Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Kumar, Ashish (Data scientist), author.

Title Managing risks in digital transformation : navigate the modern landscape of digital threats with the help of real-world examples and use cases / Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith. [O'Reilly electronic resources]

Edition 1st edition.
Publication Info. Birmingham, UK : Packt Publishing Ltd., 2023.
QR Code
Description 1 online resource (242 pages) : illustrations
Note Includes index.
Summary With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.
Contents Cover -- Title Page -- Copyright and Credit -- Dedicated -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Invisible Digitization Tsunami -- Chapter 1: Invisible Digitization Tsunami -- Digital transformation -- An invisible hand -- Summary -- Chapter 2: Going Digital -- Hello Alexa, Siri, Google, Cortana, and more -- The role of digital calendars -- Digital and physical socialization -- Cameras everywhere -- Digital wearables -- oh, my heart -- Advanced features in wearables -- What is real? -- Summary -- Chapter 3: Visible and Invisible Risks -- Risks in digital life
Visible risks -- Invisible risks -- When does risk become visible? -- Hit by password phishing -- Use of your credit cards -- Ransomware -- Invading privacy and extortion/phone spying -- Summary -- Chapter 4: Remote Working and the Element of Trust -- Remote working -- not new for everyone -- Pandemic and remote working -- View of remote working for various industries -- Risks to organizations -- Summary -- Chapter 5: The Emergence of Zero Trust and Risk Equation -- Zero Trust in real life -- Zero Trust is a new digital transformation -- Lesson learned from a global pandemic
Modern principles of Zero Trust -- The NIST approach to Zero Trust architecture -- The Sunburst attack example -- Zero Trust across the digital estate -- Example of controlling access with intelligent policies and continuous risk assessment -- Zero Trust makes compliance easier -- Isolation -- Monitoring and visibility -- Summary -- Part 2: Risk Redefined at Work -- Chapter 6: The Human Risk at the Workplace -- Innocent intent -- Start of day -- During the day -- Wrapping up -- A quick relook at the risks -- Good worker -- Start of the day -- During the day -- Wrapping up -- Self-obsessed
Rebel intent -- Malicious intent -- Summary -- Chapter 7: Modern Collaboration and Risk Amplification -- Evolving to the new workspace, where the flow of information is versatile -- Versatile collaboration -- some questions -- Challenges of a hybrid setup -- Future devices and their risk profile -- Polarization of opinions and its possible impact on modern collaboration -- Summary -- Chapter 8: Insider Risk and Impact -- Case study -- insider risk at Roposo Ltd -- Context -- Actor and the plot -- The crime -- The aftermath -- The lessons -- Understanding the impact of insider risk
Primary costs of insider risk -- A summarized view of the impact of insider risk -- Summary -- Chapter 9: Real Examples and Scenarios -- Insider risk -- definition and threat vectors -- Insider risk -- behaviors and technical trends to look out for -- Behavioral indicators -- Technical indicators -- Using the MITRE ATT&CK framework to detect insider threat and behavior -- Case study 1 -- exploits in the life sciences sector -- Solution and outcome -- Case study 2 -- a victim of a phishing attack -- Solution and outcome -- Case study 3 -- working from home -- Solution and outcome
Case study 4 -- AT&T
Subject Computer security.
Sécurité informatique.
Computer security
Added Author Kumar, Shashank, author.
Kudrati, Abbas, author.
Smith, Sarah Armstrong- writer of foreword.
Other Form: Print version: Kumar, Ashish Managing Risks in Digital Transformation Birmingham : Packt Publishing, Limited,c2023
ISBN 9781803234144
1803234148
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information