Pesquisa de referências

Rethink the security & risk strategy : why leaders must embrace modern cybersecurity practices

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Rethink the security & risk strategy</title>
<subTitle>: why leaders must embrace modern cybersecurity practices</subTitle>
</titleInfo>
<name type="personal" usage="primary" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20200017721">
<namePart>Scholtz, Tom </namePart>
<nameIdentifier>MAPA20200017721</nameIdentifier>
</name>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140007646">
<namePart>Gartner</namePart>
<nameIdentifier>MAPA20140007646</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">deu</placeTerm>
</place>
<issuance>monographic</issuance>
<place>
<placeTerm type="text">London</placeTerm>
</place>
<publisher>Gartner</publisher>
<dateIssued>2020</dateIssued>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
<extent>18 p.</extent>
</physicalDescription>
<abstract displayLabel="Summary">Security professionals often focus on the threats and breaches that dominate the headlines  Equifax, Marriott International, Aadhaar  and not necessarily on those most critical to the organization. A perfect example is when security teams hold back on cloud initiatives because of unsubstantiated cloud security worries. This exaggerated fear can result in lost opportunity and inappropriate spending. These high-profile stories are full of doom-and-gloom scenarios. Yet, zero-day vulnerabilities accounted for approximately 0.4% of incidents in the past decade. The amount spent on trying to detect them is out of balance with the actual risks they pose.</abstract>
<note type="statement of responsibility">edited by Tom Scholtz</note>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140022700">
<topic>Ciberseguridad</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080587628">
<topic>Riesgo tecnológico</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20160007633">
<topic>Ciberriesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140023066">
<topic>Ciberataques</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080592875">
<topic>Protección de datos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20170014157">
<topic>Tecnología en la nube</topic>
</subject>
<classification authority="">861</classification>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">160721</recordCreationDate>
<recordChangeDate encoding="iso8601">20220911210438.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20200026198</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>