Atnaujinkite slapukų nuostatas

El. knyga: Managing Risks in Digital Transformation: Navigate the modern landscape of digital threats with the help of real-world examples and use cases

  • Formatas: 242 pages
  • Išleidimo metai: 14-Apr-2023
  • Leidėjas: Packt Publishing Limited
  • ISBN-13: 9781803234144
Kitos knygos pagal šią temą:
  • Formatas: 242 pages
  • Išleidimo metai: 14-Apr-2023
  • Leidėjas: Packt Publishing Limited
  • ISBN-13: 9781803234144
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Secure your business in a post-pandemic world: Master digital risk identification and defense Purchase of the print or Kindle book includes a free PDF eBook

Key Features

Become well-versed with sophisticated system-level security risks and the zero-trust framework Learn about remote working risks, modern collaboration, and securing the digital data estate Keep up with rapidly evolving compliances and regulations and their impact on cyber risks

Book DescriptionWith the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organizations reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, youll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, youll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.What you will learn

Become aware of and adopt the right approach to modern digital transformation Explore digital risks across companies of all sizes Study real-world cases that focus on post-pandemic digital transformation Understand insider threats and how to mitigate vulnerability exploitation Get to know how cyberwarfare targets infrastructure and disrupts critical systems Discover how implementing a regulatory framework can safeguard you in the current and future data landscapes

Who this book is forThis book is for three categories of readersthose who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area. Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.
Table of Contents

Invisible Digitization Tsunami
Going Digital
Visible and Invisible Risks
Remote Working and the Element of Trust
The Emergence of Zero Trust and Risk Equation
The Human Risk at Work
Modern Collaboration and Risk Amplification
Insider Risk and Impact
Real Examples and Scenarios
Cyberwarfare
An Introduction to Regulatory Risks
The Evolution of Risk and Compliance Management
The Role of Data and Privacy in Risk Management
Remote work and Virtual Workforce
Automation and Virtual Humans
The Role of AI in Managing Future Lockdowns
Ashish Kumar is on a mission to make this planet safer for digital transformation. Ashish leads Microsoft security engineering teams in learning about customers, partners, and market priorities on cybersecurity. He works with various universities, government, and large enterprises to help them build a secure digital posture and go deeper into digital transformation impacting every person on the planet. An Enthusiastic self-starter, goal-driven achiever, and motivated team player with a creative and progressive attitude is on a journey to share his experiences with you. Shashank Kumar, a cybersecurity practitioner and long time regulatory risk enthusiast, is a Principal Product Manager for Microsoft Purview Compliance products. He works closely with some of the worlds largest corporations to understand their current and future cybersecurity risks and help solve them through new features or products from Microsoft Data Security Product-group. Abbas Kudrati, a long-time cybersecurity practitioner and CISO, is Microsoft Asias Chief Cybersecurity Advisor. In addition to his work at Microsoft, he serves as an executive advisor to Deakin University, HITRUST, EC Council, and several security and technology start-ups. He supports the broader security community through his work with ISACA Chapters and student mentorship. He is the Technical Editor of various books and the bestselling author of books such as, "Threat Hunting in the Cloud" and "Zero Trust and Journey Across the Digital Estate". He is also a part-time Professor of Practice with LaTrobe University and a keynote speaker on Zero-Trust, Cybersecurity, Cloud Security, Governance, Risk, and Compliance.