Formerly the Internal Audit and IT Audit series - now rebranded and wider in scope!
The scope and mandate for internal audit continues to evolve each year, as does the complexity of the business environment and speed of the changing risk landscape in which it must operate.
The fundamental goal of this exciting series is to produce leading-edge books on critical subjects facing security and audit executives and practitioners.
Key topics addressed include Leadership, Cybersecurity, Security Leadership, Privacy, Strategic Risk Management, Auditing IT, Audit Management and Leadership, and Operational Auditing.
If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]
By Richard E. Cascarino
March 15, 2017
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...
By Anne Kohnke, Ken Sigler, Dan Shoemaker
March 08, 2017
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain ...
By Eugene Fredriksen
March 13, 2017
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each ...
By Anne Kohnke, Dan Shoemaker, Ken Sigler
April 04, 2016
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day ...
By Ken Sigler, James L. Rainey, III
January 22, 2016
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come...