000 03777cam a2200301zu 4500
001 88942187
003 FRCYB88942187
005 20250108001508.0
006 m o d
007 cr un
008 250108s2023 fr | o|||||0|0|||eng d
020 _a9781803246512
035 _aFRCYB88942187
040 _aFR-PaCSA
_ben
_c
_erda
100 1 _aKumar, Ashish
245 0 1 _aManaging Risks in Digital Transformation
_bNavigate the modern landscape of digital threats with the help of real-world examples and use cases
_c['Kumar, Ashish', 'Kumar, Shashank', 'Kudrati, Abbas']
264 1 _bPackt Publishing
_c2023
300 _a p.
336 _btxt
_2rdacontent
337 _bc
_2rdamdedia
338 _bc
_2rdacarrier
650 0 _a
700 0 _aKumar, Ashish
700 0 _aKumar, Shashank
700 0 _aKudrati, Abbas
856 4 0 _2Cyberlibris
_uhttps://international.scholarvox.com/netsen/book/88942187
_qtext/html
_a
520 _aSecure your business in a post-pandemic world: Master digital risk identification and defensePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesBecome well-versed with sophisticated system-level security risks and the zero-trust frameworkLearn about remote working risks, modern collaboration, and securing the digital data estateKeep up with rapidly evolving compliances and regulations and their impact on cyber risksBook DescriptionWith the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet.This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof.In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.What you will learnBecome aware of and adopt the right approach to modern digital transformationExplore digital risks across companies of all sizesStudy real-world cases that focus on post-pandemic digital transformationUnderstand insider threats and how to mitigate vulnerability exploitationGet to know how cyberwarfare targets infrastructure and disrupts critical systemsDiscover how implementing a regulatory framework can safeguard you in the current and future data landscapesWho this book is forThis book is for three categories of readers—those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.
999 _c76869
_d76869