Showing 21–26 of 26 results

  • Screen Shot 2017-03-28 at 2.34.35 PM

    Software Quality Assurance: Integrating Testing, Security, and Audit


    The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit.

  • qtq80-IJ5Tmc

    Supporting Sponsor


    Supporting Sponsor:

    • One “Spotlight Article” per Quarter
    • Select placement of ads/each month
    • Highlight Supporting Sponsors on Social Media

  • Screen Shot 2017-03-29 at 1.43.46 AM

    The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development


    The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.

  • Screen Shot 2017-03-28 at 2.22.38 PM

    The Complete Guide to Cybersecurity Risks and Controls


    The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats.

  • Screen Shot 2017-06-05 at 4.44.22 PM

    The Data Protection Officer: Profession, Rules, and Role


    The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.

  • Screen Shot 2017-05-22 at 6.00.54 PM

    Why CISOs Fail: The Missing Link in Security Management–and How to Fix It


    The author examines the reasons and suggests how to fix them. The resulting improvement is highly beneficial to any corporation that chooses to pursue this approach or strategy and from a bottom-line and business operations perspective, not just in technical operations. This book transforms the understanding of the role of the CISO, the selection process for a CISO, and the financial impact that security plays in any organization