Search

Mapping a path to cyber attribution consensus

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Carter, Rachel Anne </dc:creator>
<dc:creator>Enoizi, Julian</dc:creator>
<dc:creator>Embedded Finance & Super App Strategies</dc:creator>
<dc:creator>The International Forum of Terrorism Risk (Re)Insurance Pools</dc:creator>
<dc:date>2021-03-01</dc:date>
<dc:description xml:lang="es">Sumario: The rapid pace of digital transformation, accelerated by COVID-19, is driving increased demand for cyber risk protection. There are a number of ways in which cyber risk protection can be achieved which include a high level of cyber hygiene, implementing and investing in standards for cyber security, not merely in terms of initial security measures but also a strategy for maintaining and upgrading security. Insurance is one mechanism, which focuses on the economic protection of a business if it experiences a cyberattack. Even though insuring cyber risk is challenging, not least due to the potential for large accumulations of loss, insurance as part of a broader security strategy can reduce overall losses. It can encourage behaviour that promotes the robustness of online systems and incentivises good cyber hygiene. </dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/175252.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:publisher>The Geneva Association</dc:publisher>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Ciberataques</dc:subject>
<dc:subject xml:lang="es">Cibernética</dc:subject>
<dc:subject xml:lang="es">Ciberseguridad</dc:subject>
<dc:subject xml:lang="es">Reaseguro</dc:subject>
<dc:subject xml:lang="es">Ciberriesgos</dc:subject>
<dc:type xml:lang="es">Books</dc:type>
<dc:title xml:lang="es">Mapping a path to cyber attribution consensus</dc:title>
<dc:format xml:lang="es">36 p.</dc:format>
</rdf:Description>
</rdf:RDF>