Mastering Cyber Resilience
AI SECURITY ESSENTIALS
IT Auditing Using Controls to Protect Information Assets, Third Edition
Cybersecurity and Third-Party Risk: Third-Party Threat Hunting 1st
Zero Trust and Third-Party Risk: Reduce the Blast Radius 1st Edition
Speak Security With A Business Accent: How to communicate cybersecurity concepts clearly, ease friction with stakeholders, and influence decisions
Extreme Ownership
CMMC Assessment Handbook: A preparation, implementation, and self-assessment Guide for safeguarding FCI/CUI data.
The Security Risk Assessment Handbook 3rd Edition
RMF ISSO: Foundations (Guide)
NIST 800 Risk Management Framework for Cybersecurity Professionals
NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity)
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
Unveiling the NIST RISK MANAGEMENT FRAMEWORK (RMF)
Fire Doesn't Innovate
Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber Program
ISO 27001 Controls Handbook: Implementing and auditing 93 controls to reduce information security risks
Never Split the Difference: Negotiating as if Your Life Depended on It
Talk Like TED
CISA - Certified Information Systems Auditor Study Guide - Second Edition
Hacker Inc.: Mindset For Your Career
Storyworthy
Engage, Teach, Persuade, and Change Your Life Through the Power of Storytelling
Certified Information Security Manager CISM Study Guide
Cybersecurity Governance and Compliance: A Comprehensive Guide for Professionals in Effective Cybersecurity Governance and Compliance
Cybersecurity: Unlock Your Potential, The Beginner's Guide to a Rewarding Career
The Art of Deception
Crucial Conversations: Tools for Talking When Stakes are High, Third Edition
How To Give Yourself a GRC MBA
Cysbersecurity Career Master Plan
Information Security for Small and Midsized Businesses
How to win Friend & Influence People