Managing Risks in Digital Transformation 1st Edition Ashish Kumar – Ebook Instant Download/Delivery ISBN(s): 9781803234144, 1803234148
Product details:
- ISBN 10: 1803234148
- ISBN 13: 9781803234144
- Author: Ashish Kumar
Managing Risks in Digital Transformation
Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Secure your business in a post-pandemic world: Master digital risk identification and defense
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
- Become well-versed with sophisticated system-level security risks and the zero-trust framework
- Learn about remote working risks, modern collaboration, and securing the digital data estate
- Keep up with rapidly evolving compliances and regulations and their impact on cyber risks
Book Description
With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization’s reputation and balance sheet.
This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you’ll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart
Table contents:
Part 1: Invisible Digitization Tsunami
Chapter 1: Invisible Digitization Tsunami
Digital transformation
An invisible hand
Summary
Chapter 2: Going Digital
Hello Alexa, Siri, Google, Cortana, and more
The role of digital calendars
Digital and physical socialization
Cameras everywhere
Digital wearables – oh, my heart
Advanced features in wearables
What is real?
Summary
Chapter 3: Visible and Invisible Risks
Risks in digital life
Visible risks
Invisible risks
When does risk become visible?
Hit by password phishing
Use of your credit cards
Ransomware
Invading privacy and extortion/phone spying
Summary
Chapter 4: Remote Working and the Element of Trust
Remote working – not new for everyone
Pandemic and remote working
View of remote working for various industries
Risks to organizations
Summary
Chapter 5: The Emergence of Zero Trust and Risk Equation
Zero Trust in real life
Zero Trust is a new digital transformation
Lesson learned from a global pandemic
Modern principles of Zero Trust
The NIST approach to Zero Trust architecture
The Sunburst attack example
Zero Trust across the digital estate
Example of controlling access with intelligent policies and continuous risk assessment
Zero Trust makes compliance easier
Isolation
Monitoring and visibility
Summary
Part 2: Risk Redefined at Work
Chapter 6: The Human Risk at the Workplace
Innocent intent
Start of day
During the day
Wrapping up
A quick relook at the risks
Good worker
Start of the day
During the day
Wrapping up
Self-obsessed
Rebel intent
Malicious intent
Summary
Chapter 7: Modern Collaboration and Risk Amplification
Evolving to the new workspace, where the flow of information is versatile
Versatile collaboration – some questions
Challenges of a hybrid setup
Future devices and their risk profile
Polarization of opinions and its possible impact on modern collaboration
Summary
Chapter 8: Insider Risk and Impact
Case study – insider risk at Roposo Ltd
Context
Actor and the plot
The crime
The aftermath
The lessons
Understanding the impact of insider risk
Primary costs of insider risk
A summarized view of the impact of insider risk
Summary
Chapter 9: Real Examples and Scenarios
Insider risk – definition and threat vectors
Insider risk – behaviors and technical trends to look
out for
Behavioral indicators
Technical indicators
Using the MITRE ATT&CK framework to detect insider threat and behavior
Case study 1 – exploits in the life sciences sector
Solution and outcome
Case study 2 – a victim of a phishing attack
Solution and outcome
Case study 3 – working from home
Solution and outcome
Case study 4 – AT&T
Solution and outcomes
The cost of insider threats
Summary
Chapter 10: Cyberwarfare
Is everything fair in love and war?
War and its actors
Advanced persistent threats
The Colonial Pipeline attack
The Shamoon virus
Stuxnet
Operation Desert Storm
Impact of cyberwarfare
Summary
Chapter 11: An Introduction to Regulatory Risks
Regulatory risks – an introduction
Digitization and the expansion of the regulatory risk landscape across sectors
Speed
Scale
Interdependence
A framework to understand modern regulatory risks for all businesses
Summary
Chapter 12: The Evolution of Risk and Compliance Management
What is risk?
Origins and evolution of risk management
From risk to compliance management via increased digitization
A timeline of the top events that made regulators take notice
A timeline of the top regulatory responses to financial and digital risks for stakeholders
The various phases of compliance management and how COVID might impact the future
Phase 1 – GRC in the early 2000s
Phase 2 – integrating GRC with the overall enterprise risk landscape
Phase 3 – compliance management – an agile, modern way of managing
What changed with COVID?
Summary
Chapter 13: The Role of Data and Privacy in Risk Management
Understanding data explosion
Understanding the enterprise and institutional data landscape
What is the top priority for governments and regulators?
What should be the top priority for businesses?
Summary
Part 3: The Future
Chapter 14: Remote Work and the Virtual Workforce
Will remote working be a permanent change?
Scope of our work
Work tools
How we work
Do I have to work alone when working remotely?
Summary
Chapter 15: Automation and Virtual Humans
Automation in this digital age
The maturity of chatbots
Digital humans
Digital humanoids
Summary
Chapter 16: The Role of AI in Managing Future Lockdowns
Input and output devices of the future
Digital assistants – at home
My digital assistants – for travel
Digital assistants – at work
Family time and social life
Education and study time
Healthcare
What will humans do?
What is digital shutdown?
The role of ethics in AI
Summary
People also search:
managing risks in digital transformation
digital transformation risks
managing digital transformation
digital transformation risk management
digitalization risks