One Article Review

Accueil - L'article:
Source Blog.webp taosecurity
Identifiant 363216
Date de publication 2017-05-08 11:20:15 (vue: 2017-05-08 11:20:15)
Titre Latest Book Inducted into Cybersecurity Canon
Texte Thursday evening Mrs B and I were pleased to attend an awards seminar for the Cybersecurity Canon. This is a project sponsored by Palo Alto Networks and led by Rick Howard. The goal is "identify a list of must-read books for all cybersecurity practitioners."Rick reviewed my fourth book The Practice of Network Security Monitoring in 2014 and someone nominated it for consideration in 2016. I was unaware earlier this year that my book was part of a 32-title "March Madness" style competition. My book won the five rounds, resulting in its conclusion in the 2017 inductee list! Thank you to all those that voted for my book.Ben Rothke awarded me the Canon trophy.Ben Rothke interviewed me prior to the induction ceremony. We discussed some current trends in security and some lessons from the book. I hope to see that interviewed published by Palo Alto Networks and/or the Cybersecurity canon project in the near future.In my acceptance speech I explained how I wrote the book because I had not yet dedicated a book to my youngest daughter, since she was born after my third book was published.A teaching moment at Black Hat Abu Dhabi in December 2012 inspired me to write the book. While teaching network security monitoring, one of the students asked "but where do I install the .exe on the server?"I realized this student had no idea of physical access to a wire, or using a system to collect and store network traffic, or any of the other fundamental concepts inherent to NSM. He thought NSM was another magical software package to install on his domain controller.Four foreign language editions.Thanks to the interpretation assistance of a local Arabic speaker, I was able to get through to him. However, the experience convinced me that I needed to write a new book that built NSM from the ground up, hence the selection of topics and the order in which I presented them.While my book has not (yet?
Envoyé Oui
Condensat 2002 2003 2012 2014 2016 2017 2nd able about abu acceptance access after agnostic all also alto analysis analysts and/or another any anyone appendix arabic are asked asking assistance attend attendees autograph awarded awards bamm because been bejtlich believe ben best bill black blogspot book books books: born bought built burks but buy canon captures carry centric ceremony certain chance chinese closed code colleague collect collection college com combat commands competition concepts conclusion consideration contributed controller convinced copy copyright could courses created current currently cybersecurity data daughter deal december dedicated defined definition degree demonstrate desired; detect dhabi digital dinner discussed domain done doug during earlier easy edited editing edition editions electronic else end enjoyed escalation evening event everyone example exe experience explained explaining family files five following foreign forgot four fourth framework free from fundamental future get goal got ground hackers had has hat have having head hence here him his hope host hosted how howard however idea identify including inclusion incoming indications inducted inductee induction inherent inspired install instructor interpretation interviewed intrusions its know korean krav language latest learn led lessons levy like list local log maccabees madness maga magical makes making march matters mediocre meeting methodology methodology to mindset moment monitoring monitoring the mrs must myself near needed network networks new next nominated not notch nsm nsm101 of the offered old one onion order other package palo part people perform phone physical picture plans pleased point polish pollack poorly possible practice practitioners presented press print prior programs project provide published publisher read realized reference relevant remains respond resulting review reviewed richard rick right rothke rounds sat save security see selection seminar server several she shown signing since site socs software some someone source speak speaker speech sponsored starch steven store story student students style system tablet taosecurity teaching team testament text thank thanks them third those thought through thursday title told too top topics traffic translated trends trophy two unaware update: i use used using variety version very visscher voted wants warning warnings web well what whatever when where which who whose will wire won write writing written wrote www year yet you youngest
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: