{"id":104670,"date":"2020-01-02T06:00:52","date_gmt":"2020-01-02T14:00:52","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=104670"},"modified":"2020-04-21T14:16:22","modified_gmt":"2020-04-21T21:16:22","slug":"cyber-canon-tribe-of-hackers","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/01\/cyber-canon-tribe-of-hackers\/","title":{"rendered":"Cybersecurity Canon Candidate Book Review: Tribe of Hackers"},"content":{"rendered":"<p><strong>Cyber Canon Book Review:\u00a0<\/strong><span style=\"font-weight: 400;\">\u201cTribe of Hackers\u201d (2019), by Marcus J. Carey and Jennifer Jin<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Book Reviewed by:<\/strong> John Breth, Founder\/Managing Principal at J.B.C.<\/span><\/p>\n<p><b>Bottom Line: <\/b><i><span style=\"font-weight: 400;\">I recommend this book for the Cybersecurity Canon Hall of Fame.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Review:<\/strong>\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The path to enlightenment in the cybersecurity community is a perilous one. Often, those new to the industry must not only find their own niche but also blaze their own trails, as the field is constantly changing and evolving.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The typical path first involves the search for information. Information, when gathered and ingested, becomes knowledge. Knowledge, when used, transforms into experience. The pinnacle is reached when all three are successfully combined into wisdom. Wisdom is hard to quantify and extremely valuable to attain, especially for those new to the industry.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tribe of Hackers is written and organized by Marcus J. Carey and Jennifer Jin with the intent of gathering cybersecurity advice from the best hackers in the world. The book is filled with interviews from many talented hackers, defenders and leaders who are experts in cybersecurity. Some are extremely well known to the community, while others would have their expertise brought to light by being featured in this book.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagine the impact of gleaning the best pieces of information, knowledge, experience and wisdom from 70 of the top cybersecurity practitioners, leaders and luminaries in the world and putting it into a book called \u201cTribe of Hackers.\u201d The totality of the information shared is unprecedented in cybersecurity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The book is presented in an interview form. Each of the 70 hackers is asked the same group of questions. The format of the book is fantastic and lends itself to being as much a reference guide as collections of small stories. The vast array of experiences and stories, coupled with a lot of the same underlying themes of successes, failures, lessons learned and recommendations is both informational and inspirational. Carey notes that his vision for this book and the format was very much inspired by the Timothy Ferriss book, \u201cTribe of Mentors,\u201d which gathers information from more than 100 top performers in the various industries including sports, art, business, and science.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key to getting great input from those involved is derived directly from the type of questions asked,\u00a0 which are a combination of industry, general and personal questions. The answers are viewed through the lenses of cybersecurity and infosec, and the discussions are focused around these 14 questions:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If there is one myth that you could debunk in cybersecurity, what would it be?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is one of the biggest bang-for-the-buck actions that an organization can take to improve their cybersecurity posture?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How is it that cybersecurity spending is increasing but breaches are still happening?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do you need a college degree or certification to be a cybersecurity professional?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How did you get started in the cybersecurity field, and what advice would you give to a beginner pursuing a career in cybersecurity?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is your specialty in cybersecurity? How can others gain expertise in your specialty?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is your advice for career success when it comes to getting hired, climbing the corporate ladder, or starting a company in cybersecurity?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What qualities do you believe all highly successful cybersecurity professionals share?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is the best book or movie that can be used to illustrate cybersecurity challenges?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is your favorite hacker movie?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What are your favorite books for motivation, personal development or enjoyment?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is some practical cybersecurity advice you give to people at home in the age of social media and the internet of things?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is a life hack that you\u2019d like to share?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is the biggest mistake you\u2019ve ever made, and how did you recover from it?<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Besides the impact of collecting this treasure trove of career, technical and personal recommendations, this book has a unifying impact amongst the cyber community. A key component to this that should not be overlooked is that the biographical section of each of the contributors provides the Twitter handles of the participants. In doing so,\u00a0 it transforms the information sharing from happening solely within the book, inviting access to a much larger community on Twitter and other social media platforms.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Engagement and sharing of information between the contributors and those who are seeking knowledge cannot be underestimated. The lasting and cascading impact of the increased community cohesion caused by \u201cTribe of Hackers\u201d can be felt throughout the industry. This positive impact has already led to new security conferences and sequels to the original book (\u201cTribe of Hackers: Red Team\u201d).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the collection of experiences from a large cohort of leaders in the industry and the continuing positive impact it has had bringing together and uplifting folks within the industry isn\u2019t enough, let me leave you with this: \u201cTribe of Hackers\u201d has been made available in\u00a0 paperback and PDF, with <\/span><i><span style=\"font-weight: 400;\">all<\/span><\/i><span style=\"font-weight: 400;\"> proceeds from the paperback format going to charities such as Bunker Labs, Sickle Cell Disease Associations of America, Rainforest Partnership and Start-Up! Kid\u2019s Club. Equally amazing, the PDF format is completely free, as the authors understood the importance and positive impact that sharing all this information with the infosec community would have.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cTribe of Hackers\u201d is not just a book about the cybersecurity community; it is a gift <\/span><i><span style=\"font-weight: 400;\">to<\/span><\/i><span style=\"font-weight: 400;\"> the cybersecurity community!<\/span><\/p>\n<p><i>We modeled the\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i>Cybersecurity Canon<\/i><\/a><i>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/i><\/p>\n<p><i>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i>directly participate in the process<\/i><\/a><i>. Please do so!<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cTribe of Hackers,\u201d by Marcus J. Carey and Jennifer Jin, is not just about the cybersecurity community; it is a gift to the cybersecurity community!<\/p>\n","protected":false},"author":663,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[4270],"coauthors":[6967],"class_list":["post-104670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=104670"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104670\/revisions"}],"predecessor-version":[{"id":104671,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104670\/revisions\/104671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=104670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=104670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=104670"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=104670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}