Book Image

Managing Risks in Digital Transformation

By : Ashish Kumar, Shashank Kumar, Abbas Kudrati
5 (1)
Book Image

Managing Risks in Digital Transformation

5 (1)
By: Ashish Kumar, Shashank Kumar, Abbas Kudrati

Overview of this book

With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization’s reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you’ll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you’ll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.
Table of Contents (22 chapters)
1
Part 1: Invisible Digitization Tsunami
Free Chapter
2
Chapter 1: Invisible Digitization Tsunami
7
Part 2: Risk Redefined at Work
16
Part 3: The Future

Impact of cyberwarfare

Today, most of us think of a cyberattack as when a website, database, or server is attacked or taken control of by cybercriminals. That is not the whole story, as seen in the previous examples of cyberattacks I shared, which showed how their impact can range from restricting a nuclear program to affecting a company’s ability to sell oil to consumers at gas stations.

A camera in an elevator, a smart TV in a hotel lobby, and some temperature-monitoring equipment at the entrance to a building all are connected to the internet. They are all susceptible to cyberattacks and capable of participating in cyberattacks.

Contemporary cyberwarfare is the use of any and every form of digital attack on your enemy. Gartner predicts that by 2025, cyberattacks will have weaponized operational technology to harm or kill humans (read about the study here: https://www.gartner.com/en/newsroom/press-releases/2021-07-21-gartner-predicts-by-2025-cyber-attackers-will-have...