Search

Holding firm : the state of cyber resilience in banking and capital markets

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20200025405</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20200727120343.0</controlfield>
    <controlfield tag="008">120320s2020    gbr||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">861</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20200017202</subfield>
      <subfield code="a">Thompson, Chris </subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="4">
      <subfield code="a">Holding firm</subfield>
      <subfield code="b">: the state of cyber resilience in banking and capital markets</subfield>
      <subfield code="c">Chris Thompson, Valerie Abend, Andrea Agosti</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">London</subfield>
      <subfield code="b">Accenture</subfield>
      <subfield code="c">2020</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">21 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">On average, cybersecurity programs actively protect only about 60 percent of an organization's business ecosystem. This is particularly difficult to address as companies are increasingly relying on a remote workforce. It is challenging to monitor such a workforceespecially one located across multiple companiesto check that everyone is compliant in terms of things like encrypting Wi-Fi, changing passwords regularly and staying vigilant about phishing attacks and other threats.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140016556</subfield>
      <subfield code="a">Resiliencia</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080588083</subfield>
      <subfield code="a">Sistemas bancarios</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080623517</subfield>
      <subfield code="a">Protección de la información</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20200017219</subfield>
      <subfield code="a">Abend, Valerie </subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20200017226</subfield>
      <subfield code="a">Agosti, Andrea </subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080436353</subfield>
      <subfield code="a">Accenture</subfield>
    </datafield>
  </record>
</collection>