In the spring of 2013, Palo Alto Networks created a “Rock and Roll Hall of Fame” for cybersecurity books that we call The Cybersecurity Canon Project. Its goal is to identify a list of must-read books for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education.
Similar to The Rock and Roll Hall of Fame, we have a list of candidate books that are gathered from the network defender community at large. This is not a book list per se. No book is listed on the Canon web page unless some network defender has written a book review that makes the case that all network defenders should have read it by now. Most reviews come from the Cybersecurity Canon Committee but the committee accepts reviews from any network defender who has the passion to submit a review for consideration. Every year, the Committee reviews the current candidate list and selects a handful for induction into the Hall of Fame.
The Candidate List is a collection of book reviews on various topics in the cybersecurity domain that make the case that a specific book is a must read for all security practitioners. They are nominees for the Hall of Fame.
The Hall of Fame List is a collection of books selected by the Canon Committee from the Candidate List annually that the Committee considers must reads for all security practitioners. The books in this list are the inductees into the Cybersecurity Canon Hall of Fame.
Each year, Committee Members write at least two book reviews for publication on the website as potential candidates for the Hall of Fame.
They attend quarterly conference calls to discuss Committee business. They also participate in the decision for which books will make it into the Hall of fame that year. Finally, they also attend the annual awards ceremony hosted by Palo Alto Networks and help interview the selected Hall of Fame authors.
Existing committee members are given the option to stay on the committee for multiple seasons. When committee members leave the group, the remaining committee members submit potential replacements to the committee at large. Any network defender can ask to have their name considered as a replacement for departing committee members.
Anyone who feels passionate about a book that meets the Cybersecurity Canon selection criteria can submit a book review for consideration by the committee. This link describes the process and the basic written elements that the committee needs to judge the review.
Any cybersecurity book that are a must-read for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education.
Send us a message