๐Ÿ“Review Incoming...

This week, we dive into GRC. Andrew Chrostowski provides a Hall of Fame Rec for ๐™๐™๐™š ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐™‚๐™ค๐™ซ๐™š๐™ง๐™ฃ๐™–๐™ฃ๐™˜๐™š, ๐™๐™ž๐™จ๐™ , ๐™–๐™ฃ๐™™ ๐˜พ๐™ค๐™ข๐™ฅ๐™ก๐™ž๐™–๐™ฃ๐™˜๐™š by Jason Edwards and Griffin Weaver.

Andrew's review ๐Ÿ‘‰ https://cybercanon.org/the-cybersecurity-guide-to-governance-risk-and-compliance/

#CybersecurityBooks #GRC #CyberCanonHoFCandidate

๐Ÿ•ต๏ธโ€โ™‚๏ธ๐—™๐—ฟ๐—ฒ๐˜€๐—ต ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ!

This week, Jeff Schiemann provides a Hall of Fame recommendation of ๐™๐™๐™š ๐™‡๐™–๐™ฏ๐™–๐™ง๐™ช๐™จ ๐™ƒ๐™š๐™ž๐™จ๐™ฉ, written by the accomplished investigative journalist, Geoff White.

You don't want to miss this one: https://cybercanon.org/the-lazarus-heist-from-hollywood-to-high-finance-inside-north-koreas-global-cyber-war/

๐Ÿ™ Consider supporting the Canon by purchasing the book through our Affiliate link here: https://amzn.to/48dAaSo

#CybersecurityBooks #CyberWar #CyberCanonHoFCandidate

@BBCNews

At our November Committee Review Meeting, members Dr. Georgianna (George) Shea and Adrian Sanabria each led in-depth discussions of Hall of Fame candidate books.

These reads are quite different from each other: critical infrastructure and building a cyber startup. The reviews were published in 2024, but some readers might have missed them, so it's a good idea to check them out:

๐Ÿญ George discussed ๐˜พ๐™ค๐™ช๐™ฃ๐™ฉ๐™š๐™ง๐™ž๐™ฃ๐™œ ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™Ž๐™–๐™—๐™ค๐™ฉ๐™–๐™œ๐™š: ๐™„๐™ฃ๐™ฉ๐™ง๐™ค๐™™๐™ช๐™˜๐™ž๐™ฃ๐™œ ๐˜พ๐™ค๐™ฃ๐™จ๐™š๐™ฆ๐™ช๐™š๐™ฃ๐™˜๐™š-๐˜ฟ๐™ง๐™ž๐™ซ๐™š๐™ฃ, ๐˜พ๐™ฎ๐™—๐™š๐™ง-๐™„๐™ฃ๐™›๐™ค๐™ง๐™ข๐™š๐™™ ๐™€๐™ฃ๐™œ๐™ž๐™ฃ๐™š๐™š๐™ง๐™ž๐™ฃ๐™œ (๐˜พ๐˜พ๐™€) by Andrew Bochman and Sarah Freeman ๐Ÿ‘‰ https://cybercanon.org/countering-cyber-sabotage-introducing-consequence-driven-cyber-informed-engineering-cce/

๐Ÿ—๏ธ Adrian shared Ross Haleliuk's ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™›๐™ค๐™ง ๐˜ฝ๐™ช๐™ž๐™ก๐™™๐™š๐™ง๐™จ: ๐™๐™๐™š ๐™€๐™จ๐™จ๐™š๐™ฃ๐™ฉ๐™ž๐™–๐™ก ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐˜ฝ๐™ช๐™ž๐™ก๐™™๐™ž๐™ฃ๐™œ ๐™– ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™Ž๐™ฉ๐™–๐™ง๐™ฉ๐™ช๐™ฅ ๐Ÿ‘‰ https://cybercanon.org/cyber-for-builders/

The discussions around these books were great timing, as the other main topic of the meeting was preparing for the upcoming annual hall of fame๐Ÿ›๏ธvoting session. Our favorite time of year, so stay tuned!

#CybersecurityBooks #CyberCanonHoFCandidate
CRC Press | Venture in Security
@sawaba

๐Ÿ”๐—ก๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ ๐Ÿ“–

This week, Jeny Teheran discusses why Dr. Susan Landauโ€™s ๐™‡๐™ž๐™จ๐™ฉ๐™š๐™ฃ๐™ž๐™ฃ๐™œ ๐™„๐™ฃ is a must-read exploration of privacy, encryption, and the ongoing struggle over government access to secure systems. Being clear, timely, and essential, she recommends it for the CyberCanon Hall of Fame.

๐Ÿ“Review: https://cybercanon.org/listening-in-cybersecurity-in-an-insecure-age/

๐Ÿ›๏ธTo purchase and give 4% back to the Canon, please consider using our affiliate link: https://amzn.to/4oDAWxQ

#CybersecurityBooks #DataPrivacy #Encryption #CyberCanonHoFCandidate Yale University Press

๐Ÿšจ๐——๐—ฒ๐—ฐ๐—ฟ๐˜†๐—ฝ๐˜๐—ถ๐—ป๐—ด ๐—ฎ ๐—ป๐—ฒ๐˜„ ๐—ฟ๐—ฒ๐—ฎ๐—ฑ...

โ€œ๐˜ˆ๐˜ถ๐˜ฎ๐˜ข๐˜ด๐˜ด๐˜ฐ๐˜ฏ, ๐˜ข ๐˜ด๐˜ฆ๐˜ข๐˜ด๐˜ฐ๐˜ฏ๐˜ฆ๐˜ฅ ๐˜ค๐˜ณ๐˜บ๐˜ฑ๐˜ต๐˜ฐ๐˜จ๐˜ณ๐˜ข๐˜ฑ๐˜ฉ๐˜ฆ๐˜ณ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ข๐˜ถ๐˜ต๐˜ฉ๐˜ฐ๐˜ณ, ๐˜ฉ๐˜ข๐˜ด ๐˜ฃ๐˜ญ๐˜ข๐˜ป๐˜ฆ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ช๐˜ญ ๐˜ฃ๐˜บ ๐˜ธ๐˜ณ๐˜ช๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ข ๐˜ฅ๐˜ช๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ณ๐˜บ ๐˜ฐ๐˜ง ๐˜ค๐˜ณ๐˜บ๐˜ฑ๐˜ต๐˜ฐ๐˜จ๐˜ณ๐˜ข๐˜ฑ๐˜ฉ๐˜บ.(..) ๐˜ˆ๐˜ญ๐˜ต๐˜ฉ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ช๐˜ต ๐˜ช๐˜ด ๐˜ข ๐˜ฅ๐˜ช๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ณ๐˜บ, ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฃ๐˜ฐ๐˜ฐ๐˜ฌ ๐˜ช๐˜ด ๐˜ธ๐˜ณ๐˜ช๐˜ต๐˜ต๐˜ฆ๐˜ฏ ๐˜ด๐˜ฐ ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ฆ๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ๐˜ญ๐˜บ ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ช๐˜ต ๐˜ธ๐˜ฐ๐˜ถ๐˜ญ๐˜ฅ ๐˜ฏ๐˜ฐ๐˜ต ๐˜ฃ๐˜ฆ ๐˜ข๐˜ฏ ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ต๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต ๐˜ต๐˜ฐ ๐˜ด๐˜ข๐˜บ ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜‹๐˜ณ. ๐˜‘๐˜ฆ๐˜ข๐˜ฏ-๐˜—๐˜ฉ๐˜ช๐˜ญ๐˜ช๐˜ฑ๐˜ฑ๐˜ฆ ๐˜ˆ๐˜ถ๐˜ฎ๐˜ข๐˜ด๐˜ด๐˜ฐ๐˜ฏ ๐˜ช๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜š๐˜ต๐˜ฆ๐˜ท๐˜ฆ๐˜ฏ ๐˜š๐˜ฑ๐˜ช๐˜ฆ๐˜ญ๐˜ฃ๐˜ฆ๐˜ณ๐˜จ ๐˜ฐ๐˜ง ๐˜ค๐˜ณ๐˜บ๐˜ฑ๐˜ต๐˜ฐ๐˜จ๐˜ณ๐˜ข๐˜ฑ๐˜ฉ๐˜บ. ๐˜‘๐˜— ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ด ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ต๐˜ฐ ๐˜ต๐˜ฆ๐˜ญ๐˜ญ ๐˜ข ๐˜ด๐˜ต๐˜ฐ๐˜ณ๐˜บ.โ€

That is quite the praise by @iSandipD in his review of ๐—–๐—ฟ๐˜†๐—ฝ๐˜๐—ผ ๐——๐—ถ๐—ฐ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—ฟ๐˜†: ๐Ÿฑ๐Ÿฌ๐Ÿฌ ๐—ง๐—ฎ๐˜€๐˜๐˜† ๐—ง๐—ถ๐—ฑ๐—ฏ๐—ถ๐˜๐˜€ ๐—ณ๐—ผ๐—ฟ ๐˜๐—ต๐—ฒ ๐—–๐˜‚๐—ฟ๐—ถ๐—ผ๐˜‚๐˜€ ๐—–๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐—ด๐—ฟ๐—ฎ๐—ฝ๐—ต๐—ฒ๐—ฟ, by Jean-Philippe (JP) Aumasson (@veorq). Sandip is recommending the book for the Canon Hall of Fame.

๐Ÿ“ Read the review: https://cybercanon.org/crypto-dictionary-500-tasty-tidbits-for-the-curious-cryptographer/

๐Ÿ›๏ธ If interested in purchasing, please consider using this link to support the Canon: https://amzn.to/43VPQap

@nostarch #CyberscurityBooks #CyberCanonHoFCandidate #Cryptography

๐Ÿ‘ฉโ€๐Ÿ’ป๐—œ๐˜'๐˜€ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜†!๐Ÿง 

This week, Kevin Magee provides a Hall of Fame recommendation:

"Sarah Armstrong-Smithโ€™s ๐™๐™ฃ๐™™๐™š๐™ง๐™จ๐™ฉ๐™–๐™ฃ๐™™ ๐™ฉ๐™๐™š ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐˜ผ๐™ฉ๐™ฉ๐™–๐™˜๐™ ๐™š๐™ง ๐™ˆ๐™ž๐™ฃ๐™™๐™จ๐™š๐™ฉ is a compelling and necessary read for anyone tasked with defending digital infrastructure in a world shaped by human adversaries. Rather than focus on technical exploits or reactive controls, Sarah reframes cybersecurity through the lens of attacker motivation, what drives threat actors, how they think, and why that understanding changes everything about how we build our defenses."

Read Kevinโ€™s detailed review of why he believes it will help you "transform your response to threats" โžก๏ธ https://tinyurl.com/56nzxp5z

#CISO #SecurityAwareness #ThreatIntelligence #CyberCanonHoFCandidate

๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ https://tinyurl.com/r2b3zc2u

๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

#CyberCanonHoF review โžก๏ธ https://tinyurl.com/3rywf7zw

#CyberCanon #CybersecurityHistory #CybersecurityBooks

If your mission this October is to elevate awareness, not just compliance, here is a book worth putting in your teamโ€™s hands...

๐™„๐™› ๐™„๐™ฉโ€™๐™จ ๐™Ž๐™ข๐™–๐™ง๐™ฉ, ๐™„๐™ฉโ€™๐™จ ๐™‘๐™ช๐™ก๐™ฃ๐™š๐™ง๐™–๐™—๐™ก๐™š by @mikko became a candidate for our Hall of Fame by weaving technical insight with human stories, showing how every connected thing holds risk.

๐Ÿ‘‰ https://tinyurl.com/y9ne2uzk

Why this matters during #CybersecurityAwarenessMonth:
1. In a hyperconnected world, vulnerability is the shadow companion of innovation.
2. Technology alone cannot defend. The human factor is equally critical.
3. Stories fuel understanding. A cautionary tale sticks longer than dry technical specs.

#CyberCanonHoFCandidate #SecurityCulture #CybersecurityBooks

๐Ÿ”๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฎ๐˜† ๐—ง๐˜‚๐—ฒ๐˜€๐—ฑ๐—ฎ๐˜†!๐Ÿ“–

Differential Privacy is an increasingly popular, though controversial, technique for protecting confidential data by carefully introducing statistical noise. Even if you are very familiar with #DP, you likely don't know quite as much as Dr. Simson Garfinkel ( @xchatty )

This week, Ben Rothke ( @benrothke ) provides a Hall of Fame recommendation in his review of Garfinkel's new book, ๐˜‹๐˜ช๐˜ง๐˜ง๐˜ฆ๐˜ณ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜—๐˜ณ๐˜ช๐˜ท๐˜ข๐˜ค๐˜บ, from The MIT Press Essential Knowledge Series. ( @themitpress )

Review๐Ÿ‘‰ https://tinyurl.com/2s3jk4cn

#CybersecurityBooks #CyberCanonHoFCandidate #DifferentialPrivacy #DataPrivacy

โš–๏ธ๐—•๐—ผ๐—ผ๐—ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ!โš–๏ธ

This week, @dykstra provides a Hall of Fame recommendation review of ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ž๐™ฃ ๐˜พ๐™ค๐™ฃ๐™ฉ๐™š๐™ญ๐™ฉ: ๐™๐™š๐™˜๐™๐™ฃ๐™ค๐™ก๐™ค๐™œ๐™ฎ, ๐™‹๐™ค๐™ก๐™ž๐™˜๐™ฎ, ๐™–๐™ฃ๐™™ ๐™‡๐™–๐™ฌ by professors ๐Ÿง‘โ€๐Ÿซ Chris Hoofnagle and Golden Richard III.

Josiah writes that the textbook "fills a long-standing gap. It does not tell readers what to thinkโ€”it teaches them how to think about cybersecurity in a connected, contested and continually evolving world. (...) equally valuable for newcomers and experienced practitioners who want to see the bigger picture. For its breadth, clarity, and critical perspective, it belongs in the CyberCanon Hall of Fame."

Full review ๐Ÿ‘‰https://tinyurl.com/mv6255mk

#CyberCanonHoFCandidate #CybersecurityBooks #Law #Policy