Search

Cyber security 2016

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20160037937</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20161223140555.0</controlfield>
    <controlfield tag="008">161221e20161101gbr|||p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">328.3</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">Cyber security 2016</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Risk managers and commercial insurance buyers are purchasing more cyber insurance to cover this rapidly growing risk. They also are making more claims on that coverage, according to a survey by Business Insurance. In a May online survey of 239 risk managers or commercial insurance buyers, roughly half said they have increased investment in cyber security measures, yet most do not know which cyber security framework their organization uses. The same survey of 528 nonbuyers including 265 insurance brokers, 144 insurers and 119 service providersfound they also expect buyers to increase their cyber security investments, but nonbuyers estimate that less than half of their clients have implemented various measures to prevent and respond estimate that less than half of their clients have implemented various measures to prevent and respond to cyber incidents. This latest Business Insurance survey follows up on a similiar survey last year.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587628</subfield>
      <subfield code="a">Riesgo tecnológico</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140010615</subfield>
      <subfield code="a">Evolución tecnológica</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20100017982</subfield>
      <subfield code="a">Riesgos emergentes</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077002240</subfield>
      <subfield code="t">Business insurance</subfield>
      <subfield code="d">London : Crain Communications INC., 2006-</subfield>
      <subfield code="g">01/11/2016 Número 19 - noviembre 2016 , p. 17-19</subfield>
    </datafield>
  </record>
</collection>