{"id":30191,"date":"2017-05-11T10:00:00","date_gmt":"2017-05-11T17:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=30191"},"modified":"2020-04-21T14:21:50","modified_gmt":"2020-04-21T21:21:50","slug":"2017-cybersecurity-canon-winners","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/05\/2017-cybersecurity-canon-winners\/","title":{"rendered":"And the 2017 Cybersecurity Canon Winners Are\u2026"},"content":{"rendered":"<p>On May 4, 2017, at the Mandarin Oriental Hotel in Washington D.C., I had the honor and the privilege to host the fourth annual Cybersecurity Canon Awards where we inducted six books into the Cybersecurity Canon Hall of Fame.<\/p>\n<p>This year\u2019s inductees are (in alphabetical order):<\/p>\n<ul>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/07\/the-cybersecurity-canon-crypto-how-the-code-rebels-beat-the-government-saving-privacy-in-the-digital-age\/\">Crypto: How the Code Rebels Beat the Government<\/a>\u2014Saving Privacy in the Digital Age\u201d by Steven Levy<\/li>\n<\/ul>\n<ul>\n<li>\"<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/09\/the-cybersecurity-canon-hacking-exposed-series\/\">Hacking Exposed\u201d the series<\/a>\" by Stuart McClure<\/li>\n<\/ul>\n<ul>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/12\/cybersecurity-canon-measure-anything-cybersecurity-risk\/\">How to Measure Anything in Cybersecurity<\/a>\u201d by Douglas W. Hubbard &amp; Richard Seiersen<\/li>\n<\/ul>\n<ul>\n<li>\"<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/10\/phoenix-project-novel-devops-helping-business-win\/\">The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win<\/a>\u201d by Gene Kim, Kevin Behr and George Stafford<\/li>\n<\/ul>\n<ul>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/11\/cybersecurity-canon-practice-network-security-monitoring\/\">The Practice of Network Security Monitoring<\/a>: Understanding Incident Detection and Response\u201d by Richard Bejtlich<\/li>\n<\/ul>\n<ul>\n<li>\u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/05\/cybersecurity-canon-secrets-lies\/\">Secrets and Lies: Digital Security in a Networked World<\/a>\"\u00a0by Bruce Schneier<\/li>\n<\/ul>\n<p>This was the Cybersecurity Canon\u2019s fourth annual awards, and five of the nine chosen authors came to the ceremony. The audience was a mix of cybersecurity book lovers, security practitioners from the local area and students\/teachers from the the tri-state region. Having the students there really brought an excitement and energy to the celebration. They were full of questions, excited to be in the room with a collection of seasoned security professionals, and grateful to have a resource like the Cybersecurity Canon for study and reference. At the end of the awards ceremony, the authors signed autographs, and most of the students walked away with a pile of books under their arms.<\/p>\n<p>This year\u2019s awards event showed me how and why the Cybersecurity Canon is not just a real thing, but an important real thing; and not just a real thing for our community, the cybersecurity practitioners, but for everyone with an interest or need to understand cybersecurity. The website, the committee, and the book reviews of the most important books to our community all make up a wonderful resource for research and study. If you are a newbie to the field, we have something for you. If you are an old and gnarled cybersecurity professional, we have something for you. If you are trying to train your clueless boss, we have something for you.<\/p>\n<p>And remember, the Cybersecurity Canon is not just a book list. No book makes it onto the candidate list or into the Hall of Fame unless somebody from the community writes a book review and makes the case that it is a book that all of us should have read by now. Reviews come from the Cybersecurity Canon Committee and anybody with the passion to make the case for their favorite cybersecurity book.<\/p>\n<p>To this year\u2019s Cybersecurity Canon author winners, congratulations. To the rest of the network defender community, please support this wonderful and useful project.<\/p>\n<ul>\n<li><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\">Cybersecurity Canon Website<\/a><\/li>\n<li><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\">Format for Submitting Book Reviews<\/a><\/li>\n<\/ul>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><script src=\"\/\/dcc4iyjchzom0.cloudfront.net\/widget\/loader.js\" async><\/script><\/p>\n<p class=\"p2\"><span class=\"s2\"><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><b>Register for Ignite \u201917 Security Conference <\/b><\/a><br \/>\n<i>Vancouver, BC June 12\u201315, 2017<\/i><\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\" ><span class=\"s3\">Ignite website<\/span><\/a> for more information on tracks, workshops and marquee sessions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks CSO Rick Howard was in Washington DC to welcome six new additions to the Cybersecurity Canon Hall of Fame.<\/p>\n","protected":false},"author":43,"featured_media":15556,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,155,4521],"tags":[446,2266,251,3717,1665,3693,3702,3708,2581,3699,3705,3714,3696,445,2269,2578,2739,3711],"coauthors":[791],"class_list":["post-30191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-cybersecurity-2","category-canon","tag-bruce-schneier","tag-crypto","tag-cybersecurity-canon","tag-cybersecurity-canon-awards","tag-devops","tag-douglas-hubbard","tag-gene-kim","tag-george-stafford","tag-hacking-exposed","tag-how-to-measure-everything","tag-kevin-behr","tag-richard-bejtlich","tag-richard-seiersen","tag-secrets-and-lies","tag-steven-levy","tag-stuart-mcclure","tag-the-phoenix-project","tag-the-practice-of-network-security-monitoring","net_sec_category-next-generation-firewalls"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/30191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=30191"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/30191\/revisions"}],"predecessor-version":[{"id":30266,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/30191\/revisions\/30266"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/15556"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=30191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=30191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=30191"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=30191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}