If you need to know what information security books to read, who you gonna call? The Cybersecurity Canon. Credit: Martin If knowledge is power, one of the more effective ways to get that power of knowledge is via reading books. When it comes to information security, one would have to spend many hours per day to keep up with the vast amount of written material that is constantly coming out. So what is a security professional to do?Last month David Bisson wrote a blog post 10 Must-Read Books for Information Security Professionals, where he asked information security professionals their must-read book. There’s a number of books listed there that are definitely worth a read.For those that want more, there’s the Cybersecurity Canon project, of which I’m a member. Canon members include industry experts such as Christina Ayiotis, co-chair of the Georgetown Cybersecurity Law Institute, Dawn-Marie Hutchinson of Optiv, Brian Kelly CISO at Quinnipiac University and more.The project was started in 2014 by Rick Howard, CISO of Palo Alto Networks. The members of the Canon identify lists of must-read books for cybersecurity professionals or those looking to get a foothold into the security industry. The list of books in the Canon, and those that are candidates for entry include both non-fiction and (to my chagrin) fiction book. So what does it take for a book to make it into the Canon? First off, it should not necessarily be directly tied to a specific technology or product. While a book on Windows Server 2016 security or how to configure and use Wireshark 2.2.6 are certainly worthy reads, these are not the types of books meant for the Canon.Canon-worthy books include those that focus on the core aspects of information security, are forward thinking, original and insightful. They also should stand the test of time; meaning that they should be relevant for a number of years. Some examples of books in the Canon include: Tallinn Manual on the International Law Applicable to Cyber Warfare, The CERT Guide To Insider Threats, and my favorite Measuring and Managing Information Risk: A FAIR Approach.If you know of a book you think is a candidate for the Canon, you are invited to nominate it for entry. With that, the nomination process is meant for serious entries. Every PR person wants their client’s book to be a candidate and due to that, the Canon committee would be flooded with every book under the sun. To obviate that, in order to nominate a book for the candidate list, it must be done via a book review.The benefit to the Canon of a full book review is that it demonstrates to the committee that the person submitting the book is serious about it and feels strongly enough about it to take the time to write a review. Note that the review does not have to be colossal, as a review of a few hundred words will suffice. There’s plenty of good books out there to be read, so submit as many nominations as your time permits.For more information or if you want to contact the Canon, check out the Canon FAQ. Looking forward to your review.What do you think? Add your comments over on Facebook. Related content opinion What is the CCPA and why should you care? CCPA is the law and the only way for a business to opt-out of it is to go out of business. For businesses that want to stay in business, however, CCPA is just the beginning of things to come. By Ben Rothke Aug 02, 2019 8 mins Government Legal Compliance opinion Where Chicken Little meets information security Outside of a movie theater, your plane won’t be hacked out of the sky. By Ben Rothke Aug 14, 2018 12 mins Cyberattacks Hacking Technology Industry opinion Information security lessons from Theranos An explosive new book Bad Blood: Secrets and Lies in a Silicon Valley Startup wasn’t written about security awareness, but it could have been. By Ben Rothke Jul 24, 2018 8 mins Data and Information Security Security opinion It was 35 days to GDPR, and a lot of sleepless nights GDPR went live on May 25, 2018. A month before the implementation date, attendees at the RSA Conference struggled with being fully ready. By Ben Rothke Jun 20, 2018 3 mins Regulation Government Technology Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe