Managing Risks in Digital Transformation: Navigate the modern landscape of digital threats with the help of real-world examples and use cases

· · ·
· Packt Publishing Ltd
Ebook
242
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

Secure your business in a post-pandemic world: Master digital risk identification and defense

Purchase of the print or Kindle book includes a free PDF eBook

Key FeaturesBecome well-versed with sophisticated system-level security risks and the zero-trust frameworkLearn about remote working risks, modern collaboration, and securing the digital data estateKeep up with rapidly evolving compliances and regulations and their impact on cyber risksBook Description

With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet.

This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof.

In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.

What you will learnBecome aware of and adopt the right approach to modern digital transformationExplore digital risks across companies of all sizesStudy real-world cases that focus on post-pandemic digital transformationUnderstand insider threats and how to mitigate vulnerability exploitationGet to know how cyberwarfare targets infrastructure and disrupts critical systemsDiscover how implementing a regulatory framework can safeguard you in the current and future data landscapesWho this book is for

This book is for three categories of readers—those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.

Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.

About the author

Ashish Kumar is on a mission to make this planet safer for digital transformation. Ashish leads Microsoft security engineering teams in learning about customers, partners, and market priorities on cybersecurity. He works with various universities, government, and large enterprises to help them build a secure digital posture and go deeper into digital transformation impacting every person on the planet. An Enthusiastic self-starter, goal-driven achiever, and motivated team player with a creative and progressive attitude is on a journey to share his experiences with you.

Shashank Kumar, a cybersecurity practitioner and long time regulatory risk enthusiast, is a Principal Product Manager for Microsoft Purview Compliance products. He works closely with some of the world's largest corporations to understand their current and future cybersecurity risks and help solve them through new features or products from Microsoft Data Security Product-group.

Abbas Kudrati, a long-time cybersecurity practitioner and CISO, is Microsoft Asia's Chief Cybersecurity Advisor. In addition to his work at Microsoft, he serves as an executive advisor to Deakin University, HITRUST, EC Council, and several security and technology start-ups. He supports the broader security community through his work with ISACA Chapters and student mentorship. He is the Technical Editor of various books and the bestselling author of books such as, "Threat Hunting in the Cloud" and "Zero Trust and Journey Across the Digital Estate". He is also a part-time Professor of Practice with LaTrobe University and a keynote speaker on Zero-Trust, Cybersecurity, Cloud Security, Governance, Risk, and Compliance.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.