Transforming Cybersecurity: Using COBIT 5

Transforming Cybersecurity: Using COBIT 5

Author: ISACA

Publisher: ISACA

Published: 2013-06-18

Total Pages: 190

ISBN-13: 1604203412

DOWNLOAD EBOOK

The cost and frequency of cybersecurity incidents are on the rise, is your enterprise keeping pace? The numbers of threats, risk scenarios and vulnerabilities have grown exponentially. Cybersecurity has evolved as a new field of interest, gaining political and societal attention. Given this magnitude, the future tasks and responsibilities associated with cybersecurity will be essential to organizational survival and profitability. This publication applies the COBIT 5 framework and its component publications to transforming cybersecurity in a systemic way. First, the impacts of cybercrime and cyberwarfare on business and society are illustrated and put in context. This section shows the rise in cost and frequency of security incidents, including APT attacks and other threats with a critical impact and high intensity. Second, the transformation addresses security governance, security management and security assurance. In accordance with the lens concept within COBIT 5, these sections cover all elements of the systemic transformation and cybersecurity improvements.


COBIT 5 for Risk

COBIT 5 for Risk

Author: ISACA

Publisher: ISACA

Published: 2013-09-25

Total Pages: 246

ISBN-13: 1604204575

DOWNLOAD EBOOK

Information is a key resource for all enterprises. From the time information is created to the moment it is destroyed, technology plays a significant role in containing, distributing and analysing information. Technology is increasingly advanced and has become pervasive in enterprises and the social, public and business environments.


Digital Platforms and Transformation of Healthcare Organizations

Digital Platforms and Transformation of Healthcare Organizations

Author: Rajiv Kapur

Publisher: CRC Press

Published: 2023-10-11

Total Pages: 267

ISBN-13: 1000962164

DOWNLOAD EBOOK

COVID-19 accelerated healthcare’s transition towards digital technology since it helped expand the capacity of healthcare organizations (HCOs) through extended patient access and isolation. In addition to HCOs, this transition was adopted by other participants in the healthcare ecosystem, such as independent digital health platform (DHP) vendors, self-insured employers, drug chains/pharmacy benefit managers, and insurance companies. It was not long before independent DHPs, payers, and self-insured employers realized the value of digital technology, so they increased their commitment towards this transition. The goal of this book is to help HCOs understand, prepare, implement, and leverage digital transformation. The book opines that, to be successful, digital transformation must be led and supported by senior management. Equally important is the cultural transformation of HCOs towards successful change management, which requires an evolutionary approach to continuous process improvements of increasing scope and complexity. Next, HCOs must generate a comprehensive digital transformation roadmap that aligns with their strategic plan for enhancing clinical and related capabilities while improving patient engagement. To accomplish their digital transformation, HCO management and key stakeholders must comprehend and meet prerequisite requirements for: digital health platforms, advanced information technology, and work transformation methodologies. DHPs, and associated hardware and software complements, form the foundation of digital health technologies prevalent in modern-day healthcare and have gained increasing importance since COVID-19. Advanced information technology includes concepts vital to healthcare transformation such as EHRs, interoperability, big data, artificial intelligence, natural language processing, data security, and privacy. Lastly, work transformation methodologies address work redesign that incorporates different levels of process improvements and phases of digital transformation, lean/six sigma, agile methodologies, and human factors engineering to ensure well-designed interfaces for care providers and patients. The overarching goal of this book is to provide a roadmap for US healthcare towards an organized digital transformation which will lead to improved outcomes, reduced costs, and improved patient satisfaction.


COBIT 5

COBIT 5

Author: Information Systems Audit and Control Association

Publisher: ISACA

Published: 2012

Total Pages: 78

ISBN-13: 1604202386

DOWNLOAD EBOOK


Advances in Information, Communication and Cybersecurity

Advances in Information, Communication and Cybersecurity

Author: Yassine Maleh

Publisher: Springer Nature

Published: 2022-01-12

Total Pages: 621

ISBN-13: 303091738X

DOWNLOAD EBOOK

This book gathers the proceedings of the International Conference on Information, Communication and Cybersecurity, held on November 10–11, 2021, in Khouribga, Morocco. The conference was jointly coorganized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, and Charles Darwin University, Australia. This book provides an opportunity to account for state-of-the-art works, future trends impacting information technology, communications, and cybersecurity, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. ICI2C 2021 was devoted to advances in smart information technologies, communication, and cybersecurity. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 159 paper submissions from 24 countries. Each submission was reviewed by at least three chairs or PC members. We accepted 54 regular papers (34\%). Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements. We would like to thank all authors and reviewers for their work and valuable contributions. The friendly and welcoming attitude of conference supporters and contributors made this event a success!


Digital Transformation for Sustainability

Digital Transformation for Sustainability

Author: Jorge Marx Gómez

Publisher: Springer Nature

Published: 2022-12-01

Total Pages: 599

ISBN-13: 3031154207

DOWNLOAD EBOOK

This book presents case studies to analyse the relationship between sustainability – environmental, social, institutional and economic – and digital innovation. The respective contributions offer a contextualisation of the main present and future trends concerning these two elements, and present analyses from economic, technical, managerial, and social perspectives alike. The individual sections of the book focus on interactions between sustainability and digital innovation in existing organisations and highlight the new opportunities, challenges and threats that may emerge as a result. The contributions are mainly based on case studies and research conducted in Europe and Africa, with a few focusing on Southeast Asia and Central America, and were prepared by experts in the fields of Information Systems, Computer Science, Social Development, and Economics.


Digital Transformation, Cyber Security and Resilience of Modern Societies

Digital Transformation, Cyber Security and Resilience of Modern Societies

Author: Todor Tagarev

Publisher: Springer Nature

Published: 2021-03-23

Total Pages: 495

ISBN-13: 3030657221

DOWNLOAD EBOOK

This book presents the implementation of novel concepts and solutions, which allows to enhance the cyber security of administrative and industrial systems and the resilience of economies and societies to cyber and hybrid threats. This goal can be achieved by rigorous information sharing, enhanced situational awareness, advanced protection of industrial processes and critical infrastructures, and proper account of the human factor, as well as by adequate methods and tools for analysis of big data, including data from social networks, to find best ways to counter hybrid influence. The implementation of these methods and tools is examined here as part of the process of digital transformation through incorporation of advanced information technologies, knowledge management, training and testing environments, and organizational networking. The book is of benefit to practitioners and researchers in the field of cyber security and protection against hybrid threats, as well as to policymakers and senior managers with responsibilities in information and knowledge management, security policies, and human resource management and training.


Cyber-Physical Systems for Industrial Transformation

Cyber-Physical Systems for Industrial Transformation

Author: Gunasekaran Manogaran

Publisher: CRC Press

Published: 2023-04-05

Total Pages: 314

ISBN-13: 1000857190

DOWNLOAD EBOOK

This book investigates the fundaments, standards, and protocols of Cyber-Physical Systems (CPS) in the industrial transformation environment. It facilitates a fusion of both technologies in the creation of reliable and robust applications. Cyber-Physical Systems for Industrial Transformation: Fundamentals, Standards, and Protocols explores emerging technologies such as artificial intelligence, data science, blockchain, robotic process automation, virtual reality, edge computing, and 5G technology to highlight current and future opportunities to transition CPS to become more robust and reliable. The book showcases the real-time sensing, processing, and actuation software and discusses fault-tolerant and cybersecurity as well. This book brings together undergraduates, postgraduates, academics, researchers, and industry individuals that are interested in exploring new ideas, techniques, and tools related to CPS and Industry 4.0.


Guide to Cybersecurity in Digital Transformation

Guide to Cybersecurity in Digital Transformation

Author: Dietmar P.F. Möller

Publisher: Springer Nature

Published: 2023-04-18

Total Pages: 432

ISBN-13: 3031268458

DOWNLOAD EBOOK

In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks. Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals. Topics and features: Explores cybersecurity’s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networks Provides numerous examples of applications and best practices Considers methods that organizations can use to assess their cybersecurity awareness and/or strategy Describes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate data Addresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacks Discusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity Standard Gathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity. Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.