Managing Risks in Digital Transformation
Packt Publishing Limited (Verlag)
978-1-80324-651-2 (ISBN)
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
Become well-versed with sophisticated system-level security risks and the zero-trust framework
Learn about remote working risks, modern collaboration, and securing the digital data estate
Keep up with rapidly evolving compliances and regulations and their impact on cyber risks
Book DescriptionWith the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization’s reputation and balance sheet.
This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you’ll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you’ll explore various types of AI-powered machines and be ready to make your business future-proof.
In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.What you will learn
Become aware of and adopt the right approach to modern digital transformation
Explore digital risks across companies of all sizes
Study real-world cases that focus on post-pandemic digital transformation
Understand insider threats and how to mitigate vulnerability exploitation
Get to know how cyberwarfare targets infrastructure and disrupts critical systems
Discover how implementing a regulatory framework can safeguard you in the current and future data landscapes
Who this book is forThis book is for three categories of readers—those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.
Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.
Ashish Kumar is on a mission to make this planet safer for digital transformation. Ashish leads Microsoft security engineering teams in learning about customers, partners, and market priorities on cybersecurity. He works with various universities, government, and large enterprises to help them build a secure digital posture and go deeper into digital transformation impacting every person on the planet. An Enthusiastic self-starter, goal-driven achiever, and motivated team player with a creative and progressive attitude is on a journey to share his experiences with you. Shashank Kumar, a cybersecurity practitioner and long time regulatory risk enthusiast, is a Principal Product Manager for Microsoft Purview Compliance products. He works closely with some of the world’s largest corporations to understand their current and future cybersecurity risks and help solve them through new features or products from Microsoft Data Security Product-group. Abbas Kudrati, a long-time cybersecurity practitioner and CISO, is Microsoft Asia’s Chief Cybersecurity Advisor. In addition to his work at Microsoft, he serves as an executive advisor to Deakin University, HITRUST, EC Council, and several security and technology start-ups. He supports the broader security community through his work with ISACA Chapters and student mentorship. He is the Technical Editor of various books and the bestselling author of books such as, "Threat Hunting in the Cloud" and "Zero Trust and Journey Across the Digital Estate". He is also a part-time Professor of Practice with LaTrobe University and a keynote speaker on Zero-Trust, Cybersecurity, Cloud Security, Governance, Risk, and Compliance.
Table of Contents
Invisible Digitization Tsunami
Going Digital
Visible and Invisible Risks
Remote Working and the Element of Trust
The Emergence of Zero Trust and Risk Equation
The Human Risk at Work
Modern Collaboration and Risk Amplification
Insider Risk and Impact
Real Examples and Scenarios
Cyberwarfare
An Introduction to Regulatory Risks
The Evolution of Risk and Compliance Management
The Role of Data and Privacy in Risk Management
Remote work and Virtual Workforce
Automation and Virtual Humans
The Role of AI in Managing Future Lockdowns
Erscheinungsdatum | 28.04.2023 |
---|---|
Vorwort | Sarah Armstrong- Smith |
Verlagsort | Birmingham |
Sprache | englisch |
Maße | 191 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 1-80324-651-0 / 1803246510 |
ISBN-13 | 978-1-80324-651-2 / 9781803246512 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich