Managing Risks in Digital Transformation: Navigate the modern landscape of digital threats with the help of real-world examples and use cases
- Length: 242 pages
- Edition: 1
- Language: English
- Publisher: Packt Publishing
- Publication Date: 2023-04-14
- ISBN-10: 1803246510
- ISBN-13: 9781803246512
- Sales Rank: #0 (See Top 100 Books)
Secure your business in a post-pandemic world: Master digital risk identification and defense
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
- Become well-versed with sophisticated system-level security risks and the zero-trust framework
- Learn about remote working risks, modern collaboration, and securing the digital data estate
- Keep up with rapidly evolving compliances and regulations and their impact on cyber risks
Book Description
With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization’s reputation and balance sheet.
This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you’ll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you’ll explore various types of AI-powered machines and be ready to make your business future-proof.
In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.
What you will learn
- Become aware of and adopt the right approach to modern digital transformation
- Explore digital risks across companies of all sizes
- Study real-world cases that focus on post-pandemic digital transformation
- Understand insider threats and how to mitigate vulnerability exploitation
- Get to know how cyberwarfare targets infrastructure and disrupts critical systems
- Discover how implementing a regulatory framework can safeguard you in the current and future data landscapes
Who this book is for
This book is for three categories of readers—those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.
Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.
Cover Title Page Copyright and Credit Dedicated Foreword Contributors Table of Contents Preface Part 1: Invisible Digitization Tsunami Chapter 1: Invisible Digitization Tsunami Digital transformation An invisible hand Summary Chapter 2: Going Digital Hello Alexa, Siri, Google, Cortana, and more The role of digital calendars Digital and physical socialization Cameras everywhere Digital wearables – oh, my heart Advanced features in wearables What is real? Summary Chapter 3: Visible and Invisible Risks Risks in digital life Visible risks Invisible risks When does risk become visible? Hit by password phishing Use of your credit cards Ransomware Invading privacy and extortion/phone spying Summary Chapter 4: Remote Working and the Element of Trust Remote working – not new for everyone Pandemic and remote working View of remote working for various industries Risks to organizations Summary Chapter 5: The Emergence of Zero Trust and Risk Equation Zero Trust in real life Zero Trust is a new digital transformation Lesson learned from a global pandemic Modern principles of Zero Trust The NIST approach to Zero Trust architecture The Sunburst attack example Zero Trust across the digital estate Example of controlling access with intelligent policies and continuous risk assessment Zero Trust makes compliance easier Isolation Monitoring and visibility Summary Part 2: Risk Redefined at Work Chapter 6: The Human Risk at the Workplace Innocent intent Start of day During the day Wrapping up A quick relook at the risks Good worker Start of the day During the day Wrapping up Self-obsessed Rebel intent Malicious intent Summary Chapter 7: Modern Collaboration and Risk Amplification Evolving to the new workspace, where the flow of information is versatile Versatile collaboration – some questions Challenges of a hybrid setup Future devices and their risk profile Polarization of opinions and its possible impact on modern collaboration Summary Chapter 8: Insider Risk and Impact Case study – insider risk at Roposo Ltd Context Actor and the plot The crime The aftermath The lessons Understanding the impact of insider risk Primary costs of insider risk A summarized view of the impact of insider risk Summary Chapter 9: Real Examples and Scenarios Insider risk – definition and threat vectors Insider risk – behaviors and technical trends to look out for Behavioral indicators Technical indicators Using the MITRE ATT&CK framework to detect insider threat and behavior Case study 1 – exploits in the life sciences sector Solution and outcome Case study 2 – a victim of a phishing attack Solution and outcome Case study 3 – working from home Solution and outcome Case study 4 – AT&T Solution and outcomes The cost of insider threats Summary Chapter 10: Cyberwarfare Is everything fair in love and war? War and its actors Advanced persistent threats The Colonial Pipeline attack The Shamoon virus Stuxnet Operation Desert Storm Impact of cyberwarfare Summary Chapter 11: An Introduction to Regulatory Risks Regulatory risks – an introduction Digitization and the expansion of the regulatory risk landscape across sectors Speed Scale Interdependence A framework to understand modern regulatory risks for all businesses Summary Chapter 12: The Evolution of Risk and Compliance Management What is risk? Origins and evolution of risk management From risk to compliance management via increased digitization A timeline of the top events that made regulators take notice A timeline of the top regulatory responses to financial and digital risks for stakeholders The various phases of compliance management and how COVID might impact the future Phase 1 – GRC in the early 2000s Phase 2 – integrating GRC with the overall enterprise risk landscape Phase 3 – compliance management – an agile, modern way of managing What changed with COVID? Summary Chapter 13: The Role of Data and Privacy in Risk Management Understanding data explosion Understanding the enterprise and institutional data landscape What is the top priority for governments and regulators? What should be the top priority for businesses? Summary Part 3: The Future Chapter 14: Remote Work and the Virtual Workforce Will remote working be a permanent change? Scope of our work Work tools How we work Do I have to work alone when working remotely? Summary Chapter 15: Automation and Virtual Humans Automation in this digital age The maturity of chatbots Digital humans Digital humanoids Summary Chapter 16: The Role of AI in Managing Future Lockdowns Input and output devices of the future Digital assistants – at home My digital assistants – for travel Digital assistants – at work Family time and social life Education and study time Healthcare What will humans do? What is digital shutdown? The role of ethics in AI Summary Further reading Index Other Books You May Enjoy
Donate to keep this site alive
How to download source code?
1. Go to: https://github.com/PacktPublishing
2. In the Find a repository… box, search the book title: Managing Risks in Digital Transformation: Navigate the modern landscape of digital threats with the help of real-world examples and use cases
, sometime you may not get the results, please search the main title.
3. Click the book title in the search results.
3. Click Code to download.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.