DORA - A guide to the EU digital operational resilience act


Book Description

Simplify DORA (EU’s Digital Operational Resilience Act) compliance with our concise and insightful guide. Designed for busy professionals, this guide distils key principles and compliance strategies into an easily digestible format. You’ll find: Clear explanations of DORA’s core requirements; Practical tips for implementation and compliance; Expert insights to enhance your operational resilience; and A compact format for quick reference




IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition


Book Description

Recommended textbook for the Open University’s postgraduate information security course and the recommended text for all IBITGQ ISO 27001 courses In this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins: Discuss the ISO 27001/27002:2022 updates; Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002; Highlight why data protection and information security are vital in our ever-changing online and physical environments; Reflect on changes to international legislation, e.g. the GDPR (General Data Protection Regulation); and Review key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance. Fully updated to align with ISO 27001/27002:2022 IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition provides: Expert information security management and governance guidance based on international best practice; Guidance on how to protect and enhance your organisation with an ISO 27001:2022-compliant ISMS; and Discussion around the changes to international legislation, including ISO 27001:2022 and ISO 27002:2022. As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.




Ultimate Forensic Guide to AML KYC CFT


Book Description

This book is designed as the go-to resource for AML professionals, Compliance officers, forensic accountants, regulatory bodies, academician, and anyone seeking to deepen their understanding of financial crime prevention. AML Unplugged provides an in-depth exploration of Anti-Money Laundering (AML), Know Your Customer (KYC), and Countering the Financing of Terrorism (CFT), using forensic accounting principles to unravel the complexities of financial crimes. Whether you're a compliance officer, forensic accountant, financial investigator, or a student, this book equips you with practical insights, regulatory frameworks, and forensic tools necessary to combat money laundering and financial fraud. The modular structure allows you to explore each facet of AML, KYC, and CFT in a comprehensive yet digestible format. Key Features: · Comprehensive Coverage: From FATF 40 recommendations to global AML legislation & Initiatives, ISO Standards the book dives deep into international regulations. · Practical Insights: Case studies and real-world examples enrich your understanding of how financial crimes operate and how forensic accounting helps uncover them. · Forensic Insights: Throughout the book, we integrate forensic accounting principles to help readers understand and investigate financial crimes effectively. · Step-by-Step Guidance: Detailed modules, starting from the fundamentals of money laundering stages to advanced forensic investigation techniques. We extend our heartfelt thanks to you, our readers, for choosing this book. Your decision reflects your commitment to fighting financial crime, and we hope this guide provides the knowledge and tools you need to make an impact. — Darwin Makhija & Santosh Sirur




The Business of Cyber


Book Description

This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. A central theme is that the management of cybersecurity needs to be owned by the people running the organisation, rather than by the cybersecurity team, who frequently don’t have management as a core skill. In order to effect that change, managers need to have the background and detail to challenge what they are being told, enabling them to engage in a way that will result in more appropriate outcomes for the business. This book provides that background and detail. It debunks a number of cyber-myths, and calls out basic errors in the accepted thinking on cyber. The content is strongly rooted in available research and presented in an accessible manner, with a number of business-related case studies. Each chapter in the book takes a theme such as end-user behaviours and compares the available evidence with what the industry would like to have its customers believe. The conclusion is that there is definitely a problem, and we certainly need cyber defences. Just not the ones the industry is currently selling.




Aspects of Quality Management in Value Creating in the Industry 5.0 Way


Book Description

Industry 5.0 suggests a new stage of industrial growth that expands upon earlier stages of industrialization, emphasizing human-centered approaches to technology and digital sustainability. With its innovative approach, Industry 5.0 will contribute to the resolution of the manufacturing–social need mismatch issue. In contrast to other industrial revolutions that placed more emphasis on the financial aspects of sustainability, the Industry 5.0 vision places more emphasis on social demands and human centricity. This book Aspects of Quality Management in Value Creating in the Industry 5.0 Way focuses on the challenges that companies in the field of quality management in Industry 5.0 face, particularly in relation to client value aspects. The book devotes a lot of space to the issues of client satisfaction, cybersecurity, e-commerce, TQM, and collaborative work between robots and humans in the company. Features: Characterizes the new role of value for customer 5.0 in the augmented era Analyzes the collaborative work between robots and humans in Industry 5.0 conditions Investigates the complex relationship between satisfaction, awareness, perception, attitude, and demographics, as well as examining how technological advances and market performance impact client satisfaction Includes: E-client in the cyber-security aspect Multi-Agent Technology (MAT) to maintain Total Quality Management (TQM) in manufacturing and MAT’s role in TQM A novel structure for innovation, "Innovation Control (IC)," to integrate creative thinking and business strategy Industry 5.0 inside the automotive sector Technetronic Education (TE) in Industry 5.0: advantages, challenges, and implications Ethical aspects and challenges associated with developing technologies This book Aspects of Quality Management in Value Creating in the Industry 5.0 Way serves as a future road map, guiding readers through the complexities of industrial progress. Academic researchers, along with senior undergraduate and graduate students, are the primary target audience.




Central Banking at the Frontier


Book Description

With a foreword by Sethaput Suthiwartnarueput, Governor of the Bank of Thailand, Central Banking at the Frontier: Creating a Digital Financial Landscape comprehensively explores the current digital dynamic era, providing insights into the debates that define the evolving financial landscape.




Operational Risk Management in Financial Services


Book Description

Technology failures, data loss, issues with providers of outsourced services, misconduct and mis-selling are just some of the top risks that the financial industry faces. Operational risk management is, simply, a commercial necessity. The management of operational risk has developed considerably since its early years. Continued regulatory focus and catastrophic industry events have led to operational risk becoming a crucial topic on any senior management team's agenda. This book is a practical guide for practitioners which focuses on how to establish effective solutions, avoid common pitfalls and apply best practice to their organizations. Filled with frameworks, examples and diagrams, this book offers clear advice on key practices including conducting risk assessments, assessing change initiatives and designing key risk indicators. This new edition of Operational Risk Management in Financial Services also features two new chapters reflecting on the future of operational risk management, from cyber risk to GenAI, and guides practitioners in incorporating ESG into their day-to-day strategies. This is the essential guide for professionals looking to derive value out of operational risk management, rather than applying a compliance 'tick box' approach.




The Regulation of Digital Technologies in the EU


Book Description

EU regulatory initiatives concerning technology-related topics have spiked over the past few years. On the basis of its Priorities Programme, which is focused on making Europe ‘Fit for the Digital Age’, the European Commission has been busily releasing new texts aimed at regulating a number of technology topics, including data uses, online platforms, cybersecurity, and artificial intelligence. This book identifies three phenomena which are common to all EU digital technologies-relevant regulatory initiatives: act-ification, GDPR mimesis, and regulatory brutality. These three phenomena serve as indicators or early signs of a new European technology law-making paradigm that now seems ready to emerge. They divulge new-found confidence on the part of the EU digital technologies legislator, who has now asserted for itself the right to form policy options and create new rules in the field for all of Europe. Bringing together an analysis of the regulatory initiatives for the management of technology topics in the EU for the first time, this book will be of interest to academics, policymakers, and practitioners, sparking academic and policymaking interest and discussion.




The Risk IT Practitioner Guide


Book Description




Telecommunications (Security) Act 2021


Book Description

Royal Assent, 17th November 2021. An Act to make provision about the security of public electronic communications networks and public electronic communications services. Explanatory Notes have been produced to assist in the understanding of this Act and are available separately. This Act extends to England and Wales, Scotland and Northern Ireland