cyber security leap</subfield>
      <subfield code="b">: from laggard to reader </subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">London [etc.]</subfield>
      <subfield code="b">Accenture</subfield>
      <subfield code="c">2015</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Introduction -- Innovation and strategy: separating the leapfrogs from the laggards -- Leapfrog organizations respond to changes in the threat landscape -- Chief Information Security Officer (CISO) is a strategic role -- Importance of controls and governance practices -- Security technologies that support leapfrog companies -- Leapfrog companies invest in security -- Research predictions -- Conclusion</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080557515</subfield>
      <subfield code="a">Cibernética</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080569815</subfield>
      <subfield code="a">Organizaciones</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080605674</subfield>
      <subfield code="a">Desarrollo tecnológico</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20100037522</subfield>
      <subfield code="a">Medios digitales</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603700</subfield>
      <subfield code="a">Seguridad de sistemas</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080436353</subfield>
      <subfield code="a">Accenture</subfield>
    </datafield>
  </record>
</collection>