Showing 1–10 of 26 results

  • Screen Shot 2017-03-28 at 1.44.56 PM

    A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)


    The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

  • Screen Shot 2017-03-28 at 1.10.04 PM

    Cognitive Hack: The New Battleground in Cybersecurity…the Human Mind


    This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.


  • Screen Shot 2017-03-28 at 2.55.40 PM

    Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program


    The book addresses the corporate defense requirement from various perspectives and helps readers to understand the critical interconnections and inter-dependencies which exist at strategic, tactical, and operational levels. It facilitates the reader in comprehending the importance of appropriately prioritizing corporate defense at a strategic level, while also educating the reader in the importance of managing corporate defense at a tactical level, and executing corporate defense activities at an operational level.

  • Screen Shot 2017-03-29 at 1.35.51 AM

    Data Analytics for Internal Auditors


    The increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools. This book takes an auditor from a zero base to an ability to professionally analyze corporate data seeking anomalies.

  • Screen Shot 2017-03-28 at 5.08.54 PM

    Ethics and the Internal Auditor’s Political Dilemma: Tools and Techniques to Evaluate a Company’s Ethical Culture


    Lynn A. Fountain, CGMA, CRMA, MBA, has over 35 years of experience in the business profession, which includes public and industry accounting and over 20 years within internal and external auditing combined. She is a nationally recognized trainer and speaker and a published author. In April 2015, the Institute of Internal Auditors Research Foundation released Ms. Fountain’s first technical book “Raise the Red Flag – The Internal Auditor’s Guide to Fraud Evaluations. In October 2015, Ms. Fountain’s book “Leading The Internal Audit Function”, will be the first book released for Dan Swanson’s book series. Ms. Fountain has been a successful past Chief Audit Executive for two international companies. She was instrumental for implementation Sarbanes-Oxley in the initial years with her public utility. She has been recognized as a leader and innovator in SOX processes. She is a subject matter expert and specializes in Internal Audit, Sarbanes-Oxley, Enterprise Risk Management, Fraud, Governance and Compliance.

  • Vendor Market Analysis

    GRC Buyer’s Guide


    The GRC Buyer’s Guide:

    • The GRC Buyer’s Guide is similar to “Consumer’s Report” for technology solutions providers
    • The GRC Buyer’s Guide for technology is a summary view of thousands of solutions*
    • The GRC Buyer’s Guide will provide a Snap-Shot view of features & benefits by vendor solution vertical
    • The GRC Buyers’ Guide will not be completed until 2018. Pre-orders are allowed with no charge until delivery of the guide.

  • Silhouettes of Business People Walking in the Office

    GRC Vendor Market Analysis


    Vendor Market Analysis:

    • “VMA” is an annual subscription
    • The VMA is ideally suited for Private Equity & Venture Capital investors, Risk Professionals, and benchmarking against industry verticals
    • VMA will not pick winners/loser; the focus is on clarifying features, benefits & capabilities amongst a limited set of targeted peer providers
    • The VMA is designed to clarify market differentiators among peers and should not be used solely for buying decisions

  • BlueBook Insights

    GRCBlueBook Insights Package


    GRC BlueBook Insights Package:

    I. Quarterly newsletter on Industry Trends

    II. Insights on technology trends, cyber risk and market players

    III. Industry research from TheGRCBlueBook

    IV. Development of the Cognitive Risk Framework for Enterprise Risk and Cybersecurity – the Human Element

  • Screen Shot 2017-05-22 at 6.27.18 PM

    Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework


    Implementing Cybersecurity is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an “application” of the risk management process as well as the fundamental elements of control formulation within an applied context.

  • Screen Shot 2017-03-28 at 4.58.47 PM

    Internal Audit Practice from A to Z


    Unique in that it is primarily written to guide internal auditors in the process and procedures necessary to carry out professionally accepted internal audit functions, it includes everything necessary to start, complete and evaluate an internal audit practice, simplifying the task for even non-professionals.