Búsqueda

Key considerations for cyberrisk coverage

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20170036203</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20171220173911.0</controlfield>
    <controlfield tag="008">171110e20171002esp|||p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">328.3</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20080661267</subfield>
      <subfield code="a">Gold, Joshua</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Key considerations for cyberrisk coverage</subfield>
      <subfield code="c">Joshua Gold</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">2 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Cover time-element losses -- Seak favorable retroactive dates -- Avoid cibersecurity reasonableness clauses -- Remember that cyber  breaches happen off-line too - Cover cloud and this party vendors -- Be prepared for the envolving risk</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20170003779</subfield>
      <subfield code="a">Seguro de ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080586546</subfield>
      <subfield code="a">Nuevas tecnologías</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140010615</subfield>
      <subfield code="a">Evolución tecnológica</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587628</subfield>
      <subfield code="a">Riesgo tecnológico</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000291</subfield>
      <subfield code="t">Risk Management Magazine</subfield>
      <subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
      <subfield code="x">0035-5593</subfield>
      <subfield code="g">02/10/2017 Volumen 64 Número 9 - octubre 2017 , p. 12-13</subfield>
    </datafield>
  </record>
</collection>