Secure your business in a post-pandemic world: Master digital risk identification and defense
Purchase of the print or Kindle book includes a free PDF eBook
With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet.
This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof.
In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.
This book is for three categories of readers―those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.
Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Abbas Kudrati, a long-time cybersecurity practitioner and CISO, is Microsoft Asia's Chief Cybersecurity Advisor. In addition to his work at Microsoft, he serves as an executive advisor to Deakin University, HITRUST, EC Council, and several security and technology start-ups. He supports the broader security community through his work with ISACA Chapters and student mentorship. He is the Technical Editor of various books and the bestselling author of books such as, "Threat Hunting in the Cloud" and "Zero Trust and Journey Across the Digital Estate". He is also a part-time Professor of Practice with LaTrobe University and a keynote speaker on Zero-Trust, Cybersecurity, Cloud Security, Governance, Risk, and Compliance.<br /><br />Shashank Kumar, a cybersecurity practitioner and long time regulatory risk enthusiast, is a Principal Product Manager for Microsoft Purview Compliance products. He works closely with some of the world's largest corporations to understand their current and future cybersecurity risks and help solve them through new features or products from Microsoft Data Security Product-group.<br /><br />Ashish Kumar is a Principal Product Manager at Microsoft. Over 25 years of experience in Networking, infrastructure, and cloud to cybersecurity across Microsoft, TCS, and HCL as employers and has engaged with over 2000+ customers representing their viewpoints in light of current times. He has played various roles leading cybersecurity discussions with CISO, IT leadership, and business for over 10 years. He is actively learning and gaining insights on digital risk in his regular discussion with over 100+ Chief risk officers and CISOs in the last 2 years as part of his engineering role. He holds various certifications such as MCSE, CCNP, ISO Auditor, Cloud and Power platform certifications.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 17,02 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 7,66 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: California Books, Miami, FL, U.S.A.
Condizione: New. Codice articolo I-9781803246512
Quantità: Più di 20 disponibili
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9781803246512
Quantità: Più di 20 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
PAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9781803246512
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 45738743
Quantità: Più di 20 disponibili
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Managing Risks in Digital Transformation: Navigate the modern landscape of digital threats with the help of real-world examples and use cases 0.93. Book. Codice articolo BBS-9781803246512
Quantità: 5 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 100. Codice articolo C9781803246512
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781803246512_new
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 45738743-n
Quantità: 1 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 45738743-n
Quantità: Più di 20 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: As New. Unread book in perfect condition. Codice articolo 45738743
Quantità: Più di 20 disponibili