The Practitioner Series is intended for the CISO, their direct staff, and all practitioners of cybersecurity in the firm who need to understand critical processes at an in-depth level. Our latest entries in this series are the two-volume set A Comprehensive Guide to Application Security for CISOs, written by Nitzan Levi and Yuval Sinay. Volume One covers the foundations of application security and Volume Two dives deep into developing and maintaining secure applications. Coming in December 2025, Switching to Cyber: The Mid-Career Guide to Launching a Cybersecurity Career, by Joshia Dykstra and Helen Patton, will help grow the ranks of security practitioners by showing every mid-career individual how to use the skills and experience they have to switch to a rewarding career in cyber security. 
 
For executives and managers who are required to lead the response to cyber crises, we offer Cyber Crisis Response: Leveraging the SONAR Method™ to Accelerate Response and Recovery. Written by crisis response experts Andrew Gorecki and Christopher Scott, this book walks you through a tried-and-true method develop by Andrew and Chris through their years of experience in leading companies in responding to cyber events that devolved into full-blown crises. Also in this series is Develop Your Cybersecurity Career Path, which goes in-depth about breaking into cyber at any level. Straight out of school, transitioning from a military career or doing a mid-career transition, this book is for you. And finally, coming in early 2026, CISO Case Studies on leadership Hacks, career scenarios & Incident Reviews for Practitioners and Cyber Executives is an expert treatise by Gary Hayslip and Nate Case that takes apart some of the high-profile hacks we’ve experienced to see what we can learn to be a cyber-safe society.

Switching to Cyber will help you:

      • Find your cybersecurity niche: Discover the diverse career paths within the field, leveraging your existing skills and interests to find the perfect fit.
      • Bridge the skill gap: Learn about the essential technical and non-technical skills needed, with practical guidance on acquiring them through certifications, online courses, and real-world experience.
      • Conquer the tech intimidation: Gain confidence in navigating the digital landscape, mastering key concepts in a clear, accessible way.
      • Network like a pro: Learn insider tips and strategies for building connections within the cybersecurity community, landing interviews, and showcasing your unique value.
      • Transfer your existing expertise: Discover how your life and professional experiences make you a valuable addition to any cybersecurity team, bringing a unique perspective and maturity often missing in younger cohorts.

    We have certainly entered the era of the celebrity breach. Rather than dwell on the technical capabilities of the bad actors or the technical shortcomings of the victims, in this book we’re going to focus on the key lessons we can learn. It is so important that everyone understands how their role contributes to the overall security of the venture, so we’ll look at the controls we should have in place, the best practices we should implement, the monitoring that would detect our vulnerabilities, and the audit tasks we should perform to create a healthier program. Board members are asking “Could this happen to us?” and we need to examine what went wrong before we can answer that question.

    This book can be used to strengthen your team and educate executives who wish to have a deeper understanding of incident response preparation and incident postmortem investigations. It can also be used by educators as material for class assignments, including group projects.