Pesquisa de referências

MMC cyber handbook 2016 : increasing resilience in the digital economy

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>MMC cyber handbook 2016</title>
<subTitle>: increasing resilience in the digital economy</subTitle>
</titleInfo>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080449025">
<namePart>Marsh & McLennan Companies</namePart>
<nameIdentifier>MAPA20080449025</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">usa</placeTerm>
</place>
<issuance>monographic</issuance>
<place>
<placeTerm type="text">s.l.]</placeTerm>
</place>
<publisher>Marsh & McLennan</publisher>
<dateIssued>2016</dateIssued>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
</physicalDescription>
<abstract displayLabel="Summary">The evolving cyber risk landscape -- Cyber: everyoine is at risk -- Cyber threat is a shared issue -- Cyber terrorists and ransomware: interview with Shawn Henry -- Go to cyber extremes: what to do when digitalization goes wrong -- How Europe can fitht cyber attacks (and win) -- New data protection law -- Cyber risks by industry -- Quantifiying cyber risk: the core of effective risk management strategy -- Measuring cyber aggregation risk -- Evolving challenges in cyber risk  management: protecting assets and optimizing expenditures -- Can you put a dollar amount on your company's cyber risk? -- Why modeling is the holy grail of cyber insurance -- Cyber loss exposure :identification and development of underwriting information -- The insurance of things  and Industry 4.0 -- Staffing for cyber risk mitigation: the business challenge -- Don't ignore the insider cyber threat -- A strategic approach to cybersecurity operations -- Chief human resources officer : why your employees are your strongest  and weakest  link in your cyber defenses</abstract>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080591182">
<topic>Gerencia de riesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20160007633">
<topic>Ciberriesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080586546">
<topic>Nuevas tecnologías</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080588953">
<topic>Análisis de riesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080568641">
<topic>Digitalización</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080592875">
<topic>Protección de datos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20090026162">
<topic>Cuantificación del riesgo</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20180000454">
<topic>Industria 4.0</topic>
</subject>
<classification authority="">7</classification>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">161117</recordCreationDate>
<recordChangeDate encoding="iso8601">20220911192725.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20160034226</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>