Formerly the Internal Audit and IT Audit series - now rebranded and wider in scope!
The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.
The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.
Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT, Audit Management and Leadership, and Operational Auditing.
If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]
Why CISOs Fail
Seven Deadly Sins of Organizational Culture Lessons From Some of The Most Infamous Corporate Failures
Security Risk Management - The Driving Force for Operational Resilience The Firefighting Paradox
Controlling Privacy and the Use of Data Assets - Volume 2 What is the New World Currency – Data or Trust?
Teaching Cybersecurity A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
By Barak Engel
March 07, 2024
Released in 2017, Why CISOs Fail reimagined the role of the Chief Information Security Officer in a new and powerful way. Written to be easily consumable by both security pros as well as everyone who must deal with them, the book explores the different realms in which security leaders fail to ...
By Hernan Murdock
November 01, 2023
John Taylor has been hired to transform the underperforming internal audit unit at InSports. The auditors are not reviewing what the audit committee and executive leadership consider essential for the organization’s success, their methodology is subpar, and their relationships with their clients ...
By L. T. San
October 25, 2023
This book is about the primary symptoms present in a dysfunctional culture that could have devastating outcomes for any organization. The book outlines each of the seven sins in each chapter. Each of the first seven chapters (Chapters 1–7) starts with a famous quote related to each of the sins and ...
By Kevin Lynn McLaughlin
October 19, 2023
Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for anyone involved in the establishment and operation of a Cybersecurity Operations and Fusion Center (SOFC). Think of a combination cybersecurity SOC and...
By Jim Seaman, Michael Gioia
August 31, 2023
The importance of businesses being ‘operationally resilient’ is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can ‘bounce back’ from or manage to evade impactful occurrences is its security risk management ...
By Ulf Mattsson
August 24, 2023
The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity and Ledger and will provide practical lessons in Data Integrity, Trust, and data’s business utility. Based on a ...
By Jeffrey W. Brown
June 19, 2023
Future IT leaders won't be technology leaders, they'll be business leaders who understand technology. Leading the Digital Workforce takes a fresh look at technology leadership, exploring how to lead and manage in today’s digital workplace where the pace of change is exponential. This book walks you...
By James Bone, Jessie H Lee
April 18, 2023
Cognitive Risk is a book about the least understood but most pervasive risk to mankind – human decision-making. Cognitive risks are subconscious and unconscious influence factors on human decision-making: heuristics and biases. To understand the scope of cognitive risk, we look at case studies, ...
By Alan Tang
March 01, 2023
Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies, societies, and everyday lives. ...
By Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
February 15, 2023
Let’s be realistic here. Ordinary K-12 educators don’t know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical...
By Vahap Tecim, Sezer Bozkus Kahyaoglu
November 23, 2022
The concept of a "smart city" is used widely in general; however, it is hard to explain because of the complexity and multidimensionality of this notion. However, the essential qualification for being a smart city is to achieve "sustainable social, environmental, and economic development" and boost...
By Shaun Aghili
November 03, 2022
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others. But perhaps one of its most disruptive is blockchain technology whose origin dates to only 2008, when an individual (or perhaps a group of ...