BOOK SERIES


Internal Audit and IT Audit


About the Series

The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting new series is to produce leading-edge books on critical subjects facing audit executives as well as internal and IT audit practitioners.

Key topics that will be addressed over the coming years include Audit Leadership, Cybersecurity, Strategic Risk Management, Auditing Various IT Activities and Processes, Audit Management, and Operational Auditing.

24 Series Titles

Per Page
Sort

Display
Risk-Based IT Auditing: Adding-Value and Improving Operations Through Business-Centric IT Auditing

Risk-Based IT Auditing: Adding-Value and Improving Operations Through Business-Centric IT Auditing

Forthcoming

Tichaona Zororo
January 02, 2018

The book assists professionals in pursuing a career in IT audit or advancing their IT audit skills. Readers gain practical knowledge and skills to perform IT Audits that add value to business. It equips experienced and aspiring IT auditors to perform Risk-Based IT Audits focused on identifying key...

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Forthcoming

Ken Sigler, Dan Shoemaker, Anne Kohnke
January 02, 2018

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply...

The Audit Value Factor

The Audit Value Factor

Forthcoming

Daniel Samson
November 01, 2017

This book provides practitioners with strategies and tools for establishing and maintaining a successful, value-centric internal audit organization. It explores opportunities to gain management support through early wins; methods to systematically identify process improvement opportunities, cost...

Fighting Corruption in a Global Marketplace: How Culture, Geography, Language and Economics Impact Audit and Fraud Investigations around the World

Fighting Corruption in a Global Marketplace: How Culture, Geography, Language and Economics Impact Audit and Fraud Investigations around the World

Forthcoming

Mary Breslin
October 15, 2017

The risk of corruption continues to rise as business becomes more and more global for most companies. Even domestic companies without an international footprint face global corruption challenges as venders, customers and service providers go overseas and outsource abroad to streamline their...

A Practical Guide to Performing Fraud Risk Assessments

A Practical Guide to Performing Fraud Risk Assessments

Forthcoming

Mary Breslin
October 15, 2017

All organizations face fraud risk. Understanding how to properly identify and assess potential fraud risk helps a business develop and implement an effective fraud program that can reduce the associated potential financial, reputation and organization risks. The ability for an organization to...

Building and Managing an Effective Security Operations Center

Building and Managing an Effective Security Operations Center

Forthcoming

James L. Rainey, III
September 15, 2017

An information security operations involves monitoring, assessing, and defending enterprise information systems. For organizations without a formalized incident-handling capability, the creation from scratch of a security operations center that enables centralized visibility, alerting and...

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It: The Missing Link in Security Management--and How to Fix It

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It: The Missing Link in Security Management--and How to Fix It

Forthcoming

Barak Engel
September 01, 2017

This book provides insight as to why and how current security management practices fail at their basic foundation, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. The author examimes the reasons and how to fix them. The resulting improvement...

Practitioner’s Guide to Business Impact Analysis

Practitioner’s Guide to Business Impact Analysis

Forthcoming

Priti Sikdar
May 17, 2017

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists...

Data Analytics for Internal Auditors

Data Analytics for Internal Auditors

Forthcoming

Richard E. Cascarino
April 03, 2017

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

Forthcoming

Eugene M Fredriksen
March 22, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Forthcoming

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 17, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

Forthcoming

James Bone
February 07, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security...

AJAX loader