000 01526nam a2200301 c 4500
999 _c5632
_d5632
001 00005632
003 ES-MaONT
005 20210929062558.0
008 200130s2020 xxua|||f t 0| u|eng u
024 _d.
040 _aES-MaONT
245 0 0 _aStrategies for managing cybersecurity risk
_b: assess and advance your security and compliance posture
260 _aNY :
_bIBM Global Services,
_c2020
300 _a7 p. :
_bil. ;
_c1 documento PDF
336 _atexto (visual)
_2isbdcontent
337 _aelectrónico
_2isbdmedia
338 _arecurso en línea
_2rdacarrier
520 _aData breaches, ransomware attacks, privacy failures and other cybersecurity challenges are on everyone’s radar screen, yet most businesses still struggle with effectively preparing for them. Many organizations lack a clear and aligned security strategy, have limited insight into their cybersecurity maturity and insufficiently practice their plans for responding to a cybersecurity incident — if they have an incident response plan at all. You could say that most organizations’ approach to risk management is, in fact, pretty risky
650 0 _aCiberseguridad y confianza
_92188
653 _aransomware attacks
653 _agovernance
653 _aciber range
653 _atechnology
653 _arisk
710 _aIBM Corporation
_93929
856 _uhttps://www.ibm.com/security/digital-assets/strategy-risk-management-ebook/pdfs/Strategy_Risk_Management_EB.pdf
_yAcceso al documento
_x0
_qpdf
942 _cINF
_2z