Why Write?

I shared yet another post on writing recently; I say “yet another” because I’ve published blog posts on the topic of “writing” several times. But something I haven’t really discussed is why should we write, nor what we should write about?

In his book, Call Sign Chaos, Jim Mattis said, “If you haven’t read hundreds of books, you are functionally illiterate, and you will be incompetent, because your personal experiences alone aren’t broad enough to sustain you.” While this is true for the warfighter, it is equally (and profoundly) true for other professions, and there’s something else to the quote that’s not as obvious. It’s predicated on other professionals writing. In his book, Mattis described his reading as he moved into a theatre of operations, going back through history to learn what challenges previous commanders had faced, what they’d attempted to overcome those challenges, and what they’d learned.

While the focus of his book was on reading and professional development/preparation, the underlying “truth” is that someone…a previous commander, a historian, an analyst, someone…needs to write. This is what we need more of in cybersecurity…yes, there are books available, and lists available online, but what’s missing is the real value, going beyond simple lists and instructions, to the how and the why, and perhaps more importantly, to what was learned.

So, if you are interested in developing content, what are some things you can write about? Here are some ideas…

Book Reviews
With all of the books that are out there that cover topics in DFIR, one of the few things we see are book reviews.

A book review is not a listing of the chapters and what each chapter contains.

What I mean by a book review is how you found it; was it well written, easy to follow? Was there something that could have made it better, perhaps more valuable, and if so, what was it? What impact did the contents have on your daily work? Is there something you’d like to see; perhaps a deeper explanation, more screen captures, maybe exercises at the end

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Windows Incident Response

Read the original article: