{"id":12968,"date":"2016-04-05T05:00:45","date_gmt":"2016-04-05T12:00:45","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12968"},"modified":"2020-04-21T14:18:50","modified_gmt":"2020-04-21T21:18:50","slug":"ignite-canon","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/04\/ignite-canon\/","title":{"rendered":"Rejoice! Eight New Books Inducted into the Cybersecurity Canon"},"content":{"rendered":"<p>I am very excited today to announce the 2016 inductees into the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\">Cybersecurity Canon<\/a>: our hall of fame for cybersecurity books.<\/p>\n<h3><strong><img loading=\"lazy\" decoding=\"async\"  class=\"alignright size-medium wp-image-13052 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-002-230x345.jpg\" alt=\"Ignite_OpenRecep_SneakPeeks-002\" width=\"230\" height=\"345\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-002-230x345.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-002-768x1152.jpg 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-002-500x750.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-002-200x300.jpg 200w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-002-27x40.jpg 27w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-002.jpg 1000w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/strong>2016 March Madness Winner &amp;\u00a0Cybersecurity Canon\u00a0Inductee<\/h3>\n<ul>\n<li>\"<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/cybersecurity-canon-zero-day\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Day<\/a>\" by Mark\u00a0Russinovich<\/li>\n<\/ul>\n<h3>2016\u00a0Inductees\u00a0selected by the\u00a0Cybersecurity Canon\u00a0Committee<\/h3>\n<ul>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/08\/the-cybersecurity-canon-war-the-rise-of-the-military-internet-complex\/\" target=\"_blank\" rel=\"noopener noreferrer\">@War<\/a>\u201d by Shane Harris<\/li>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/the-cybersecurity-canon-the-cert-guide-to-insider-threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes<\/a>\u201d by\u00a0Dawn M. Cappelli, Andrew P. Moore, and Randall F. Trzeciak<\/li>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/cybersecurity-canon-cyber-warfare\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber War<\/a>\u201d\u00a0by Richard A. Clarke and Robert K. Knake<\/li>\n<li>\"<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/09\/the-cybersecurity-canon-future-crimes-everyone-is-connected\/\" target=\"_blank\" rel=\"noopener noreferrer\">Future Crimes<\/a>\u201d by\u00a0Marc Goodman<\/li>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/02\/cybersecurity-canon-kingpin\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kingpin<\/a>\" by\u00a0Kevin Poulsen<\/li>\n<li>\"<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/09\/the-cybersecurity-canon-measuring-and-managing-information-risk-a-fair-approach\" target=\"_blank\" rel=\"noopener noreferrer\">Measuring and Managing Information Risk: A Fair Approach<\/a>\u201d by\u00a0Jack Jones &amp; Jack Freund<\/li>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/the-cybersecurity-canon-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tallinn Manual on the International Law Applicable to Cyber Warfare<\/a>\u201d by\u00a0Michael N. Schmitt\u00a0(Editor)<!--more--><\/li>\n<\/ul>\n<p>The goal of the Cybersecurity Canon\u00a0Project is to identify a list of must-read books for all cybersecurity practitioners -- be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional\u2019s education that will make the practitioner incomplete.<\/p>\n<p>The\u00a0Cybersecurity Canon\u00a0Project is not simply a list of books you should read. Indeed, no book makes it onto the candidate list unless a security practitioner\u00a0makes\u00a0the case in a book review that we publish on the website, proving the case that this book should be read by all members of the cybersecurity community. Then, a committee of 10 security professionals decides which books make it into the Canon each year.\u00a0Anybody can <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/nominate-a-book\" target=\"_blank\" rel=\"noopener noreferrer\">submit a book review<\/a> for consideration. If the committee thinks you made the case, then we add\u00a0the\u00a0book to\u00a0the\u00a0candidate list.<\/p>\n<p>The\u00a0Cybersecurity Canon\u00a0Project has been going on for three years now. The first year, 2014, we had approximately 20 books in the candidate list and selected one to be inducted into the Canon:\u00a0\u201cWe are\u00a0Anonymous\u201d\u00a0by Parmy Olson. The\u00a0second\u00a0year, 2015, we had approximately 30 books in the candidate list and selected four (See the 2015 list below). This year, we had 45 books in the candidate list and\u00a0selected\u00a0eight. We added a twist to the selection process this year by opening up the voting to the\u00a0Internet\u00a0in a\u00a0March\u00a0Madness type competition. After six rounds of voting,\u00a0\"Zero Day\" by Mark\u00a0Russinovich emerged as the clear and\u00a0popular\u00a0winner.<\/p>\n<p>At the awards ceremony, some of the authors received their awards on stage, signed their books for\u00a0the\u00a0<a href=\"http:\/\/paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\" >Ignite 2016<\/a> crowd, and shared details about their books in video interviews with members of the\u00a0Cybersecurity Canon\u00a0Committee <em>(Stay tuned for videos from the interviews)<\/em>:<\/p>\n<ul>\n<li>Dawn M. Cappelli<\/li>\n<li>Richard Clarke<\/li>\n<li>Marc Goodman<\/li>\n<li>Jack Freund<\/li>\n<li>Jack Jones<\/li>\n<li>Andrew P. Moore<\/li>\n<li>Kevin Poulsen<\/li>\n<li>Randall F. Trzeciak<\/li>\n<li>Liis Vihul<\/li>\n<\/ul>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-13058 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-021-500x333.jpg\" alt=\"Ignite_OpenRecep_SneakPeeks-021\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-021-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-021-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-021-768x512.jpg 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-021-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-021-60x40.jpg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-021.jpg 1500w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-13057 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-023-500x333.jpg\" alt=\"Ignite_OpenRecep_SneakPeeks-023\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-023-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-023-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-023-768x512.jpg 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-023-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-023-60x40.jpg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-023.jpg 1500w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-13056 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-024-500x333.jpg\" alt=\"Ignite_OpenRecep_SneakPeeks-024\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-024-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-024-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-024-768x512.jpg 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-024-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-024-60x40.jpg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-024.jpg 1500w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-13055 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-020-500x333.jpg\" alt=\"Ignite_OpenRecep_SneakPeeks-020\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-020-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-020-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-020-768x512.jpg 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-020-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-020-60x40.jpg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-020.jpg 1500w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-13054 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-022-500x333.jpg\" alt=\"Ignite_OpenRecep_SneakPeeks-022\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-022-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-022-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-022-768x512.jpg 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-022-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-022-60x40.jpg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-022.jpg 1500w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-13053 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-026-500x333.jpg\" alt=\"Ignite_OpenRecep_SneakPeeks-026\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-026-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-026-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-026-768x512.jpg 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-026-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-026-60x40.jpg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/04\/Ignite_OpenRecep_SneakPeeks-026.jpg 1500w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<h3>Winners\u00a0From Previous Years<\/h3>\n<p><strong>2015\u00a0Inductees\u00a0selected by the\u00a0Cybersecurity Canon\u00a0Committee<\/strong><\/p>\n<ul>\n<li>\u201cCountdown to Zero Day\u201d by Kim Zetter<\/li>\n<li>\u201cThe Cuckoo\u2019s Egg\u201d\u00a0by Clifford Stoll<\/li>\n<li>\"Spam Nation\u201d\u00a0by Brian Krebs<\/li>\n<li>\u201cWinning as a CISO\u201d\u00a0by Rich Baich<\/li>\n<\/ul>\n<p><strong>2014\u00a0Inductees\u00a0selected by the\u00a0Cybersecurity Canon\u00a0Committee<\/strong><\/p>\n<ul>\n<li>\u201cWe are\u00a0Anonymous\u201d\u00a0by Parmy Olson<\/li>\n<\/ul>\n<h3>Get Involved<\/h3>\n<p>The\u00a0Cybersecurity Canon Project is a worthy educational endeavor. If you know someone who is trying\u00a0to learn about what it means to be a cybersecurity professional, consider pointing him or her to our list of books for professional development. If you have a book that guided you in your career, please consider writing a book review for it so that we might get it on\u00a0the\u00a0candidate list. Finally, the 2017\u00a0Cybersecurity Canon\u00a0season begins in June. We\u00a0have\u00a0a couple of open slots left for the committee. If you are as passionate about\u00a0cybersecurity books as we are, please reach out to the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/cyber-security-canon-bios\">Cybersecurity Canon committee<\/a> and tell them you want to volunteer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am very excited today to announce the 2016 inductees into the\u00a0Cybersecurity Canon: our hall of fame for cybersecurity books. 2016 March Madness Winner &amp;\u00a0Cybersecurity Canon\u00a0Inductee \"Zero Day\" by Mark\u00a0Russinovich 2016\u00a0Inductees\u00a0selected by &hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521,99],"tags":[251,3717,1133],"coauthors":[791],"class_list":["post-12968","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-canon","category-ignite","tag-cybersecurity-canon","tag-cybersecurity-canon-awards","tag-ignite-2016"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12968"}],"version-history":[{"count":14,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12968\/revisions"}],"predecessor-version":[{"id":109889,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12968\/revisions\/109889"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12968"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}