The Practitioner Series is intended for the CISO, their direct staff, and all practitioners of cybersecurity in the firm who need to understand critical processes at an in-depth level. Our latest entries in this series are the two-volume set A Comprehensive Guide to Application Security for CISOs, written by Nitzan Levi and Yuval Sinay and from Helen Patton and Josiah Dykstra, Switching to Cyber: The Mid-Career Guide to Launching a Cybersecurity Career. Volume One of Application Security for CISOs covers the foundations of application security and Volume Two dives deep into developing and maintaining secure applications. Switching to Cyber: The Mid-Career Guide to Launching a Cybersecurity Career, will help grow the ranks of security practitioners by showing every mid-career individual how to use the skills and experience they have to switch to a rewarding career in cyber security. 
 
For executives and managers who are required to lead the response to cyber crises, we offer Cyber Crisis Response: Leveraging the SONAR Method™ to Accelerate Response and Recovery. Written by crisis response experts Andrew Gorecki and Christopher Scott, this book walks you through a tried-and-true method develop by Andrew and Chris through their years of experience in leading companies in responding to cyber events that devolved into full-blown crises. Also in this series is Develop Your Cybersecurity Career Path, which goes in-depth about breaking into cyber at any level. Straight out of school, transitioning from a military career or doing a mid-career transition, this book is for you. And finally, coming in early 2026, CISO Case Studies on leadership Hacks, career scenarios & Incident Reviews for Practitioners and Cyber Executives is an expert treatise by Gary Hayslip and Nate Case that takes apart some of the high-profile hacks we’ve experienced to see what we can learn to be a cyber-safe society.

We have certainly entered the era of the celebrity breach. Rather than dwell on the technical capabilities of the bad actors or the technical shortcomings of the victims, in this book we’re going to focus on the key lessons we can learn. It is so important that everyone understands how their role contributes to the overall security of the venture, so we’ll look at the controls we should have in place, the best practices we should implement, the monitoring that would detect our vulnerabilities, and the audit tasks we should perform to create a healthier program. Board members are asking “Could this happen to us?” and we need to examine what went wrong before we can answer that question.

This book can be used to strengthen your team and educate executives who wish to have a deeper understanding of incident response preparation and incident postmortem investigations. It can also be used by educators as material for class assignments, including group projects.