Reading List

Practical advice on building Information Security & Privacy Program

  1. How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard and Richard Seiersen
  2. CISO Desk Reference Guide Volume 1 by Bill Bonney, Gary Hayslip, and Matt Stamper
  3. CISO Desk Reference Guide Volume 2 by Bill Bonney, Gary Hayslip, and Matt Stamper

Information & Cyber Security

Book Shelf: Cyber Security Canon Winners

  1. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
  2. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
  3. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
  4. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
  5. The Perfect Weapon: How the Cyber Arms Race Set the World Afire
  6. The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
  7. Zero Trust Networks: Building Secure Systems in Untrusted Networks
  8. LikeWar: The Weaponization of Social Media
  9. Ciso Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
  10. Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
  11. American Spies: Modern Surveillance, Why You Should Care, and What to Do about It
  12. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  13. Security Engineering: A Guide to Building Dependable Distributed Systems
  14. Site Reliability Engineering: How Google Runs Production Systems
  15. Worm: The First Digital World War
  16. Crypto: How the Code Rebels Beat the Government–Saving Privacy in the Digital Age
  17. Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
  18. Winning As a Ciso
  19. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
  20. Cyber War: The Next Threat to National Security and What to Do About It
  21. Future Crimes
  22. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
  23. Measuring and Managing Information Risk: A Fair Approach
  24. Tallinn Manual on the International Law Applicable to Cyber Warfare
  25. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
  26. Zero Day


  1. The 360 Degree Leader by John C. Maxwell
  2. The Delicate Art of Bureaucracy by Mark Schwartz
  3. The 5 Levels of Leadership by John C. Maxwell
  4. An Elegant Puzzle by Will Larson
  5. The 21 Irrefutable Laws of Leadership by John C. Maxwell
  6. Good Strategy Bad Strategy by Richard Rumelt


  1. Autobiography of a Yogi by Paramhansa Yogananda


  1. Ultralearning by Scott Young
  2. Steal Like an Artist by Austin Kleon
  3. The 15 Invaluable Laws of Growth by John C. Maxwell
  4. Effective Notetaking by Fiona McPherson
  5. Neuro-Learning by Peter Hollins
  6. The Inner Game of Work by W. Timothy Gallwey
  7. The Lifetime Learner’s Guide to Reading and Learning by Gary Hoover

Creative Expression

  1. The War of Art by Steven Pressfield
  2. Show Your Work! by Austin Kleon


  1. Get Anyone to Do Anything by David J. Lieberman
  2. Mind Lines by L. Michael Hall

Project Management

  1. Deeply Practical Project Management by William Stewart
You've successfully subscribed to Ishan Girdhar
Great! Next, complete checkout to get full access to all premium content.
Error! Could not sign up. invalid link.
Welcome back! You've successfully signed in.
Error! Could not sign in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Error! Stripe checkout failed.
Success! Your billing info is updated.
Error! Billing info update failed.