Security, Audit and Leadership Series
About the Book Series
The scope and mandate for cybersecurity and internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.
The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.
Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT and Technology, and Audit Management and Leadership.
If you're interested in submitting a proposal for a book to be included in the series, please email the series editor, Dan Swanson: [email protected]
Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind
1st Edition
By James Bone
August 02, 2021
This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security ...
Operational Assessment of IT
1st Edition
By Steve Katzman
August 02, 2021
Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization’s business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks, ...
Practitioner's Guide to Business Impact Analysis
1st Edition
By Priti Sikdar
August 02, 2021
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists...
Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
1st Edition
By Sajay Rai, Philip Chukwuma, Richard Cozart
August 02, 2021
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the ...
Software Quality Assurance: Integrating Testing, Security, and Audit
1st Edition
By Abu Sayed Mahfuz
August 02, 2021
Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and ...
Leading the Internal Audit Function
1st Edition
By Lynn Fountain
April 29, 2021
While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to ...
Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program
1st Edition
By Sean Lyons
March 31, 2021
This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s ...
The Complete Guide for CISA Examination Preparation
1st Edition
By Richard E. Cascarino
October 06, 2020
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system ...
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
1st Edition
By Dan Shoemaker, Anne Kohnke, Ken Sigler
September 30, 2020
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship...
Data Analytics for Internal Auditors
1st Edition
By Richard E. Cascarino
September 30, 2020
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...
Securing an IT Organization through Governance, Risk Management, and Audit
1st Edition
By Ken E. Sigler, III Rainey
September 30, 2020
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come...
Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications
1st Edition
Edited
By Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Imed Romdhani
August 03, 2020
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not ...






