Cyber Security Canon Candidates: You Should Have Read These Books by Now

Similar documents
In-Flight Magazine Order Form

Cyber Horizon Whats Next. E.J. Hilbert Managing Director Decmeber 2014

FBI AND CYBER SECURITY

Non-Malicious Security Violations

FILLED! ages 8-12 $22.95

IV Ashton, LegalServer, Chicago, IL Anna Hineline, Legal Assistance of Western New York, Geneva, NY Alexander Karsten, Pro Bono Net, San Francisco, CA

Master of Fine Arts in Writing

Dangerous Minds: The Art of Guerrilla Data Mining Mark Ryan del Moral Talabis

Before. The House Committee on Small Business Subcommittee on Regulatory Reform and Oversight. March 16, 2006

Cybersecurity Landscape for the Utility Industry and Considerations for State Regulators

Exploiting the dark triad for national defense capabilities. Dimitris Gritzalis

This image cannot currently be displayed. Course Catalog. Language Arts Glynlyon, Inc.

Exploring the Power of Physical, Logical and Cyber Security Convergence

Can We Become Resilient to Cyber Attacks?

Mansfield City Schools ELA Pacing Guide Grade 6 Reading

c be th h e ange Volunteer Trip Scholarship Application Kenya, August 2012

From App Failure to App Success

Coffeyville Community College ENGL-202 COURSE SYLLABUS FOR CREATIVE WRITING. Salina Meek Instructor

The UK cyber security strategy: Landscape review. Cross-government

Senior Year COMMUNICATION ARTS. Communication Arts ENGLISH COURSE OFFERINGS. Adlai E. Stevenson High School. for SENIORS

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing

Citizenship Activity Pack Spy Implants

Information Architecture to Drupal Architecture

Recognize Nefarious Cyber Activity and Catch Those Responsible with IBM InfoSphere Entity Analytic Solutions

SCADA/ICS Security in an.

The Landscape of Cyber, critical infrastructure and how Regulation fits in

Introduction to Cybersecurity Overview. October 2014

INTERNATIONAL CYBER SECURITY AWARENESS MONTH CYBER SECURITY DAY

As the US debates privacy a Berlin start up surges with...

SCHOLARSHIP APPLICATION. Asnuntuck Community College Foundation, Inc. 170 Elm Street, Enfield, CT (fax)

This image cannot currently be displayed. Course Catalog. Language Arts Glynlyon, Inc.

Agenda , Palo Alto Networks. Confidential and Proprietary.

Cyber Risks in the Boardroom

Cyber-Intelligence and Cyber-Espionage

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Social Media: Sourcing and creating great Content. By Fiona Catchpowle

Homeland Open Security Technology HOST Program

How To Handle A Threat From A Corporate Computer System

Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment

SC STATE ATHLETICS MARKETING INTERNSHIP APPLICATION

SOCIAL MEDIA & bet-at-home.com

12 months 4 quarters 1 goal

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015

Literature & Creative Writing Courses

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

4. (Visit A Comfortable Place) The library will provide safe, comfortable and welcoming places for members of the community.

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Digital Promotions Drive Holiday Shopping Early print and online promotions impact purchase behavior

Personal statement for physiotherapy masters. How can you motivate yourself to start losing.

crazy sales figures! Essential statistics

Cybersecurity and United States Policy Issues

Curriculum Catalog

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Mapping RSA Conference Speaker Submissions to Security Market Trends

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Read books with appealing pictures that match their age and interests. They like books with rhythm, rhyme, and repetition.

English 305 English 310 English 316 English 357

ENGLISH LANGUAGE ARTS TESTING OUT EXAM

Why Journalism? How Journalism can revolutionize education

Table of Contents Chapter 1 - Introduction to Videoconferencing What is Videoconferencing? Uses for Videoconferencing...

The Social Intelligence Report ADOBE DIGITAL INDEX Q3 2013

ebook The Essential Guide to Content Personalization: the Science That Drives It and How to Start Using It Written by Asaf

GE Healthcare. Medical Device Product Security. Patient Safety Patient Privacy Patient Care

BA (Joint Honours) JOURNALISM and CREATIVE WRITING

Common Core Progress English Language Arts. Grade 3

Securing the Grid: A Progressive Approach to Cyber-Security for Municipal Utilities

CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/

Welcome to the Reading Workshop. Learning, Loving and Laughing Together

New York Privacy Officers Forum. Online Behavioral Advertising: Emerging Legal and Business Issues

IT Security Quo Vadis?

25 Quick Content Ideas for Social Media & Marketing

Performance Indicators-Language Arts Reading and Writing 3 rd Grade

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D.

Executive Summary Key Findings

CTY Programs: What s New for 2016

HOWARD UNIVERSITY POLICY

DIGITAL DISRUPTION WHEN YOU LEAST EXPECT (OR WANT) IT

THE (REAL) STORY ON MANAGEMENT. What follows is the byproduct of an enhanced (>140 characters) twitter discussion in February 2015

Marketing & Admissions Strategies

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Test Design Summary Operational Assessments

The Trifecta Review Services Order Form

The Dollars and Sense of Ethical Behavior

Theory Meets Reality: Implementing PR & Social Media Measurement Standards

SAAS Curriculum Map. Quarter 1 Content Standards GLE Assessment Essential Questions 1.1; 1.5; 1.7;

Working with the FBI

Preface to the Fourth Edition

CREATIVE WRITING AT INDIANA STATE UNIVERSITY 2015 INTRODUCTION APPENDIX

ICS Cyber Attacks: Fact vs. Fiction and Why it Matters

Undergraduate Programsograms

How to Justify Your Security Assessment Budget

Cybersecurity y Managing g the Risks

Practical Aspects of Writing History & Historical Fiction

The Onslaught of Cyber Security Threats and What that Means to You

DEVELOP A LOVE OF READING THAT LEADS TO LIFELONG LITERACY!

English Programs. English Associate in Arts for Transfer Degree (AA-T)

Technological Evolution

Security Culture: to learn MORE

Transcription:

Cyber Security Canon Candidates: You Should Have Read These Books by Now SESSION ID: STU-M04B RICK HOWARD CSO PALO ALTO NETWORKS @RACEBANNON99

Cyber Security Canon Candidates 2

Cyber Security Canon Candidates 3

Cyber Security Canon Candidates 4

Cyber Security Canon Candidates 5

Definition of the Cyber Security Canon can on 6

Definition of the Cyber Security Canon can on /kanən/ 7

Definition of the Cyber Security Canon can on /kanən/ noun 8

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 9

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 10

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 11

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 12

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 13

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 14

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 15

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 3. The list of works considered to be permanently established as being of the highest quality: Hopkins was firmly established in the canon of English poetry. 16

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 3. The list of works considered to be permanently established as being of the highest quality: Hopkins was firmly established in the canon of English poetry. 17

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 3. The list of works considered to be permanently established as being of the highest quality: Hopkins was firmly established in the canon of English poetry. 18

Definition of the Cyber Security Canon can on /kanən/ noun 1. A group of literary works that are generally accepted as representing a field: "the durable canon of American short fiction" (William Styron). 2. A list of writings officially recognized as genuine. 3. The list of works considered to be permanently established as being of the highest quality: Hopkins was firmly established in the canon of English poetry. 19

20 BOOKS FOR CONSIDERATION 20

20 BOOKS FOR CONSIDERATION Technical 21

20 BOOKS FOR CONSIDERATION Non-fiction 22

20 BOOKS FOR CONSIDERATION Fiction 23

20 BOOKS FOR CONSIDERATION Wider Audience Fiction 24

20 BOOKS FOR CONSIDERATION Technical 25

Cyber Security Canon Candidates 26

Cyber Security Canon Candidates Not Comprehensive 27

Culture and Hactivism 28

Culture and Hactivism 2010-2011 29

Culture and Hactivism Technology 2010-2011 30

Culture and Hactivism Technology Disenfranchisement 2010-2011 31

Culture and Hactivism Technology Disenfranchisement 2010-2011 Pranks 32

Culture and Hactivism Technology Disenfranchisement 2010-2011 Pranks Empowerment 33

Culture and Hactivism Technology Disenfranchisement 2010-2011 Pranks Empowerment Hacking Culture 34

Culture and Hactivism Technology Disenfranchisement 2010-2011 Pranks Empowerment Hacking Culture 35

Culture and Hactivism 36

Culture and Hactivism Essence 37

Culture and Hactivism Essence Drama 38

Culture and Hactivism Essence Drama Franchise Operations 39

Culture and Hactivism Feb 2011 40

Culture and Hactivism Apr 2011 41

Culture and Hactivism Apr 2011 50 Days 25+ Companies Ravaged 42

Culture and Hactivism 43

Culture and Hactivism 44

Culture and Hactivism 50 Days 15+ Companies Ransacked 45

Culture and Hactivism Over 100 other Anonymous Members Arrested 46

Culture and Hactivism You Should Have Read this by Now 47

History and Cyber Warfare 48

History and Cyber Warfare 49

History and Cyber Warfare 50

History and Cyber Warfare Natanz Nuclear site 51

History and Cyber Warfare Natanz Nuclear site 52

History and Cyber Warfare Natanz Nuclear site 53

History and Cyber Warfare Natanz Nuclear site 54

History and Cyber Warfare Natanz Nuclear site 55

History and Cyber Warfare 56

History and Cyber Warfare We Have Crossed the Rubicon 57

History and Cyber Warfare You Should Have Read this by Now 58

Operation Olympic Games Is the Tom Clancy Spy Story that Changed Everything 0900 Friday 59

Culture and Cyber Crime 60

Culture and Cyber Crime Max Butler 61

Culture and Cyber Crime Max Butler 62

Culture and Cyber Crime Dark Market Max 63 TalkCash ScandinavianCarding TheVouched Butler

Culture and Cyber Crime Dark Market Max 64 TalkCash ScandinavianCarding TheVouched Butler

Culture and Cyber Crime Dark Market Max Butler Keith Mularski: FBI Senior Cyber Crime Agent AKA Master Splyntr 65

Culture and Cyber Crime Max Butler

Culture and Cyber Crime You Should Have Read this by Now 67

Culture, History and Espionage 68

Culture, History and Espionage 1989 69

Culture, History and Espionage 1989 70

Culture, History and Espionage Information Sharing 1989 71

Culture, History and Espionage Information Sharing Privacy vs Security (R) Liberty vs Control (D) 1989 72

Culture, History and Espionage Information Sharing Privacy vs Security (R) Liberty vs Control (D) 1989 Cyber Espionage 73

Culture, History and Espionage Information Sharing Privacy vs Security (R) Liberty vs Control (D) 1989 Cyber Espionage Intelligence Dilemma 74

Culture, History and Espionage You Should Have Read this by Now 75

History 76

History Quintessential 77

History Quintessential 78

History Quintessential 79

History Quintessential 80

History Quintessential 81

History Quintessential 82

History Cyber Security History Quintessential 83

History Cyber Security History Tragedy Quintessential 84

History Cyber Security History Tragedy Adventure Quintessential 85

History Cyber Security History Tragedy Geek Love Stories Adventure Quintessential 86

History You Should Have Read this by Now 87

20 BOOKS FOR CONSIDERATION 88

20 BOOKS FOR CONSIDERATION Most Entertaining 89

20 BOOKS FOR CONSIDERATION Cyber Space, Hactivism, Google 90

20 BOOKS FOR CONSIDERATION Metaverse, Avatars, Time Magazine 91

20 BOOKS FOR CONSIDERATION Most Entertaining 92

20 BOOKS FOR CONSIDERATION Most Entertaining 93

20 BOOKS FOR CONSIDERATION Most Thought Provoking 94

20 BOOKS FOR CONSIDERATION Biggest Surprise 95

20 BOOKS FOR CONSIDERATION Repeat Authors 96

20 BOOKS FOR CONSIDERATION Repeat Authors 97

20 BOOKS FOR CONSIDERATION Repeat Authors 98

20 BOOKS FOR CONSIDERATION Repeat Authors 99

To Participate For Further Discussion twitter: @racebannon99 email: rhoward@paloaltonetworks.com

To Participate For Further Discussion twitter: @racebannon99 email: rhoward@paloaltonetworks.com http://researchcenter.paloaltonetworks.com/ Reviews of the Books on My List http://terebrate.blogspot.com/ 101

To Participate For Further Discussion twitter: @racebannon99 email: rhoward@paloaltonetworks.com To Vote Reviews of the Books on My List http://researchcenter.paloaltonetworks.com/ http://terebrate.blogspot.com/ https://www.surveymonkey.com/s/2014_cyber_security_canon_survey 102

To Participate For Further Discussion twitter: @racebannon99 email: rhoward@paloaltonetworks.com To Vote Reviews of the Books on My List http://researchcenter.paloaltonetworks.com/ http://terebrate.blogspot.com/ https://www.surveymonkey.com/s/2014_cyber_security_canon_survey 103

20 BOOKS FOR CONSIDERATION Book Reviews: http://bit.ly/1fwatgc Book Reviews: http://bit.ly/1fhr0us/ Vote: http://svy.mk/omdneg 104 twitter: @racebannon99