{"id":55734,"date":"2017-12-28T05:00:54","date_gmt":"2017-12-28T13:00:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=55734"},"modified":"2017-12-27T10:36:44","modified_gmt":"2017-12-27T18:36:44","slug":"cybersecurity-canon-review-ciso-desk-reference-guide-practical-guide-cisos","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/12\/cybersecurity-canon-review-ciso-desk-reference-guide-practical-guide-cisos\/","title":{"rendered":"The Cybersecurity Canon - CISO Desk Reference Guide: A Practical Guide for CISOs"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-32398 alignleft lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png\" alt=\"cybersecuity-canon-blog-600x260\" width=\"600\" height=\"260\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em>We modeled the\u00a0<\/em><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><em>Cybersecurity Canon<\/em><\/a><em>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/em><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><em>directly participate in the process<\/em><\/a><em>. Please do so!<\/em><\/p>\n<p><span style=\"font-size: 18pt;\"><br \/>\nExecutive Summary<\/span><\/p>\n<p>Every profession has desk references that practitioners can use as go-to guides for tactical information. For information security professionals, CISOs and those on the CISO track, the<\/p>\n<p><em>CISO Desk Reference Guide: A Practical Guide for CISOs<\/em> is an excellent example of such a guide.<\/p>\n<p><span style=\"font-size: 18pt;\"><br \/>\nReview<\/span><\/p>\n<p>While the classic <a href=\"http:\/\/www.design.caltech.edu\/erik\/Misc\/Prepare_3_Envelopes.html\" rel=\"nofollow,noopener\" >prepare 3 envelopes<\/a> joke revolves around CEOs, it\u2019s quite appropriate for a CISOs as well. For many, their career path is a slow and steady one whereby they deliberately progress toward attaining that role. For others, who quickly obtain the role due to a major security breach, envelope #3 must often be opened immediately.<\/p>\n<p>In the <a href=\"https:\/\/www.amazon.com\/gp\/product\/0997744111\/ref=as_li_tl?ie=UTF8&amp;tag=benrothkswebp-20&amp;camp=1789&amp;creative=9325&amp;linkCode=as2&amp;creativeASIN=0997744111&amp;linkId=c7bbaf4dd490f18b45e2a2637883c0bb\" rel=\"nofollow,noopener\" >CISO Desk Reference Guide: A Practical Guide for CISOs<\/a> (CISO DRG 978-0997744118), authors Bill Bonney, Gary Hayslip and Matt Stamper have written a tactical guide that can help the soon-to-be or new CISO get up and running. Each of the three has been in the information security space for decades, and all of them bring their experience from the trenches to every chapter.<\/p>\n<p>For CISOs who find themselves in that position, they\u2019ve entered it as a key entity in an organization. For those who have come into the role suddenly, it\u2019s important to note that poor information security controls can bring an organization to its knees. In the book, the authors share their knowledge and provide real-world experience, showing current CISOs \u2013 and security managers with aspirations to be \u2013 how to function most effectively in the CISO role.<\/p>\n<p>A recurrent problem for books with multiple authors is that the end result often lacks consistency and is simply a collection of different essays without a unifying theme. The authors here do an admirable job of avoiding that. Each chapter is clearly identified by who the specific author is. A benefit to the approach here is that each of the authors brings his specific style to information security, such that the reader ends up with a broad and multifaceted methodology on the topic.<\/p>\n<p>The nine chapters in the book cover the entire range of the information security lifecycle; from regulatory issues to data classification, reporting to the board, tools, policies and more. \u00a0The three authors are battle-tested professionals with real-life expertise that they bring to every chapter.<\/p>\n<p>The previous point is not a trivial one as information security is not monolithic. There is certainly no single way to do information security. By learning the topic from the best and the brightest, information security practitioners and CISO-hopefuls can ensure they will ultimately be successful in their endeavors.<\/p>\n<p>As mentioned above, many books with multiple authors suffer from a lack of consistency and message. This book doesn\u2019t suffer from that. And in fact, each author brings a slightly different approach to the various topics. This is an important point, as there is certainly no one size fits all when it comes to information security.<\/p>\n<p>Of course, an effective CISO can\u2019t rely on any single book. And if they tried, that book would need to be about 2,500 pages long. But for those looking for a go-to reference when the CxO urgently calls, it would be a good idea for any information security professional to have a copy of the <em>CISO Desk Reference Guide<\/em> handy. It\u2019s an excellent desktop reference \u2013 and an indispensable one, at that.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Conclusion<\/span><\/p>\n<p>The <em>CISO Desk Reference Guide: A Practical Guide for CISOs<\/em> is an excellent desk reference that information security professionals, from managers to CISOs, will find of value. It\u2019s full of practical, real-world experience and sage advice, making it an excellent candidate for the Cybersecurity Canon.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ben Rothke reviews \u201cCISO Desk Reference Guide: A Practical Guide for CISOs\u201d for the Cybersecurity Canon.<\/p>\n","protected":false},"author":153,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521],"tags":[94,387,251,4270,5130],"coauthors":[1379],"class_list":["post-55734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","tag-ciso","tag-cso","tag-cybersecurity-canon","tag-cybersecurity-canon-review","tag-rothke"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=55734"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55734\/revisions"}],"predecessor-version":[{"id":55749,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/55734\/revisions\/55749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=55734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=55734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=55734"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=55734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}