Búsqueda

Cyber Insurance : Key part of a cyber risk. Management program

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20170034278</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20171030101611.0</controlfield>
    <controlfield tag="008">171024s20170423esp||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">219</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20170013815</subfield>
      <subfield code="a">Selby, Judy</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="0">
      <subfield code="a">Cyber Insurance</subfield>
      <subfield code="b">: Key part of a cyber risk. Management program</subfield>
      <subfield code="c">Judy Selby</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">7 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Today's cyber risks come in all shapes and sizes, from disclosure of protected information due to hacking or employee negligence through network shutdown or impairment, regulatory violations, and everything in between. Consequently, modern enterprises are becoming painfully aware that 100% cybersecurity is an impossibility. Instead of focusing exclusively on building cyber defenses, smart companies are taking an enterprise approach to managing cyber risks, which includes development of a cybersecurity program that places attention on a number of issues, including network security, employee training and third party risk.Even then, however, some cyber risks will remain.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080586294</subfield>
      <subfield code="a">Mercado de seguros</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080546991</subfield>
      <subfield code="a">Empresas</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20170003960</subfield>
      <subfield code="a">Linkedin</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="t">Linkedin</subfield>
      <subfield code="g">Avril 23, 2017</subfield>
    </datafield>
  </record>
</collection>