{"id":47808,"date":"2017-10-31T05:00:55","date_gmt":"2017-10-31T12:00:55","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=47808"},"modified":"2017-10-31T05:04:20","modified_gmt":"2017-10-31T12:04:20","slug":"announcing-2018-cybersecurity-canon-peoples-choice-award-winner","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/10\/announcing-2018-cybersecurity-canon-peoples-choice-award-winner\/","title":{"rendered":"Announcing the 2018 Cybersecurity Canon People\u2019s Choice Award Winner!"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:43.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-32398 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png\" alt=\"cybersecuity-canon-blog-600x260\" width=\"600\" height=\"260\" \/><\/span><\/div><\/p>\n<p>After five rounds of voting and 33 books, we now have a winner of the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/09\/welcome-2018-cybersecurity-canon-peoples-choice-awards\/\">2018 Cybersecurity Canon People\u2019s Choice Award<\/a>. Please join me in congratulating author Christopher Hadnagy and his book <em>Unmasking the Social Engineer: The Human Element of Security<\/em>.<\/p>\n<p>As Canon Committee member <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/09\/the-cybersecurity-canon-unmasking-the-social-engineer-the-human-element-of-security\/\">Ben Rothke noted in his book review<\/a>, \u201cFor serious readers who want to understand everything they can about the topic of social engineering, <em>Unmasking the Social Engineer<\/em> should be one of references in the cybersecurity reading arsenal.\u201d<\/p>\n<p>We will be formally inducting Christopher Hadnagy\u2019s book along with the other Cybersecurity Canon committee-selected winners into the Cybersecurity Canon Hall of Fame on May 3, 2018, during the annual Cybersecurity Canon Awards Gala in Washington, DC.<\/p>\n<p>Thank you to everyone who participated in this year\u2019s People\u2019s Choice Awards competition and for continuing to support the <a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\">Cybersecurity Canon<\/a>!<\/p>\n<p><strong>Have a must-read cybersecurity book? <\/strong><\/p>\n<p>You don\u2019t have to be a Cybersecurity Canon committee member to write a book review and make a case for a book that all of us should have read by now. Reviews come from anybody with the passion to make the case for their favorite cybersecurity book. <a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\">Nominate a book for next year's Cybersecurity Canon Awards.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Announcing the 2018 Cybersecurity Canon People\u2019s Choice Award Winner!<\/p>\n","protected":false},"author":43,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[4773],"coauthors":[791],"class_list":["post-47808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-canon","tag-people-choice-awards"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/47808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=47808"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/47808\/revisions"}],"predecessor-version":[{"id":48024,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/47808\/revisions\/48024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=47808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=47808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=47808"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=47808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}