Formerly the Internal Audit and IT Audit series - now rebranded and wider in scope!
The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.
The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.
Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT, Audit Management and Leadership, and Operational Auditing.
If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]
By Ken Sigler, James L. Rainey, III
January 22, 2016
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come...