Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases

With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual...

Full description

Bibliographic Details
Main Authors: Kumar, Ashish, Kumar, Shashank (Author), Kudrati, Abbas (Author)
Other Authors: Smith, Sarah Armstrong- (writer of foreword)
Format: eBook
Language:English
Published: Birmingham, UK Packt Publishing Ltd. 2023
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Visible risks
  • Invisible risks
  • When does risk become visible?
  • Hit by password phishing
  • Use of your credit cards
  • Ransomware
  • Invading privacy and extortion/phone spying
  • Summary
  • Chapter 4: Remote Working and the Element of Trust
  • Remote working
  • not new for everyone
  • Pandemic and remote working
  • View of remote working for various industries
  • Risks to organizations
  • Summary
  • Chapter 5: The Emergence of Zero Trust and Risk Equation
  • Zero Trust in real life
  • Zero Trust is a new digital transformation
  • Lesson learned from a global pandemic
  • Modern principles of Zero Trust
  • The NIST approach to Zero Trust architecture
  • The Sunburst attack example
  • Zero Trust across the digital estate
  • Example of controlling access with intelligent policies and continuous risk assessment
  • Zero Trust makes compliance easier
  • Isolation
  • Monitoring and visibility
  • Summary
  • Part 2: Risk Redefined at Work
  • Chapter 6: The Human Risk at the Workplace
  • Innocent intent
  • Start of day
  • During the day
  • Wrapping up
  • A quick relook at the risks
  • Good worker
  • Start of the day
  • During the day
  • Wrapping up
  • Self-obsessed
  • Rebel intent
  • Malicious intent
  • Summary
  • Chapter 7: Modern Collaboration and Risk Amplification
  • Evolving to the new workspace, where the flow of information is versatile
  • Versatile collaboration
  • some questions
  • Challenges of a hybrid setup
  • Future devices and their risk profile
  • Polarization of opinions and its possible impact on modern collaboration
  • Summary
  • Chapter 8: Insider Risk and Impact
  • Case study
  • insider risk at Roposo Ltd
  • Context
  • Actor and the plot
  • The crime
  • The aftermath
  • The lessons
  • Understanding the impact of insider risk
  • Case study 4
  • AT&T
  • Primary costs of insider risk
  • A summarized view of the impact of insider risk
  • Summary
  • Chapter 9: Real Examples and Scenarios
  • Insider risk
  • definition and threat vectors
  • Insider risk
  • behaviors and technical trends to look out for
  • Behavioral indicators
  • Technical indicators
  • Using the MITRE ATT&CK framework to detect insider threat and behavior
  • Case study 1
  • exploits in the life sciences sector
  • Solution and outcome
  • Case study 2
  • a victim of a phishing attack
  • Solution and outcome
  • Case study 3
  • working from home
  • Solution and outcome
  • Cover
  • Title Page
  • Copyright and Credit
  • Dedicated
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Invisible Digitization Tsunami
  • Chapter 1: Invisible Digitization Tsunami
  • Digital transformation
  • An invisible hand
  • Summary
  • Chapter 2: Going Digital
  • Hello Alexa, Siri, Google, Cortana, and more
  • The role of digital calendars
  • Digital and physical socialization
  • Cameras everywhere
  • Digital wearables
  • oh, my heart
  • Advanced features in wearables
  • What is real?
  • Summary
  • Chapter 3: Visible and Invisible Risks
  • Risks in digital life