View All Book Series

Security, Audit and Leadership Series

About the Book Series

The scope and mandate for cybersecurity and internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.

Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT and Technology, and Audit Management and Leadership.

If you're interested in submitting a proposal for a book to be included in the series, please email the series editor, Dan Swanson: [email protected] 

134 Series Titles


Teaching Cybersecurity A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom

Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom

1st Edition

By Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
February 15, 2023

Let’s be realistic here. Ordinary K-12 educators don’t know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical...

Artificial Intelligence Perspective for Smart Cities

Artificial Intelligence Perspective for Smart Cities

1st Edition

Edited By Vahap Tecim, Sezer Bozkus Kahyaoglu
November 23, 2022

The concept of a "smart city" is used widely in general; however, it is hard to explain because of the complexity and multidimensionality of this notion. However, the essential qualification for being a smart city is to achieve "sustainable social, environmental, and economic development" and boost...

The Auditor’s Guide to Blockchain Technology Architecture, Use Cases, Security and Assurance

The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance

1st Edition

By Shaun Aghili
November 03, 2022

The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others. But perhaps one of its most disruptive is blockchain technology whose origin dates to only 2008, when an individual (or perhaps a group of ...

CyRM Mastering the Management of Cybersecurity

CyRM: Mastering the Management of Cybersecurity

1st Edition

By David X Martin
November 01, 2022

Is your enterprise’s strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so…you’re not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach...

Mind the Tech Gap Addressing the Conflicts between IT and Security Teams

Mind the Tech Gap: Addressing the Conflicts between IT and Security Teams

1st Edition

By Nikki Robinson
October 05, 2022

IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand where the problem lies, this book will explore the different job functions, goals, relationships, and other factors that may impact how IT and cybersecurity teams interact. With ...

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect  Organizational Fraud

Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

1st Edition

By Shaun Aghili
August 29, 2022

This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also ...

Implementing Cybersecurity A Guide to the National Institute of Standards and Technology Risk Management Framework

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

1st Edition

By Anne Kohnke, Ken Sigler, Dan Shoemaker
August 29, 2022

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain ...

Internet of Things, for Things, and by Things

Internet of Things, for Things, and by Things

1st Edition

By Abhik Chaudhuri
August 29, 2022

This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally ...

The CISO Journey Life Lessons and Concepts to Accelerate Your Professional Development

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

1st Edition

By Eugene Fredriksen
August 29, 2022

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each ...

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

1st Edition

By Anne Kohnke, Dan Shoemaker, Ken E. Sigler
August 29, 2022

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day ...

The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

1st Edition

By Daniel Shoemaker, Anne Kohnke, Ken Sigler
August 29, 2022

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity ...

Controlling Privacy and the Use of Data Assets - Volume 1 Who Owns the New Oil?

Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil?

1st Edition

By Ulf Mattsson
June 27, 2022

"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO "Ulf Mattsson lays out not just the rationale for accountable ...

97-108 of 134
AJAX loader