{"id":8391,"date":"2015-03-16T05:00:53","date_gmt":"2015-03-16T12:00:53","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8391"},"modified":"2015-03-12T12:29:46","modified_gmt":"2015-03-12T19:29:46","slug":"listen-cso-rick-howard-risky-business","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/03\/listen-cso-rick-howard-risky-business\/","title":{"rendered":"Listen to CSO Rick Howard Discuss the Cybersecurity Canon on Risky Business"},"content":{"rendered":"<p>Rick Howard,\u00a0Palo Alto Networks CSO,\u00a0\u00a0was on Patrick Gray\u2019s Risky Business podcast to talk about the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Cybersecurity Canon<\/a>. Canon nominees have been a regular fixture on the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\">Palo Alto Networks blog<\/a>\u00a0for more than a year; the Canon is intended to be a list of must-read books that advance discussion of cybersecurity and, if not read, will leave a hole in a cybersecurity professional\u2019s education.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"198\"><span class=\"ar-custom\" style=\"padding-bottom:40.91%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-8076 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/risky.png\" alt=\"risky\" width=\"198\" height=\"81\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/risky.png 198w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/02\/risky-97x40.png 97w\" sizes=\"auto, (max-width: 198px) 100vw, 198px\" \/><\/span><\/div><\/center><!--more--><\/p>\n<p>Listen to the show\u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__risky.biz_RB355&amp;d=AwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=4XKtn8ik4y9TyjJVe3FT826XDCmKHBENWKGzOrhHDNI&amp;m=ewZwd2jfWBNrIjlj1rub0Bn_Ub7Ag9yL2R_C23Ytuvw&amp;s=TN63gGNO0GzJ_WBKpyej5wTAaBIFQUW2ffRv9bVYQ2g&amp;e=\" rel=\"nofollow,noopener\" >here<\/a>\u00a0to find out more about the Canon, and learn how you can get involved. This year's inductees to the Cybersecurity Canon will be announced in a few weeks at <a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\" target=\"_blank\">Ignite 2015 in Las Vegas<\/a>.<\/p>\n<p>Check out a few recent Cybersecurity Canon nominees:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/01\/cybersecurity-canon-countdown-zero-day-stuxnet-launch-worlds-first-digital-weapon\/\" target=\"_blank\">Countdown to Zero Day: Stuxnet and the Launch of the World\u2019s First Digital Weapon<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/01\/cybersecurity-canon-inside-cyber-warfare-mapping-cyber-underworld\/\" target=\"_blank\">Inside Cyber Warfare: Mapping the Cyber Underworld<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/01\/cybersecurity-canon-cyber-warfare-techniques-tactics-tools-security-practitioners\/\" target=\"_blank\">Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/01\/cybersecurity-canon-winning-ciso\/\" target=\"_blank\">Winning As a CISO<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Rick Howard,\u00a0Palo Alto Networks CSO,\u00a0\u00a0was on Patrick Gray\u2019s Risky Business podcast to talk about the\u00a0Cybersecurity Canon. Canon nominees have been a regular fixture on the\u00a0Palo Alto Networks blog\u00a0for more than a year; &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,99,112],"tags":[251,1054,345,1053],"coauthors":[709],"class_list":["post-8391","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-ignite","category-interview","tag-cybersecurity-canon","tag-patrick-gray","tag-rick-howard","tag-risky-business"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8391"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8391\/revisions"}],"predecessor-version":[{"id":8398,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8391\/revisions\/8398"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8391"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}