Insider Threat Mitigation for Critical Infrastructure (Especially Data Centers and Utility Companies)
The Changing Terrorist Attack Cycle: Emerging Trends in Terrorism
Effective Vulnerability Assessments for Critical Infrastructure
Biological Terrorism: The Insider Threat
How Strong is Your ESRM Game? - How to Measure Your Security Function Using the ASIS ESRM Maturity Model