View All Book Series

Security, Audit and Leadership Series

About the Book Series

The scope and mandate for cybersecurity and internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.

Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT and Technology, and Audit Management and Leadership.

If you're interested in submitting a proposal for a book to be included in the series, please email the series editor, Dan Swanson: [email protected] 

129 Series Titles


Cognitive Hack The New Battleground in Cybersecurity ... the Human Mind

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

1st Edition

By James Bone
August 02, 2021

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security ...

Operational Assessment of IT

Operational Assessment of IT

1st Edition

By Steve Katzman
August 02, 2021

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization’s business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks, ...

Practitioner's Guide to Business Impact Analysis

Practitioner's Guide to Business Impact Analysis

1st Edition

By Priti Sikdar
August 02, 2021

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists...

Security and Auditing of Smart Devices Managing Proliferation of Confidential Data on Corporate and BYOD Devices

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

1st Edition

By Sajay Rai, Philip Chukwuma, Richard Cozart
August 02, 2021

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the ...

Software Quality Assurance Integrating Testing, Security, and Audit

Software Quality Assurance: Integrating Testing, Security, and Audit

1st Edition

By Abu Sayed Mahfuz
August 02, 2021

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and ...

Leading the Internal Audit Function

Leading the Internal Audit Function

1st Edition

By Lynn Fountain
April 29, 2021

While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to ...

Corporate Defense and the Value Preservation Imperative Bulletproof Your Corporate Defense Program

Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program

1st Edition

By Sean Lyons
March 31, 2021

This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s ...

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

1st Edition

By Richard E. Cascarino
October 06, 2020

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system ...

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

1st Edition

By Dan Shoemaker, Anne Kohnke, Ken Sigler
September 30, 2020

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship...

Data Analytics for Internal Auditors

Data Analytics for Internal Auditors

1st Edition

By Richard E. Cascarino
September 30, 2020

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...

Securing an IT Organization through Governance, Risk Management, and Audit

Securing an IT Organization through Governance, Risk Management, and Audit

1st Edition

By Ken E. Sigler, III Rainey
September 30, 2020

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come...

Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications

1st Edition

Edited By Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Imed Romdhani
August 03, 2020

Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not ...

109-120 of 129
AJAX loader