View All Book Series

BOOK SERIES


Security, Audit and Leadership Series


About the Series

Formerly the Internal Audit and IT Audit series - now rebranded and wider in scope!

The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.

Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT, Audit Management and Leadership, and Operational Auditing.

If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]

73 Series Titles

Per Page
Sort

Display
The Security Leader’s Communication Playbook and Leading the Digital Workforce Set

The Security Leader’s Communication Playbook and Leading the Digital Workforce Set

1st Edition

By Jeffrey W. Brown
May 24, 2024

The Security Leader’s Communication Playbook This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day ...

Why CISOs Fail 2e and The Security Hippie Set

Why CISOs Fail 2e and The Security Hippie Set

1st Edition

By Barak Engel
April 16, 2024

Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a new and powerful way. Written to be easily consumable by both security pros as well as everyone who must deal with them, the book explores the different realms in which security ...

Riding the Wave Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

1st Edition

By Andrew Boyarsky
April 05, 2024

Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and intensity of hazards, threats, and community vulnerabilities. Much of the work that falls into the scope of emergency ...

Why CISOs Fail

Why CISOs Fail

2nd Edition

By Barak Engel
March 07, 2024

Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a new and powerful way. Written to be easily consumable by both security pros as well as everyone who must deal with them, the book explores the different realms in which security ...

The Change Agent Transforming an Underperforming Internal Audit Department

The Change Agent: Transforming an Underperforming Internal Audit Department

1st Edition

By Hernan Murdock
November 01, 2023

John Taylor has been hired to transform the underperforming internal audit unit at InSports. The auditors are not reviewing what the audit committee and executive leadership consider essential for the organization’s success, their methodology is subpar, and their relationships with their clients ...

Seven Deadly Sins of Organizational Culture Lessons From Some of The Most Infamous Corporate Failures

Seven Deadly Sins of Organizational Culture: Lessons From Some of The Most Infamous Corporate Failures

1st Edition

By L. T. San
October 25, 2023

This book is about the primary symptoms present in a dysfunctional culture that could have devastating outcomes for any organization. The book outlines each of the seven sins in each chapter. Each of the first seven chapters (Chapters 1–7) starts with a famous quote related to each of the sins and ...

Cybersecurity Operations and Fusion Centers A Comprehensive Guide to SOC and TIC Strategy

Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy

1st Edition

By Kevin Lynn McLaughlin
October 19, 2023

Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for anyone involved in the establishment and operation of a Cybersecurity Operations and Fusion Center (SOFC). Think of a combination cybersecurity SOC and...

Security Risk Management - The Driving Force for Operational Resilience The Firefighting Paradox

Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox

1st Edition

By Jim Seaman, Michael Gioia
August 31, 2023

The importance of businesses being ‘operationally resilient’ is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can ‘bounce back’ from or manage to evade impactful occurrences is its security risk management ...

Controlling Privacy and the Use of Data Assets - Volume 2 What is the New World Currency – Data or Trust?

Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust?

1st Edition

By Ulf Mattsson
August 24, 2023

The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity and Ledger and will provide practical lessons in Data Integrity, Trust, and data’s business utility. Based on a ...

Leading the Digital Workforce IT Leadership Peak Performance and Agility

Leading the Digital Workforce: IT Leadership Peak Performance and Agility

1st Edition

By Jeffrey W. Brown
June 19, 2023

Future IT leaders won't be technology leaders, they'll be business leaders who understand technology. Leading the Digital Workforce takes a fresh look at technology leadership, exploring how to lead and manage in today’s digital workplace where the pace of change is exponential. This book walks you...

Cognitive Risk

Cognitive Risk

1st Edition

By James Bone, Jessie H Lee
April 18, 2023

Cognitive Risk is a book about the least understood but most pervasive risk to mankind – human decision-making. Cognitive risks are subconscious and unconscious influence factors on human decision-making: heuristics and biases. To understand the scope of cognitive risk, we look at case studies, ...

Privacy in Practice Establish and Operationalize a Holistic Data Privacy Program

Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program

1st Edition

By Alan Tang
March 01, 2023

Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies, societies, and everyday lives. ...

13-24 of 73
AJAX loader