Búsqueda

The Rising strategic risks of cyberattacks

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a22000004b 4500</leader>
    <controlfield tag="001">MAP20140016280</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20140514163928.0</controlfield>
    <controlfield tag="008">140514e20140501usa|||p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20140008445</subfield>
      <subfield code="a">Bailey,Tucker</subfield>
    </datafield>
    <datafield tag="245" ind1="0" ind2="4">
      <subfield code="a">The Rising strategic risks of cyberattacks</subfield>
      <subfield code="c">Tucker Bailey, Andrea Del Miglio, and Wolf Richter</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Research McKinsey conducted in partnership with the World Economic Forum suggests that companies are struggling with their capabilities in cyberrisk management. As highly visible breaches occur with growing regularity, most technology executives believe that they are losing ground to attackers. Organizations large and small lack the facts to make effective decisions, and traditional protect the perimeter technology strategies are proving insufficient </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587581</subfield>
      <subfield code="a">Riesgo informático</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080571009</subfield>
      <subfield code="a">Vulnerabilidad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080588434</subfield>
      <subfield code="a">Toma de decisiones</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20140008452</subfield>
      <subfield code="a">Miglio, Andrea del</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20140008469</subfield>
      <subfield code="a">Richter, Wolf</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080442569</subfield>
      <subfield code="a">McKinsey & Company</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="t">The McKinsey Quartely</subfield>
      <subfield code="g">May 2014 ; 6 p.</subfield>
    </datafield>
  </record>
</collection>