Managing risks in digital transformation: navigate the modern landscape of digital threats with the help of real-world examples and use cases
With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2023
|
Ausgabe: | 1st edition |
Online-Zugang: | FHA01 FHI01 FHR01 TUM01 UBY01 Volltext |
Zusammenfassung: | With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. |
Beschreibung: | 1 Online-Ressource (xx, 221 Seiten) |
ISBN: | 9781803234144 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV049422093 | ||
003 | DE-604 | ||
005 | 20240207 | ||
007 | cr|uuu---uuuuu | ||
008 | 231120s2023 |||| o||u| ||||||eng d | ||
020 | |a 9781803234144 |9 978-1-80323-414-4 | ||
035 | |a (ZDB-221-PPK)PACKT0006587 | ||
035 | |a (OCoLC)1410708467 | ||
035 | |a (DE-599)BVBBV049422093 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-Aug4 |a DE-706 |a DE-898 | ||
100 | 1 | |a Kumar, Ashish |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managing risks in digital transformation |b navigate the modern landscape of digital threats with the help of real-world examples and use cases |c Ashish Kumar, Shashank Kumar, Abbas Kudrati |
250 | |a 1st edition | ||
264 | 1 | |a Birmingham |b Packt Publishing |c 2023 | |
300 | |a 1 Online-Ressource (xx, 221 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. | ||
700 | 1 | |a Kumar, Shashank |d 1986- |e Verfasser |0 (DE-588)1233334824 |4 aut | |
700 | 1 | |a Kudrati, Abbas |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80324-651-2 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/search/PACKT0006587.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-221-PPK |a ZDB-221-PCL |a ZDB-221-PCR | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034749598 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006587.html |l FHA01 |p ZDB-221-PCR |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006587.html |l FHI01 |p ZDB-221-PCR |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006587.html |l FHR01 |p ZDB-221-PCR |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006587.html |l TUM01 |p ZDB-221-PCL |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006587.html |l UBY01 |p ZDB-221-PCL |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804186157044465664 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kumar, Ashish Kumar, Shashank 1986- Kudrati, Abbas |
author_GND | (DE-588)1233334824 |
author_facet | Kumar, Ashish Kumar, Shashank 1986- Kudrati, Abbas |
author_role | aut aut aut |
author_sort | Kumar, Ashish |
author_variant | a k ak s k sk a k ak |
building | Verbundindex |
bvnumber | BV049422093 |
collection | ZDB-221-PPK ZDB-221-PCL ZDB-221-PCR |
ctrlnum | (ZDB-221-PPK)PACKT0006587 (OCoLC)1410708467 (DE-599)BVBBV049422093 |
edition | 1st edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03176nmm a2200409zc 4500</leader><controlfield tag="001">BV049422093</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240207 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231120s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803234144</subfield><subfield code="9">978-1-80323-414-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PPK)PACKT0006587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1410708467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049422093</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Ashish</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing risks in digital transformation</subfield><subfield code="b">navigate the modern landscape of digital threats with the help of real-world examples and use cases</subfield><subfield code="c">Ashish Kumar, Shashank Kumar, Abbas Kudrati</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 221 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Shashank</subfield><subfield code="d">1986-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1233334824</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kudrati, Abbas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80324-651-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006587.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PPK</subfield><subfield code="a">ZDB-221-PCL</subfield><subfield code="a">ZDB-221-PCR</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034749598</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006587.html</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006587.html</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006587.html</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006587.html</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006587.html</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049422093 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:07:57Z |
indexdate | 2024-07-10T10:06:39Z |
institution | BVB |
isbn | 9781803234144 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034749598 |
oclc_num | 1410708467 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-Aug4 DE-706 DE-898 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-Aug4 DE-706 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource (xx, 221 Seiten) |
psigel | ZDB-221-PPK ZDB-221-PCL ZDB-221-PCR ZDB-221-PCL TUM_Paketkauf_2024 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spelling | Kumar, Ashish Verfasser aut Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Ashish Kumar, Shashank Kumar, Abbas Kudrati 1st edition Birmingham Packt Publishing 2023 1 Online-Ressource (xx, 221 Seiten) txt rdacontent c rdamedia cr rdacarrier With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. Kumar, Shashank 1986- Verfasser (DE-588)1233334824 aut Kudrati, Abbas Verfasser aut Erscheint auch als Druck-Ausgabe 978-1-80324-651-2 https://portal.igpublish.com/iglibrary/search/PACKT0006587.html Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Kumar, Ashish Kumar, Shashank 1986- Kudrati, Abbas Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases |
title | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases |
title_auth | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases |
title_exact_search | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases |
title_exact_search_txtP | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases |
title_full | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Ashish Kumar, Shashank Kumar, Abbas Kudrati |
title_fullStr | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Ashish Kumar, Shashank Kumar, Abbas Kudrati |
title_full_unstemmed | Managing risks in digital transformation navigate the modern landscape of digital threats with the help of real-world examples and use cases Ashish Kumar, Shashank Kumar, Abbas Kudrati |
title_short | Managing risks in digital transformation |
title_sort | managing risks in digital transformation navigate the modern landscape of digital threats with the help of real world examples and use cases |
title_sub | navigate the modern landscape of digital threats with the help of real-world examples and use cases |
url | https://portal.igpublish.com/iglibrary/search/PACKT0006587.html |
work_keys_str_mv | AT kumarashish managingrisksindigitaltransformationnavigatethemodernlandscapeofdigitalthreatswiththehelpofrealworldexamplesandusecases AT kumarshashank managingrisksindigitaltransformationnavigatethemodernlandscapeofdigitalthreatswiththehelpofrealworldexamplesandusecases AT kudratiabbas managingrisksindigitaltransformationnavigatethemodernlandscapeofdigitalthreatswiththehelpofrealworldexamplesandusecases |