Búsqueda

The Cost of cybercrime : unlocking the value of improved cybersecurity protection

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<nonSort xml:space="preserve">The  </nonSort>
<title>Cost of cybercrime</title>
<subTitle>: unlocking the value of improved cybersecurity protection</subTitle>
</titleInfo>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080436353">
<namePart>Accenture</namePart>
<nameIdentifier>MAPA20080436353</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">usa</placeTerm>
</place>
<issuance>monographic</issuance>
<place>
<placeTerm type="text">S. l.]</placeTerm>
</place>
<publisher>Accenture</publisher>
<dateIssued>2019</dateIssued>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
</physicalDescription>
<abstract displayLabel="Summary">Companies need to move their cyber security efforts away from traditional defensive approaches toward a proactive stance aligned with the organization¿s business objectives.Despite all the effort and resources that organizations invest in traditional information security approaches, many still fall prey to cyber threats, or find they are unprepared to deal with rapidly blurring enterprise boundaries. </abstract>
<note type="statement of responsibility">Accenture</note>
<note>Ninth annual cost of cybercrime study
</note>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080603724">
<topic>Seguridad empresarial</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080578053">
<topic>Seguridad activa</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140022700">
<topic>Ciberseguridad</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20160007633">
<topic>Ciberriesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080587628">
<topic>Riesgo tecnológico</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080591182">
<topic>Gerencia de riesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140023066">
<topic>Ciberataques</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080622251">
<topic>Seguridad de la información</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080623791">
<topic>Tecnología de la información</topic>
</subject>
<classification authority="">7</classification>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">160912</recordCreationDate>
<recordChangeDate encoding="iso8601">20200703131252.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20190028363</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>