Búsqueda

The Cybersecurity guide for leaders in today's digital world

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20200001874</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20200123164030.0</controlfield>
    <controlfield tag="008">200122s2019    che||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">eng</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">861</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="4">
      <subfield code="a">The Cybersecurity guide for leaders in today's digital world</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">Geneva</subfield>
      <subfield code="b">World Economic Forum </subfield>
      <subfield code="c">Octubre 2019</subfield>
    </datafield>
    <datafield tag="490" ind1="0" ind2=" ">
      <subfield code="a">En plataforma: Shaping the Future of Cybersecurity and Digital Trust</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Tenet 1: Think Like a Business Leader -- Tenet 2: Foster Internal and External Partnerships -- Tenet 3: Build and Practice Strong Cyber Hygiene -- Tenet 4: Protect Access to Mission-Critical Assets -- Tenet 5: Protect Your Email Domain Against Phishing -- Tenet 6: Apply a Zero-Trust Approach to Securing Your Supply Chain -- Tenet 7: Prevent, Monitor and Respond to Cyber Threats -- Tenet 8: Develop and Practice a Comprehensive Crisis Management Plan -- Tenet 9: Build a Robust Disaster Recovery Plan for Cyberattacks -- Tenet 10: Create a Culture of Cybersecurity</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080546991</subfield>
      <subfield code="a">Empresas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20190005876</subfield>
      <subfield code="a">Industria digital</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160007633</subfield>
      <subfield code="a">Ciberriesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080614171</subfield>
      <subfield code="a">Gestión de la prevención</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080598099</subfield>
      <subfield code="a">Planes de emergencia</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080444150</subfield>
      <subfield code="a">World Economic Forum</subfield>
    </datafield>
  </record>
</collection>