{"id":116143,"date":"2020-07-17T09:00:25","date_gmt":"2020-07-17T16:00:25","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=116143"},"modified":"2020-07-17T08:53:45","modified_gmt":"2020-07-17T15:53:45","slug":"cyber-canon-ohio-state-university","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/07\/cyber-canon-ohio-state-university\/","title":{"rendered":"The Ohio State University Assumes Leadership of Cybersecurity Canon"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">This year\u2019s induction to the Cybersecurity Canon Hall of Fame marks the beginning of a new era for this network-defender community project. We\u2019re proud to recognize the inductees for the 2019-20 season: five must-read cybersecurity books. At the same time, Palo Alto Networks, which has been the project\u2019s primary sponsor since it was started seven years ago, passes primary leadership of the project to The Ohio State University.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks has supported the Cybersecurity Canon project since 2013, and Rick Howard chaired the Canon Committee from the beginning.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Howard says, \u201cIt has been my great pleasure for the past six years to be the shepherd of the Cybersecurity Canon Project. For those who have met me or follow me on social media, you know that I love reading \u2013 any kind of reading really, but especially about cybersecurity. I got this crazy idea that we could create a Rock and Roll Hall of Fame for cybersecurity books. The amazing thing is that Palo Alto Networks decided to sponsor it. Through the indulgence and support of some visionary Palo Alto Networks leaders and through the voluntary efforts of the various committee members over the years, we have built quite a substantial recommended cybersecurity library, essential books for all cybersecurity professionals that will make their education whole. I am very proud of this effort.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Altogether, the project has named 36 books to its Hall of Fame and published some<\/span> <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon-review\/\"><span style=\"font-weight: 400;\">90 book reviews<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, Howard says, \u201cIt is time for a new organization to take on the mantle of supporting the Cybersecurity Canon Project. I am unable to contain my excitement that Ohio State University has stepped up to take on that role. My good friend Helen Patton, Ohio State University's CISO, will take over for me as committee chairman, and I can hardly wait to see how she shapes the project going forward.\u201d Howard intends to continue sharing his love of cybersecurity books, saying, \u201cDon\u2019t worry about me. I will still be involved as a committee member for as long as Helen will have me.\u201d<\/span><\/p>\n<p><a href=\"https:\/\/icdt.osu.edu\/news\/2020\/07\/cybersecurity-canon-moving-ohio-state-university\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Patton and Ohio State University assume leadership of the Cybersecurity Canon Project<\/span><\/a><span style=\"font-weight: 400;\"> starting with its current 2020-21 season. She says, \u201cThe Cybersecurity Canon is <\/span><i><span style=\"font-weight: 400;\">the<\/span><\/i><span style=\"font-weight: 400;\"> go-to resource for cybersecurity practitioners, providing a place to begin and expand learning. I am excited that Ohio\u2019s Institute for Cybersecurity and Digital Trust has agreed to support this terrific service. I\u2019m excited to see how OSU will grow the Canon to include other media and partners and use it to engage students and faculty.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The inductees for the 2019-2020 season are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/02\/cyber-canon-ciso-compass\/\"><span style=\"font-weight: 400;\">\"CISO Compass\"<\/span><\/a><span style=\"font-weight: 400;\"> by Todd Fitzgerald.<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/12\/cybersecurity-canon-review-ciso-desk-reference-guide-practical-guide-cisos\/\"><span style=\"font-weight: 400;\">\u201dCISO Desk Reference Guide Vol I<\/span><\/a><span style=\"font-weight: 400;\">\u201d and \u201c<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/03\/cybersecurity-canon-ciso-desk-reference-guide-practical-guide-cisos\/\"><span style=\"font-weight: 400;\">CISO Desk Reference Guide Vol II<\/span><\/a><span style=\"font-weight: 400;\">\u201d by Gary Hayslip, Bill Bonney, and Matt Stamper.<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/01\/cyber-canon-cult-of-the-dead-cow\/\"><span style=\"font-weight: 400;\">\"Cult of the Dead Cow\u201d<\/span><\/a><span style=\"font-weight: 400;\"> by Joseph Menn.<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/03\/cyber-canon-the-perfect-weapon\/\"><span style=\"font-weight: 400;\">\"The Perfect Weapon\u201d<\/span><\/a><span style=\"font-weight: 400;\"> by David Sanger.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The committee has also awarded its prestigious lifetime achievement award to <\/span><span style=\"font-weight: 400;\">Richard Clarke and Robert Knake, who wrote <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/02\/cyber-canon-fifth-domain\/\"><span style=\"font-weight: 400;\">\"The Fifth Domain\u201d<\/span><\/a><span style=\"font-weight: 400;\"> (which was also inducted this season) and <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/cybersecurity-canon-cyber-warfare\/\"><span style=\"font-weight: 400;\">\"Cyberwar: The Next Threat to National Security and What to Do About It\u201d<\/span><\/a><span style=\"font-weight: 400;\"> (inducted in the 2016-2017 season).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The authors and books were scheduled to be honored at a gala awards dinner in Washington, but the decision was made to forgo the in-person event due to the COVID-19 pandemic.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/icdt.osu.edu\/cybercanon\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Cybersecurity Canon\u2019s new home<\/span><\/a><span style=\"font-weight: 400;\"> can be found within the website of the Institute for Cybersecurity and Digital Trust. Patton says that Ohio State looks forward to adding new enhancements to the Cyber Canon in the coming months and welcomes all input.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the first enhancements is already in the works. <\/span><span style=\"font-weight: 400;\">Ohio State University will make this year\u2019s inductees to the Cybersecurity Canon and all previous inductees\u2019 works available through Ohio State\u2019s University Libraries system. They can be found through the <\/span><a href=\"https:\/\/osu.on.worldcat.org\/advancedsearch\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">University Libraries catalog<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Patton says, \u201cI thank Rick Howard and the Palo Alto Networks team for all they have done to create and shape the Canon Project, and I am mindful of the responsibility OSU is assuming, to ensure the project continues to thrive and support the security community. And yes, I look forward to continuing to work with Rick to advance this important project.\u201d<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 2020 Cybersecurity Canon Hall of Fame induction marks the passing of leadership for the project from Palo Alto Networks to Ohio State University.<\/p>\n","protected":false},"author":650,"featured_media":109043,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521],"tags":[4270],"coauthors":[6796,7185],"class_list":["post-116143","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/CANON-LOGO_350x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/116143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/650"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=116143"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/116143\/revisions"}],"predecessor-version":[{"id":116155,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/116143\/revisions\/116155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/109043"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=116143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=116143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=116143"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=116143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}