View All Book Series

BOOK SERIES


Internal Audit and IT Audit


About the Series

The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.

The fundamental goal of this exciting new series is to produce leading-edge books on critical subjects facing audit executives as well as internal and IT audit practitioners.

Key topics that will be addressed over the coming years include Audit Leadership, Cybersecurity, Strategic Risk Management, Auditing Various IT Activities and Processes, Audit Management, and Operational Auditing.

25 Series Titles

Per Page
Sort

Display
Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

1st Edition

Forthcoming

Shaun Aghili
June 01, 2019

This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also...

Building and Managing an Effective Security Operations Center

Building and Managing an Effective Security Operations Center

1st Edition

Forthcoming

James L. Rainey, III
April 15, 2019

An information security operations involves monitoring, assessing, and defending enterprise information systems. For organizations without a formalized incident-handling capability, the creation from scratch of a security operations center that enables centralized visibility, alerting and...

How to Build a Cyber-Resilient Organization

How to Build a Cyber-Resilient Organization

1st Edition

Dan Shoemaker, Anne Kohnke, Ken Sigler
December 03, 2018

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of...

Auditor Essentials: 100 Concepts, Tips, Tools, and Techniques for Success

Auditor Essentials: 100 Concepts, Tips, Tools, and Techniques for Success

1st Edition

Hernan Murdock
October 09, 2018

Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession. This easy to use reference makes this process easier and ensures auditors can obtain needed information quickly and...

Project Management Capability Assessment: Performing ISO 33000-Based Capability Assessments of Project Management

Project Management Capability Assessment: Performing ISO 33000-Based Capability Assessments of Project Management

1st Edition

Peter T. Davis, Barry D. Lewis
September 18, 2018

Learn how to perform project management according to international standards of compliance using capability assessment processes. This book compares and contrasts the approach to project management using ISO 21500 against the more direct ISO 33000 Capability Assessment. It shows how to assess...

Internet of Things, for Things, and by Things

Internet of Things, for Things, and by Things

1st Edition

Abhik Chaudhuri
August 10, 2018

This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally...

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

1st Edition

Ken Sigler, Dan Shoemaker, Anne Kohnke
November 03, 2017

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply...

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

1st Edition

Barak Engel
October 12, 2017

This book serves as an introduction into the world of security and provides insight into why and how current security management practices fail, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. The author examines the reasons and suggests how...

Practitioner's Guide to Business Impact Analysis

Practitioner's Guide to Business Impact Analysis

1st Edition

Priti Sikdar
June 02, 2017

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists...

Data Analytics for Internal Auditors

Data Analytics for Internal Auditors

1st Edition

Richard E. Cascarino
March 15, 2017

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

1st Edition

Eugene M Fredriksen
March 13, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

1st Edition

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 08, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

AJAX loader