{"id":5172,"date":"2014-04-02T08:32:16","date_gmt":"2014-04-02T15:32:16","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5172"},"modified":"2020-04-21T14:38:42","modified_gmt":"2020-04-21T21:38:42","slug":"announcing-cybersecurity-canon-honors-ignite-2014","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/04\/announcing-cybersecurity-canon-honors-ignite-2014\/","title":{"rendered":"Announcing Cybersecurity Canon Honors At Ignite 2014"},"content":{"rendered":"<p>Today at Ignite 2014 we\u2019re <a href=\"https:\/\/paloaltonetworks.com\/company\/press\/2014\/palo-alto-networks-honors-author-parmy-olson-as-first-selection-for-the-cybersecurity-canon.html\" target=\"_blank\" rel=\"noopener noreferrer\">celebrating an exciting milestone<\/a>: the first official honoree in our Cybersecurity Canon project.<\/p>\n<p>If you\u2019ve been reading my regular <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Canon posts<\/a>, you know what we\u2019ve been up to, which is an initiative to recognize authors and works of literature that have shaped, edified and advanced discussion of modern cybersecurity issues.<\/p>\n<p>Our first honoree is author and speaker Parmy Olson, a staff reporter and former London bureau chief at Forbes magazine, who wrote We Are Anonymous: Inside the Hacker World of Lulzsec, Anonymous and the Global Cyber Insurgency.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:130.87%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-medium wp-image-5174 aligncenter lozad\" alt=\"01BOOK-popup\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-230x301.jpg\" width=\"230\" height=\"301\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-230x301.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-500x654.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-229x300.jpg 229w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-30x40.jpg 30w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup.jpg 650w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center><br \/>\n<!--more--><\/p>\n<p>As I wrote back in December when <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/cyber-security-canon-we-are-anonymous\/\" target=\"_blank\" rel=\"noopener noreferrer\">describing We Are Anonymous<\/a>, the book is an exceptional guide to a very tricky subject: how the perfect storm of technology, disenfranchised young-ish people, \u201cInternet Pranks as art form\u201d empowerment and the hacking culture came together into a gigantic hairball of activity that gave governments and business leaders around the world plenty of heartburn.<\/p>\n<p>If you\u2019re here at Ignite, join me today from 11am-11:50am in Castellana 1 (Floor 3) where I\u2019ll be presenting on the Canon as well as honoring Parmy and sitting down with her to discuss the book and her take on the current cybersecurity landscape. We\u2019re excited to have her here in Las Vegas.<\/p>\n<p>Parmy is the first of what we hope will be many terrific authors inducted into the Cybersecurity Canon. Over the past few months, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\" rel=\"noopener noreferrer\">I\u2019ve shared 20 books<\/a> \u2013 including We Are Anonymous \u2013 I feel would be good candidates for such a Canon.<\/p>\n<p>In the interim, we\u2019ve also formed a Cybersecurity Canon advisory board consisting of members of the community well familiar with the types of books we\u2019re looking to feature. This year\u2019s advisory board includes:<\/p>\n<ul>\n<li>Robert Clark, Distinguished Professor of Law, Center for Cybersecurity Studies, United States Naval Academy<\/li>\n<\/ul>\n<ul>\n<li>Rick Howard, Chief Security Officer, Palo Alto Networks<\/li>\n<\/ul>\n<ul>\n<li>Matt Richard, Security Engineer, Facebook<\/li>\n<\/ul>\n<ul>\n<li>Steve Winterfeld, Information Security Officer, Nordstrom<\/li>\n<\/ul>\n<p>This advisory board will meet once per year to decide on new Canon inductees. Along the way, we will continue to examine books for inclusion \u2013 and you\u2019ll continue to see me reviewing them in this space on a periodic basis.<\/p>\n<p>This is a community effort, and I meant what I said before about loving a good argument. Share with us your favorite cybersecurity books and let me know whether you agree with the ones I\u2019ve chosen as Canon-worthy, or if I\u2019m missing the boat.<\/p>\n<p>Keep the dialogue going, and let\u2019s celebrate this genre of literature we all hold dear!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today at Ignite 2014 we\u2019re celebrating an exciting milestone: the first official honoree in our Cybersecurity Canon project. If you\u2019ve been reading my regular Cybersecurity Canon posts, you know what we\u2019ve been &hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[251,205],"coauthors":[791],"class_list":["post-5172","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-canon","tag-cybersecurity-canon","tag-hacktivism"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5172"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5172\/revisions"}],"predecessor-version":[{"id":109939,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5172\/revisions\/109939"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5172"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}