Security, Audit and Leadership Series
About the Book Series
The scope and mandate for cybersecurity and internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.
The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.
Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT and Technology, and Audit Management and Leadership.
If you're interested in submitting a proposal for a book to be included in the series, please email the series editor, Dan Swanson: [email protected]
Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
1st Edition
By Sajay Rai, Philip Chukwuma, Richard Cozart
August 02, 2021
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the ...
Software Quality Assurance: Integrating Testing, Security, and Audit
1st Edition
By Abu Sayed Mahfuz
August 02, 2021
Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and ...
Leading the Internal Audit Function
1st Edition
By Lynn Fountain
April 29, 2021
While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to ...
Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program
1st Edition
By Sean Lyons
March 31, 2021
This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s ...
The Complete Guide for CISA Examination Preparation
1st Edition
By Richard E. Cascarino
October 06, 2020
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system ...
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
1st Edition
By Dan Shoemaker, Anne Kohnke, Ken Sigler
September 30, 2020
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship...
Data Analytics for Internal Auditors
1st Edition
By Richard E. Cascarino
September 30, 2020
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...
Securing an IT Organization through Governance, Risk Management, and Audit
1st Edition
By Ken E. Sigler, III Rainey
September 30, 2020
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come...
Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications
1st Edition
Edited
By Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Imed Romdhani
August 03, 2020
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not ...
Corporate Governance: A Pragmatic Guide for Auditors, Directors, Investors, and Accountants
1st Edition
By Vasant Raval
April 16, 2020
This book facilitates a systematic comprehension of internal workings of corporate governance in practice. Facets of this multidisciplinary, constantly evolving field are discussed and interrelationships among them are explained to provide insights on how certain precepts come into play for various...
The Audit Value Factor
1st Edition
By Daniel Samson
August 13, 2019
The Audit Value Factor: Making Management’s Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization. The book explores how to identify, quantify, and articulate value for customers. It details six critical success factors: Value ...
Managing IoT Systems for Institutions and Cities
1st Edition
By Chuck Benson
July 16, 2019
This book defines what IoT Systems manageability looks like and what the associated resources and costs are of that manageability. It identifies IoT Systems performance expectations and addresses the difficult challenges of determining actual costs of IoT Systems implementation, operation, and ...






