Cargando…

Managing risks in digital transformation : navigate the modern landscape of digital threats with the help of real-world examples and use cases /

With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Kumar, Ashish (Data scientist) (Autor), Kumar, Shashank (Autor), Kudrati, Abbas (Autor)
Otros Autores: Smith, Sarah Armstrong- (writer of foreword.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing Ltd., 2023.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1377287780
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 230425s2023 enka o 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d EBLCP  |d OCLCF  |d OCLCQ  |d IEEEE 
019 |a 1373983696 
020 |a 9781803234144 
020 |a 1803234148 
020 |z 9781803246512 
035 |a (OCoLC)1377287780  |z (OCoLC)1373983696 
037 |a 9781803246512  |b O'Reilly Media 
037 |a 10251135  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230425 
049 |a UAMI 
100 1 |a Kumar, Ashish  |c (Data scientist),  |e author. 
245 1 0 |a Managing risks in digital transformation :  |b navigate the modern landscape of digital threats with the help of real-world examples and use cases /  |c Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith. 
250 |a 1st edition. 
264 1 |a Birmingham, UK :  |b Packt Publishing Ltd.,  |c 2023. 
300 |a 1 online resource (242 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. 
505 0 |a Cover -- Title Page -- Copyright and Credit -- Dedicated -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Invisible Digitization Tsunami -- Chapter 1: Invisible Digitization Tsunami -- Digital transformation -- An invisible hand -- Summary -- Chapter 2: Going Digital -- Hello Alexa, Siri, Google, Cortana, and more -- The role of digital calendars -- Digital and physical socialization -- Cameras everywhere -- Digital wearables -- oh, my heart -- Advanced features in wearables -- What is real? -- Summary -- Chapter 3: Visible and Invisible Risks -- Risks in digital life 
505 8 |a Visible risks -- Invisible risks -- When does risk become visible? -- Hit by password phishing -- Use of your credit cards -- Ransomware -- Invading privacy and extortion/phone spying -- Summary -- Chapter 4: Remote Working and the Element of Trust -- Remote working -- not new for everyone -- Pandemic and remote working -- View of remote working for various industries -- Risks to organizations -- Summary -- Chapter 5: The Emergence of Zero Trust and Risk Equation -- Zero Trust in real life -- Zero Trust is a new digital transformation -- Lesson learned from a global pandemic 
505 8 |a Modern principles of Zero Trust -- The NIST approach to Zero Trust architecture -- The Sunburst attack example -- Zero Trust across the digital estate -- Example of controlling access with intelligent policies and continuous risk assessment -- Zero Trust makes compliance easier -- Isolation -- Monitoring and visibility -- Summary -- Part 2: Risk Redefined at Work -- Chapter 6: The Human Risk at the Workplace -- Innocent intent -- Start of day -- During the day -- Wrapping up -- A quick relook at the risks -- Good worker -- Start of the day -- During the day -- Wrapping up -- Self-obsessed 
505 8 |a Rebel intent -- Malicious intent -- Summary -- Chapter 7: Modern Collaboration and Risk Amplification -- Evolving to the new workspace, where the flow of information is versatile -- Versatile collaboration -- some questions -- Challenges of a hybrid setup -- Future devices and their risk profile -- Polarization of opinions and its possible impact on modern collaboration -- Summary -- Chapter 8: Insider Risk and Impact -- Case study -- insider risk at Roposo Ltd -- Context -- Actor and the plot -- The crime -- The aftermath -- The lessons -- Understanding the impact of insider risk 
505 8 |a Primary costs of insider risk -- A summarized view of the impact of insider risk -- Summary -- Chapter 9: Real Examples and Scenarios -- Insider risk -- definition and threat vectors -- Insider risk -- behaviors and technical trends to look out for -- Behavioral indicators -- Technical indicators -- Using the MITRE ATT&CK framework to detect insider threat and behavior -- Case study 1 -- exploits in the life sciences sector -- Solution and outcome -- Case study 2 -- a victim of a phishing attack -- Solution and outcome -- Case study 3 -- working from home -- Solution and outcome 
505 8 |a Case study 4 -- AT&T 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Kumar, Shashank,  |e author. 
700 1 |a Kudrati, Abbas,  |e author. 
700 1 |a Smith, Sarah Armstrong-  |e writer of foreword. 
776 0 8 |i Print version:  |a Kumar, Ashish  |t Managing Risks in Digital Transformation  |d Birmingham : Packt Publishing, Limited,c2023 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803246512/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30448971 
994 |a 92  |b IZTAP