Showing 1–10 of 24 results

  • Sale! Screen Shot 2017-03-28 at 1.44.56 PM

    A Guide to (NICE) Cybersecurity Workforce Framework (2.0)

    $89.95 $58.50

    A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly.

  • BlueBook Insights

    BlueBook Insights


    BlueBook Insights is a quarterly magazine that features market news and industry trends in the GRC space.  The goal of BlueBook Insights is to keep readers finger on the pulse of GRC mergers & acquisitions, give a voice to GRC vendors and provide interviews on new products and services as well as interesting insights into trends that may impact the market for GRC products and services.

  • Sale! Placeholder

    Building and Managing an Effective Security Operations Center

    $79.95 $52.00

    An information security operations involves monitoring, assessing, and defending enterprise information systems. For organizations without a formalized incident-handling capability, the creation from scratch of a security operations center that enables centralized visibility, alerting and investigation can be a daunting task. But fortunately organizations don’t need a room full of security experts and an investment of millions of dollars in security systems to make progress here. This book explains how to develop an effective security operations center (SOC) and provides a roadmap for continuously evolving this capability to keep pace with the tactics of the adversaries.

  • Sale! Screen Shot 2017-03-28 at 1.10.04 PM

    Cognitive Hack

    $79.95 $52.50

    This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

  • Sale! Screen Shot 2017-03-28 at 2.55.40 PM

    Corporate Defense and the Value Preservation Imperative

    $79.95 $52.00

    This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the concept of the value preservation imperative as representing an organization's obligation to its stakeholders to take adequate steps to preserve value and help defend against value erosion, reduction, or destruction.

  • Sale! Screen Shot 2017-03-29 at 1.35.51 AM

    Data Analytics for Internal Auditors

    $69.95 $45.50

    There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that auditors as well as management have the ability to examine high volumes of data and transactions to determine patterns and trends. The increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.

  • Sale! Screen Shot 2017-03-28 at 5.08.54 PM

    Ethics and the Internal Auditor’s Political Dilemma

    $79.95 $52.00

    This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA Standards, but the reality is that the pressure placed on internal auditors related to execution of work and upholding ethical standards can be very difficult. Regardless of best practice or theory, auditors must be personally prepared to manage through issues they run across.

  • Buyers Guide

    GRC Buyer’s Guide


  • Vendor Market Analysis

    GRC Vendor Market Analysis


  • Sale! Screen Shot 2017-05-22 at 6.27.18 PM

    Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

    $89.95 $58.50

    The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an “application” of the risk management process as well as the fundamental elements of control formulation within an applied context.