Cyber terror and cyber risk : what you need to know.
(eVideo)
Contributors
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Format
eVideo
Language
English
Notes
General Note
Title from title frames.
Date/Time and Place of Event
Originally produced by SmartPros in 2012.
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals. Learning objectives: Explain cybersecurity risks. Describe the objectives of cyber attacks. Comply with the SEC's cyber risk guidance. Manage third-party breaches.
System Details
Mode of access: World Wide Web.
Citations
APA Citation, 7th Edition (style guide)
(2014). Cyber terror and cyber risk: what you need to know . Kanopy Streaming.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)2014. Cyber Terror and Cyber Risk: What You Need to Know. Kanopy Streaming.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Cyber Terror and Cyber Risk: What You Need to Know Kanopy Streaming, 2014.
MLA Citation, 9th Edition (style guide)Cyber Terror and Cyber Risk: What You Need to Know Kanopy Streaming, 2014.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
a705b51b-109f-61d1-c082-5e4b697b7b02-eng
Grouping Information
Grouped Work ID | a705b51b-109f-61d1-c082-5e4b697b7b02-eng |
---|---|
Full title | cyber terror and cyber risk what you need to know |
Author | kanopy |
Grouping Category | movie |
Last Update | 2022-09-27 11:40:52AM |
Last Indexed | 2024-04-20 04:40:30AM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | Aug 17, 2023 |
Last Used | Aug 17, 2023 |
Marc Record
First Detected | Sep 01, 2022 02:28:36 PM |
---|---|
Last File Modification Time | Sep 27, 2022 11:42:30 AM |
MARC Record
LEADER | 01975ngm a22003851i 4500 | ||
---|---|---|---|
001 | kan1089887 | ||
003 | CaSfKAN | ||
005 | 20140204133419.0 | ||
006 | m o c | ||
007 | vz uzazuu | ||
007 | cr una---unuuu | ||
008 | 140807p20142012cau033 o vleng d | ||
028 | 5 | 2 | |a 1089887|b Kanopy |
035 | |a (OCoLC)897770050 | ||
040 | |a UtOrBLW|b eng|e rda|c UtOrBLW | ||
245 | 0 | 0 | |a Cyber terror and cyber risk :|b what you need to know. |
264 | 1 | |a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2014. | |
300 | |a 1 online resource (1 video file, approximately 33 min.) :|b digital, .flv file, sound | ||
336 | |a two-dimensional moving image|2 rdacontent | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
344 | |a digital | ||
347 | |a video file|b MPEG-4|b Flash | ||
500 | |a Title from title frames. | ||
518 | |a Originally produced by SmartPros in 2012. | ||
520 | |a By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals. Learning objectives: Explain cybersecurity risks. Describe the objectives of cyber attacks. Comply with the SEC's cyber risk guidance. Manage third-party breaches. | ||
538 | |a Mode of access: World Wide Web. | ||
650 | 0 | |a Business enterprises|x Computer networks|x Security measures. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Economics. | |
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Computer crimes. | |
710 | 2 | |a Kanopy (Firm) | |
856 | 4 | 0 | |u https://marshalllyon.kanopy.com/node/89888|z A Kanopy streaming video |
856 | 4 | 2 | |z Cover Image|u https://www.kanopy.com/node/89888/external-image |