Get Free Shipping on orders over $89
Managing Risks in Digital Transformation : Navigate the modern landscape of digital threats with the help of real-world examples and use cases - Ashish Kumar

Managing Risks in Digital Transformation

Navigate the modern landscape of digital threats with the help of real-world examples and use cases

By: Ashish Kumar

eText | 14 April 2023 | Edition Number 1

At a Glance

eText


$45.09

or 4 interest-free payments of $11.27 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Master the art of identifying digital, regulatory, and insider risks, how attack occurs, and their impact on businesses and the IT industry in the post-pandemic world using a modern approach.

Key Features

  • Get well-versed with sophisticated system-level security risks and the zero-trust framework
  • Understand remote working risks, modern collaboration, and securing the digital data estate
  • Keep up with rapidly evolving compliances and regulations and their impacts on cyber risks

Book Description

With the rapid pace of digital change today, especially the pandemic that sped up digital transformation and technologies, it is essential to make readers aware of the unknown risks and understand the landscape of digital threats. The book highlights the risk and how business-as-usual work by innocent, unaware, or victimized workers can lead your organization into a regulatory or business risk impacting your branding and balance sheet.

This book is your guide to identifying the topmost risks which are most relevant to your business with a clear understanding of when to start with the risk mitigation process and how to proceed with the next steps. The book also focuses on the new emerging risks that remote-working companies are experiencing and getting views on remote working from various industries. Along the way, you will learn how organizations can manage risk by taking advantage of Zero Trust Network Architecture and the necessary steps to be taken if the security of these smart devices has been compromised. Toward the end, you will explore various new forms of machines powered by AI and gives an imaginary view of life to executives' role in the future world.

By the end of this book, you'll be well-versed in identifying risks that the ever-increasing digital technology has unleashed on you.

What you will learn

  • Spreading awareness and the right approach to modern digital transformation
  • Explores all digital risks across, independent of company size
  • Covers real-world cases in the last two years with a unique focus post-pandemic
  • Understand Insider threats and action toward vulnerability exploitation
  • Get to know how Cyberwarfare targets infrastructure and disrupts critical systems
  • Understand why ESG is important and the benefits of being ESG Complaint
  • Apply a regulatory framework to the current and future data landscape

Who This Book Is For

This book is for Business Leaders, Board members, Small and Medium Business owners, IT, Risk, Governance, and Compliance professionals, and Legal professionals. This book is also targeted to technology leaders such as Chief Digital Officers, Chief Privacy Officers, Chief Risk Officers, CISOs, CIOs, Cybersecurity enthusiasts, and students. Basic awareness and understanding of modern digital transformation and some apprehensions about the unknown risks of technology is required.

Table of Contents

  1. From Good Old Days to Gen-X ways
  2. Going Digital - Ambient Technology Everywhere
  3. Visible and Invisible Risks
  4. Remote Working
  5. Emergence of Zero Trust and Risk Equation
  6. The Human Risk at Work
  7. Modern Collaboration and Risk Amplification
  8. Insider Risk and Impact
  9. Real Examples and Scenarios
  10. Cyberwarfare
  11. Government and Institutional Regulations
  12. Evolution of Risk and Compliance
  13. Role of Data and Privacy in Risk Management
  14. Story of remote work and Virtual Workforce
  15. Automation and Virtual Humans
  16. AI and Future Lockdown
on
Desktop
Tablet
Mobile

More in Network Security

The (Un)Natural History of Malware - Lena Yu

eBOOK

RRP $49.39

$39.59

20%
OFF
Building a Red Team - Trevin Edgeworth

eBOOK

RRP $84.87

$67.97

20%
OFF