Managing risks in digital transformation: navigate the modern landscape of digital threats with the help of real-world examples and use cases
With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing Ltd.
2023
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781803246512/?ar |
Zusammenfassung: | With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. |
Beschreibung: | Includes index |
Umfang: | 1 Online-Ressource (242 Seiten) illustrations |
ISBN: | 9781803234144 1803234148 9781803246512 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-092523110 | ||
003 | DE-627-1 | ||
005 | 20240228121953.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230503s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781803234144 |9 978-1-80323-414-4 | ||
020 | |a 1803234148 |9 1-80323-414-8 | ||
020 | |a 9781803246512 |9 978-1-80324-651-2 | ||
035 | |a (DE-627-1)092523110 | ||
035 | |a (DE-599)KEP092523110 | ||
035 | |a (ORHE)9781803246512 | ||
035 | |a (DE-627-1)092523110 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230425 | |
100 | 1 | |a Kumar, Ashish |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Managing risks in digital transformation |b navigate the modern landscape of digital threats with the help of real-world examples and use cases |c Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith |
250 | |a 1st edition. | ||
264 | 1 | |a Birmingham, UK |b Packt Publishing Ltd. |c 2023 | |
300 | |a 1 Online-Ressource (242 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
700 | 1 | |a Kumar, Shashank |e VerfasserIn |4 aut | |
700 | 1 | |a Kudrati, Abbas |e VerfasserIn |4 aut | |
700 | 1 | |a Smith, Sarah Armstrong- |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781803246512/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-092523110 |
---|---|
_version_ | 1821494813595271168 |
adam_text | |
any_adam_object | |
author | Kumar, Ashish Kumar, Shashank Kudrati, Abbas |
author2 | Smith, Sarah Armstrong- |
author2_role | ctb |
author2_variant | s a s sa sas |
author_facet | Kumar, Ashish Kumar, Shashank Kudrati, Abbas Smith, Sarah Armstrong- |
author_role | aut aut aut |
author_sort | Kumar, Ashish |
author_variant | a k ak s k sk a k ak |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)092523110 (DE-599)KEP092523110 (ORHE)9781803246512 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02827cam a22004452 4500</leader><controlfield tag="001">ZDB-30-ORH-092523110</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121953.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230503s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803234144</subfield><subfield code="9">978-1-80323-414-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1803234148</subfield><subfield code="9">1-80323-414-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803246512</subfield><subfield code="9">978-1-80324-651-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092523110</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092523110</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781803246512</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092523110</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230425</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Ashish</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing risks in digital transformation</subfield><subfield code="b">navigate the modern landscape of digital threats with the help of real-world examples and use cases</subfield><subfield code="c">Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (242 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Shashank</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kudrati, Abbas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Sarah Armstrong-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781803246512/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-092523110 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:21Z |
institution | BVB |
isbn | 9781803234144 1803234148 9781803246512 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (242 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing Ltd. |
record_format | marc |
spelling | Kumar, Ashish VerfasserIn aut Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith 1st edition. Birmingham, UK Packt Publishing Ltd. 2023 1 Online-Ressource (242 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. Computer security Sécurité informatique Kumar, Shashank VerfasserIn aut Kudrati, Abbas VerfasserIn aut Smith, Sarah Armstrong- MitwirkendeR ctb |
spellingShingle | Kumar, Ashish Kumar, Shashank Kudrati, Abbas Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Computer security Sécurité informatique |
title | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases |
title_auth | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases |
title_exact_search | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases |
title_full | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith |
title_fullStr | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith |
title_full_unstemmed | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Ashish Kumar, Shashank Kumar, Abbas Kudrati ; foreword by Sarah Armstrong- Smith |
title_short | Managing risks in digital transformation |
title_sort | managing risks in digital transformation navigate the modern landscape of digital threats with the help of real world examples and use cases |
title_sub | navigate the modern landscape of digital threats with the help of real-world examples and use cases |
topic | Computer security Sécurité informatique |
topic_facet | Computer security Sécurité informatique |
work_keys_str_mv | AT kumarashish managingrisksindigitaltransformationnavigatethemodernlandscapeofdigitalthreatswiththehelpofrealworldexamplesandusecases AT kumarshashank managingrisksindigitaltransformationnavigatethemodernlandscapeofdigitalthreatswiththehelpofrealworldexamplesandusecases AT kudratiabbas managingrisksindigitaltransformationnavigatethemodernlandscapeofdigitalthreatswiththehelpofrealworldexamplesandusecases AT smithsaraharmstrong managingrisksindigitaltransformationnavigatethemodernlandscapeofdigitalthreatswiththehelpofrealworldexamplesandusecases |