{"id":109143,"date":"2020-04-13T06:00:19","date_gmt":"2020-04-13T13:00:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=109143"},"modified":"2020-04-21T14:14:30","modified_gmt":"2020-04-21T21:14:30","slug":"cyber-canon-cyber-conundrum","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/04\/cyber-canon-cyber-conundrum\/","title":{"rendered":"Book Review: \"The Cyber Conundrum\""},"content":{"rendered":"<p><b>Cybersecurity Canon Candidate Book Review: <\/b><span style=\"font-weight: 400;\">\u201cThe Cyber Conundrum: How Do We Fix Cybersecurity?\u201d<\/span> <span style=\"font-weight: 400;\">by Peter K. Chronis (published February 9, 2018)<\/span><\/p>\n<p><b>Book reviewed by:<\/b><span style=\"font-weight: 400;\"> M. K. Palmore, Field CSO (Americas), Palo Alto Networks<\/span><\/p>\n<p><b>Bottom Line: <\/b><i><span style=\"font-weight: 400;\">I don\u2019t recommend this book for the Cybersecurity Canon Hall of Fame.\u00a0<\/span><\/i><\/p>\n<p><b>Review:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Fixing the cybersecurity problem is a difficult topic to cover and may very well be <\/span><i><span style=\"font-weight: 400;\">the <\/span><\/i><span style=\"font-weight: 400;\">challenge of our modern lives. As we all watch this fast-moving train called \u201cdigital innovation\u201d explode and expand our daily existence, the challenge of securing our connections and protecting our data has become paramount. Every year, we witness continued successful attempts by cyber adversaries to encroach on our digital boundaries.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Part of the difficulty in covering this subject comes from how computers, networked devices, mobile devices and their apps have completely taken over our existence. These devices and the data they contain are quickly becoming <img loading=\"lazy\" decoding=\"async\"  class=\"alignleft wp-image-109145 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/cyber-conun2.jpg\" alt=\"&quot;The Cyber Conundrum: How Do We Fix Cybersecurity?&quot; by Peter K. Chronis\" width=\"271\" height=\"407\" \/>the cornerstone of our lives. Our personal and professional interactions are both captured and facilitated by these devices and the thousands of applications that have become the core basis of the human experience for many people around the world. The author of \u201cThe Cyber Conundrum,\u201d Peter Chronis, does a great job of exploring the complexities of this current state of play, writing about nearly every aspect of this complex and developing relationship. His descriptions are largely academic, but maybe that is a requirement of the times. Few have the kind of direct knowledge of the complexities that would be necessary to really drive the call to arms he\u2019s subtly advocating.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the second phase of the book, Chronis describes or provides examples of previous moonshots, which include the actual successful attempt by the United States to put a man on the moon. After providing this formula, Chronis lets the reader down lightly by describing how the various critical elements of the public and private sector would be called to collaborate on an effective solution for cybersecurity. This solution is never described in detail, but Chronis leaves the reader believing it\u2019s not possible for these various elements to actually achieve the desired result.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I enjoyed reading this book. As someone who has seen the cyber threat landscape up close, I think Chronis aptly describes the problem. Seasoned cybersecurity professionals will be familiar with the elements \u201cThe Cyber Conundrum\u201d lays out in its overview of how to change the cybersecurity landscape. However, while Chronis covers the variables, he does not appear to really close the circle of his lofty description of the potential moonshot goal. Chronis makes an admirable attempt, but in the end, the book seems rushed and fails to offer a clear path to success. When the book ended, I needed more. Maybe Chronis will deliver this in a second offering?<\/span><\/p>\n<p><i>We modeled the\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i>Cybersecurity Canon<\/i><\/a><i>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/i><\/p>\n<p><i>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i>directly participate in the process<\/i><\/a><i>. Please do so!<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThe Cyber Conundrum\u201d by Peter K. Chronis advocates for a cybersecurity \u201cmoonshot,\u201d but falls short of offering a clear path to success.<\/p>\n","protected":false},"author":668,"featured_media":109043,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[4270],"coauthors":[6862],"class_list":["post-109143","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/CANON-LOGO_350x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/668"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=109143"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109143\/revisions"}],"predecessor-version":[{"id":109159,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109143\/revisions\/109159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/109043"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=109143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=109143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=109143"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=109143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}