Canon Process



PURPOSE

To develop and maintain the definitive Cybersecurity Canon; a list of must-read books for all cybersecurity practitioners – be they from industry, government or academia – where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.

 

MILESTONE DATES

  • 1 October 2014: Public Nominations open for 2015 candidate list submissions.
    https://paloaltonetworks.com/threat-research/cybercanon/nominate-a-book.html
  • 31 January 2015: Public Nominations close for 2015 candidate list submissions. The committee notifies authors and publishers about their nomination into the Cybersecurity Canon Candidate List.
  • 1 February 2015: Public Internet voting opens to choose which books will be inducted into the Canon at the Awards Ceremony in Las Vegas on 1 April 2015.
  • 27 February 2015: Public Internet voting closes.
  • 2 March 2015: The committee meets to make the final decisions on which books will be inducted into the Canon at the Awards Ceremony in Las Vegas.
  • 1 April 2015: Induct the winners into the Cybersecurity Canon at the Awards Ceremony in Las Vegas.
  • 6 April 2015: The current roster of the Cybersecurity Canon Committee surveys the security community for potential members to fill next years’ Cybersecurity Canon duties.
  • 8 May 2015: The current roster of the Cybersecurity Canon Committee selects the roster for the 2016 committee membership.
  • 10 June 2015: The current committee members announce the roster for next years’ Cybersecurity Canon Committee. The new committee will meet at the Palo Alto Networks HQ, discusses process changes and set the schedule for the committee’s work for the year.
  • 1 October 2015: The committee opens nominations for 2016 candidate list submission.