Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases

With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual...

Full description

Bibliographic Details
Main Authors: Kumar, Ashish, Kumar, Shashank (Author), Kudrati, Abbas (Author)
Other Authors: Smith, Sarah Armstrong- (writer of foreword)
Format: eBook
Language:English
Published: Birmingham, UK Packt Publishing Ltd. 2023
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 05484nmm a2200397 u 4500
001 EB002160031
003 EBX01000000000000001298146
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230516 ||| eng
020 |a 9781803234144 
050 4 |a QA76.9.A25 
100 1 |a Kumar, Ashish 
245 0 0 |a Managing risks in digital transformation  |b navigate the modern landscape of digital threats with the help of real-world examples and use cases  |c Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith 
250 |a 1st edition 
260 |a Birmingham, UK  |b Packt Publishing Ltd.  |c 2023 
300 |a 242 pages  |b illustrations 
505 0 |a Visible risks -- Invisible risks -- When does risk become visible? -- Hit by password phishing -- Use of your credit cards -- Ransomware -- Invading privacy and extortion/phone spying -- Summary -- Chapter 4: Remote Working and the Element of Trust -- Remote working -- not new for everyone -- Pandemic and remote working -- View of remote working for various industries -- Risks to organizations -- Summary -- Chapter 5: The Emergence of Zero Trust and Risk Equation -- Zero Trust in real life -- Zero Trust is a new digital transformation -- Lesson learned from a global pandemic 
505 0 |a Modern principles of Zero Trust -- The NIST approach to Zero Trust architecture -- The Sunburst attack example -- Zero Trust across the digital estate -- Example of controlling access with intelligent policies and continuous risk assessment -- Zero Trust makes compliance easier -- Isolation -- Monitoring and visibility -- Summary -- Part 2: Risk Redefined at Work -- Chapter 6: The Human Risk at the Workplace -- Innocent intent -- Start of day -- During the day -- Wrapping up -- A quick relook at the risks -- Good worker -- Start of the day -- During the day -- Wrapping up -- Self-obsessed 
505 0 |a Rebel intent -- Malicious intent -- Summary -- Chapter 7: Modern Collaboration and Risk Amplification -- Evolving to the new workspace, where the flow of information is versatile -- Versatile collaboration -- some questions -- Challenges of a hybrid setup -- Future devices and their risk profile -- Polarization of opinions and its possible impact on modern collaboration -- Summary -- Chapter 8: Insider Risk and Impact -- Case study -- insider risk at Roposo Ltd -- Context -- Actor and the plot -- The crime -- The aftermath -- The lessons -- Understanding the impact of insider risk 
505 0 |a Case study 4 -- AT&T 
505 0 |a Primary costs of insider risk -- A summarized view of the impact of insider risk -- Summary -- Chapter 9: Real Examples and Scenarios -- Insider risk -- definition and threat vectors -- Insider risk -- behaviors and technical trends to look out for -- Behavioral indicators -- Technical indicators -- Using the MITRE ATT&CK framework to detect insider threat and behavior -- Case study 1 -- exploits in the life sciences sector -- Solution and outcome -- Case study 2 -- a victim of a phishing attack -- Solution and outcome -- Case study 3 -- working from home -- Solution and outcome 
505 0 |a Cover -- Title Page -- Copyright and Credit -- Dedicated -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Invisible Digitization Tsunami -- Chapter 1: Invisible Digitization Tsunami -- Digital transformation -- An invisible hand -- Summary -- Chapter 2: Going Digital -- Hello Alexa, Siri, Google, Cortana, and more -- The role of digital calendars -- Digital and physical socialization -- Cameras everywhere -- Digital wearables -- oh, my heart -- Advanced features in wearables -- What is real? -- Summary -- Chapter 3: Visible and Invisible Risks -- Risks in digital life 
653 |a Sécurité informatique 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Computer security / fast 
700 1 |a Kumar, Shashank  |e author 
700 1 |a Kudrati, Abbas  |e author 
700 1 |a Smith, Sarah Armstrong-  |e writer of foreword 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
776 |z 9781803246512 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803246512/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed