View All Book Series

BOOK SERIES


Security, Audit and Leadership Series


About the Series

Formerly the Internal Audit and IT Audit series - now rebranded and wider in scope!

The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.

Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT, Audit Management and Leadership, and Operational Auditing.

If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]

65 Series Titles

Per Page
Sort

Display
Controlling Privacy and the Use of Data Assets - Volume 2 What is the New World Currency – Data or Trust?

Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust?

1st Edition

By Ulf Mattsson
August 24, 2023

The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity and Ledger and will provide practical lessons in Data Integrity, Trust, and data’s business utility. Based on a ...

Leading the Digital Workforce IT Leadership Peak Performance and Agility

Leading the Digital Workforce: IT Leadership Peak Performance and Agility

1st Edition

By Jeffrey W. Brown
June 19, 2023

Future IT leaders won't be technology leaders, they'll be business leaders who understand technology. Leading the Digital Workforce takes a fresh look at technology leadership, exploring how to lead and manage in today’s digital workplace where the pace of change is exponential. This book walks you...

Cognitive Risk

Cognitive Risk

1st Edition

By James Bone, Jessie H Lee
April 18, 2023

Cognitive Risk is a book about the least understood but most pervasive risk to mankind – human decision-making. Cognitive risks are subconscious and unconscious influence factors on human decision-making: heuristics and biases. To understand the scope of cognitive risk, we look at case studies, ...

Privacy in Practice Establish and Operationalize a Holistic Data Privacy Program

Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program

1st Edition

By Alan Tang
March 01, 2023

Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies, societies, and everyday lives. ...

Teaching Cybersecurity A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom

Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom

1st Edition

By Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
February 15, 2023

Let’s be realistic here. Ordinary K-12 educators don’t know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical...

Artificial Intelligence Perspective for Smart Cities

Artificial Intelligence Perspective for Smart Cities

1st Edition

Edited By Vahap Tecim, Sezer Bozkus Kahyaoglu
November 23, 2022

The concept of a "smart city" is used widely in general; however, it is hard to explain because of the complexity and multidimensionality of this notion. However, the essential qualification for being a smart city is to achieve "sustainable social, environmental, and economic development" and boost...

The Auditor’s Guide to Blockchain Technology Architecture, Use Cases, Security and Assurance

The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance

1st Edition

By Shaun Aghili
November 03, 2022

The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others. But perhaps one of its most disruptive is blockchain technology whose origin dates to only 2008, when an individual (or perhaps a group of ...

CyRM Mastering the Management of Cybersecurity

CyRM: Mastering the Management of Cybersecurity

1st Edition

By David X Martin
November 01, 2022

Is your enterprise’s strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so…you’re not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach...

Mind the Tech Gap Addressing the Conflicts between IT and Security Teams

Mind the Tech Gap: Addressing the Conflicts between IT and Security Teams

1st Edition

By Nikki Robinson
October 05, 2022

IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand where the problem lies, this book will explore the different job functions, goals, relationships, and other factors that may impact how IT and cybersecurity teams interact. With ...

Agile Audit Transformation and Beyond

Agile Audit Transformation and Beyond

1st Edition

By Toby DeRoche
July 13, 2022

Auditing at the speed of risk requires internal auditors to rethink the way we work. Agile auditing provides a path forward that blends the best elements from agile project management and internal audit best practices. Leaders in internal audit are ready to incorporate an agile audit mindset in ...

Information System Audit How to Control the Digital Disruption

Information System Audit: How to Control the Digital Disruption

1st Edition

By Philippe Peret
July 07, 2022

The digitalization of companies is a recurrent topic of conversation for managers. Companies are forced to evolve at least as fast as their competitors. They have to review their organization, their processes, and their way of working. This also concerns auditors in terms of their audit strategy ...

Controlling Privacy and the Use of Data Assets - Volume 1 Who Owns the New Oil?

Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil?

1st Edition

By Ulf Mattsson
June 27, 2022

"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO "Ulf Mattsson lays out not just the rationale for accountable ...

13-24 of 65
AJAX loader