Strategies for managing cybersecurity risk (Registro nro. 5632)

000 -LEADER
fixed length control field 01526nam a2200301 c 4500
001 - CONTROL NUMBER
control field 00005632
003 - CONTROL NUMBER IDENTIFIER
control field ES-MaONT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210929062558.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200130s2020 xxua|||f t 0| u|eng u
024 ## - OTHER STANDARD IDENTIFIER
Additional codes following the standard number or code .
040 ## - CATALOGING SOURCE
Original cataloging agency ES-MaONT
245 00 - TITLE STATEMENT
Title Strategies for managing cybersecurity risk
Remainder of title : assess and advance your security and compliance posture
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. NY :
Name of publisher, distributor, etc. IBM Global Services,
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent 7 p. :
Other physical details il. ;
Dimensions 1 documento PDF
336 ## - CONTENT TYPE
Content type term texto (visual)
Source isbdcontent
337 ## - MEDIA TYPE
Media type term electrónico
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term recurso en línea
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Data breaches, ransomware attacks, privacy failures and other cybersecurity challenges are on everyone’s radar screen, yet most businesses still struggle with effectively preparing for them. Many organizations lack a clear and aligned security strategy, have limited insight into their cybersecurity maturity and insufficiently practice their plans for responding to a cybersecurity incident — if they have an incident response plan at all. You could say that most organizations’ approach to risk management is, in fact, pretty risky
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ciberseguridad y confianza
9 (RLIN) 2188
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ransomware attacks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term governance
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ciber range
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term technology
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term risk
710 ## - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IBM Corporation
9 (RLIN) 3929
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.ibm.com/security/digital-assets/strategy-risk-management-ebook/pdfs/Strategy_Risk_Management_EB.pdf">https://www.ibm.com/security/digital-assets/strategy-risk-management-ebook/pdfs/Strategy_Risk_Management_EB.pdf</a>
Link text Acceso al documento
Nonpublic note Abierto
Electronic format type pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Informes
Source of classification or shelving scheme
Existencias
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
        Acceso libre online Colección digital CDO CDO   30/01/2020   1000020175908 30/01/2020 30/01/2020 Informes pdf
Copyright© ONTSI. Todos los derechos reservados.
x
Esta web está utilizando la política de Cookies de la entidad pública empresarial Red.es, M.P. se detalla en el siguiente enlace: aviso-cookies. Acepto